Rich Tehrani : Communications and Technology Blog -
Rich Tehrani
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space


Versay Solutions Moves to Support the Omnichannel World

August 31, 2015

A company known for professional services in the contact center –
Chicago-based Versay Solutions has more recently applied its skills in analytics and more to the world of omnichannel. According to Stephanie Laureys, Client Services Manager for the company – they are able to leverage leading-edge tech and assimilate it into existing technologies quite easily. For example, a demo she showed, consisted of an Amazon Echo speaker integrated with its middleware to allow a user to ask the speaker to send a text or make a conference call.

The company has deep experience in speech app and IVR design using open standards such as SIP, VXML and others.

Splice Software Uses the Power of Analytics to Expand its Product Line

August 31, 2015

Big data and analytics have had a huge impact on numerous spaces and certainly marketing is one of these areas. Perhaps the first mainstream story, in fact, describing the concept revolved around a retailer knowing a customer was pregnant before her family knew. The possibilities are certainly endless. You may recall a post I wrote some time back about IBM and the concept of digital Darwinism – the idea that companies that embrace new technology will win out over those that do not. The .Good the .Bad and the .Ugly

August 31, 2015

The .Good

I’ve been using the new ecommerce site for a few weeks and so far I have found the selection to be about 20-30% of what Amazon offers. For example you can buy rice cookers but not from Black & Decker. I was intrigued by the site when I heard the CEO on CNBC say the company loses 15-20% on each sale and becomes profitable around 15 million users. I immediately started pricing items on the site and found great savings over Amazon.

VoicePIN Voice Biometrics Brings New Tech to Phone and Apps

August 31, 2015

The biometrics market has been around for decades but never achieved widespread acceptance until after Apple rolled out TouchID. Laptop makers flirted with the technology about a decade ago but never got their systems to work very well. Apple – to its credit, released a solution which is very good.

Lasers are the Future of Drone Fighting

August 31, 2015

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014, in fact, I said there was a coming urban drone war and since then, drones with guns and explosives have been created. More recently I wrote about drones almost being used to attack federal buildings in Connecticut – thankfully without success and how a drone flew to the White House. I even wrote about a possible solution to the problem using microphones from SmartSense.

Dialogic: The Software Powering Next-Gen Networks

August 27, 2015

Much of the communications solutions industry owes a debt of gratitude to Dialogic – the company that really helped pave the way for the once disparate worlds of voice and data to work together. The company was a major player in the communications enabling equipment market in the eighties and nineties allowing "off the shelf" computers for the first time, to host telephony apps. If you’ve heard the acronyms CTI or computer telephony integration or just plain CT it’s because Dialogic, NMS and a few other companies permitted computer servers to handle media processing tasks. If you’re interested in more about the company – check out my posts or those on TMCnet.

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

August 17, 2015

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front of them to make your system less attractive. In addition, malicious users have become experts at writing code which varies its port usage and encrypts packets to be virtually invisible to many of today’s forensic tools as they hide in normal traffic flows.

Moreover, breaches typically start with a break-in or infiltration, then there is reconnaissance and finally, exfiltration.

Epson Moverio is the Ideal Wearable Drone Companion

August 12, 2015

IoT Has a Serious Image Problem - Here's Why

August 12, 2015

App Designed by 14-Year-Old Girl Could Help Fuel Diversity in Tech

August 12, 2015

A huge talking point in the media is how to get more girls interested in technology as a career.

Just this month, in fact, President Obama made a push to get more diversity in tech, Intel touted its diversity numbers and Tesla promoted  its female engineers on Twitter with the hashtag #ILookLikeAnEngineer. 

We build cars #ILookLikeAnEngineer

— Tesla Motors (@TeslaMotors) August 12, 2015

The explosion in smartphone and app use, is a universal phenomenon - everyone has been exposed to the wonders of tech. Still, there are far more boys than girls entering the fields of science and technology.

This is why I hope 14 year-old Naomi Benenson's new social-wishing app wish2wish becomes a smash hit. 

Featured Events