Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Technology

TMC White Papers

August 7, 2007

Telephone System Channel

August 6, 2007

If you aren’t aware, TMC has built with its partners, the largest collection of business to business online communities in the communications and technology space. Channels are micro communities which live on the left navigation of TMCnet menus. Global Online Communities are in yellow and live in the top navigation area of TMCnet’s home and other pages.   The latest channel/micro community we have built is in partnership with IPitomy and is called obviously enough the Telephone System Channel. On this channel you will find all the information on telephone systems you could ever want.   For example, here is an article which discusses research firm ABI’s thoughts on SIP and how it is transforming telephone systems today.

Unified Communications Magazine Debuts

August 6, 2007

Here is the unveiling of the first issue of Unified Communications Magazine (PDF). It has not been through final proofing but I have been so excited to share this new publication with the word I just had to post the magazine today.   This publication is different from every other magazine you may have every read. Why? It is the first (or one of the first – I haven’t found another) horizontally designed magazine that is printed and also available via PDF.   The magazine is formatted for computer screens.

VoIP/IP Communications Stories August 6, 2007

August 6, 2007

In case you are behind on your reading or perhaps were away and want to catch up quickly; I have assembled some of the top stories from last week and today. Topics of interest include Cisco’s purchase of an equity stake in VMware, Inter-Tel’s small business push and the article on VoIP call recording.  

WiFi not Secure – Clarified

August 6, 2007

I just received this e-mail from Francois Doremieux, Senior Program Manager, Product Group: Customer Experience in response  to my WiFi is Insecure post from last week. I thought it worth sharing.   ----   Hello Rich It was a pleasure meeting you in Redmond last month.   I just read your "WiFi is not secure" article and I wanted to add a brief comment.   As we discussed in Redmond, the notion of security and quality at the network layer is only one way to look at it. I agree that it’s possible to snoop and intercept the packets over WiFi. Therefore, one cannot trust the network layer alone for security (as we had discussed in Redmond that it is not possible to trust the network layer alone for management of quality). That is why the approach we have taken with Microsoft UC is to provide security at the application layer, with strong authentication, non repudiation, signaling and media encryption (in the same way we did it for quality with the adaptive media stack).   Transport is a very important element of the stack, but it can’t solve all issues (and its solutions tend to not have the flexibility software brings to the application layer).

Loving Asterisk

August 3, 2007

700 MHz Setback

August 3, 2007

Just when youthought it was safe to jump into the 700 MHz frequency with your own device along comes the Federal Communications Commission's Office of Engineering and Technology (OET) who says initial testing of the prototype devices showed they failed to swiftly track and avoid interference with other, licensed broadcasts.   The report stated the technology coalition behind the tests had hoped the use of so called white spaces - an unlicensed spectrum between TV channels -- would pass muster with regulators as early as October. The coalition effort is one of several efforts on the part of large companies offering Internet services and devices to expand options for consumer access to the Web.   The group includes companies such as Microsoft Philips, Google, Intel Corp., and Dell Inc. Members of the coalition want the ability to offer devices and services that don't have to be used on licensed networks operated by traditional telecom or cable companies.   But the OET’s test results put a damper on the group’s hopes, noting that "the sample prototype white space devices submitted to the commission for initial evaluation do not consistently sense or detect TV broadcast or wireless microphone signals."   Hopefully there will be a way to solve this dilemma. After all, the above companies represent some of the smartest technology minds in the world.

ITEXPO Weeks Away

August 3, 2007

I just can’t believe that Internet Telephony Conference & Expo is five short weeks away. I just can’t wait for September 10-12th in Los Angeles. Boy is the summer going by fast. Thankfully I read Ken Kamp’s blog where he talks about the show and it reminded me about the timing of this event.   Tom Keating too reads Ken’s blog and he beat me to writing about Ken’s post.   I am very excited about the show… It is just amazing how much the communications market has evolved in a few short years.

Call Center/CRM Stories August 3, 2007

August 3, 2007

Here are the call center/CRM stories for the week of August 3, 2007. Enjoy. I really don’t have a favorite but if you press me I might say the Argentina and Central American call center stories are of interest.   Report Shows Contact Centers Still Fighting High Attrition The Unified Agent Desktop: An Inside Look Call Center Furniture: How to Buy the Right Chair Report Shows Growth Expected in Argentina Contact Center Applications Market Implementing CRM Software the Right Way Study Examines the Contact Center Market in Central America Phone Systems in Today's Business Predictive Dialer for the Small Business Research Indicates UK Companies Not Ready for New Year OFCOM Change Loquendo TTS to Power Voice Messaging Solution for Ontario Systems

WiFi is not Secure

August 3, 2007

George Ou has an excellent write-up about how insecure Web 2.0 applications are over WiFi. The problem? Unencrypted traffic which can be recorded, analyzed and used against you. He starts with a basic example of a Gmail account getting hijacked. Even worse, using this technique you can potentially have your home address and your e-mail known to others who are lurking nearby and recording your traffic.
Featured Events