Solved

Motorola P25 trunked radio

Posted on 2011-03-08
3
804 Views
Last Modified: 2012-08-14
How can a voice logging recorder company integrate with Motorola P25 trunked radio
0
Comment
Question by:churchouse
3 Comments
 
LVL 27

Accepted Solution

by:
michko earned 500 total points
ID: 35096213
Essentially the voice recorder software has to integrate with the software that controls channel assignment for the trunked radios.  It can then monitor, log, and record those channels whenever traffic passes through them.

You'll want to start by contacting your voice logging/recording company and see if they already have solutions available for logging the Motorola trunked radios.

If they don't, then Motorola offers their own logging recorder:
http://www.motorola.com/Business/US-EN/Business+Product+and+Services/Dispatch/Logging+Recorders/MCC+7500+IP+Recorder_US-EN

So does Pinnacle Wireless and Higher Ground:
http://www.pinnacle-wireless.com/projects.php
http://www.highergroundinc.com/


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35381954
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Encryption Decryption in Oracle 12 139
Citrix 6.5 / Receiver 12.x / MAC OS 10.x 9 81
Samsung S5 - Bricked?? 5 74
Listening device 21 75
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question