Solved

Motorola P25 trunked radio

Posted on 2011-03-08
3
801 Views
Last Modified: 2012-08-14
How can a voice logging recorder company integrate with Motorola P25 trunked radio
0
Comment
Question by:churchouse
3 Comments
 
LVL 27

Accepted Solution

by:
michko earned 500 total points
ID: 35096213
Essentially the voice recorder software has to integrate with the software that controls channel assignment for the trunked radios.  It can then monitor, log, and record those channels whenever traffic passes through them.

You'll want to start by contacting your voice logging/recording company and see if they already have solutions available for logging the Motorola trunked radios.

If they don't, then Motorola offers their own logging recorder:
http://www.motorola.com/Business/US-EN/Business+Product+and+Services/Dispatch/Logging+Recorders/MCC+7500+IP+Recorder_US-EN

So does Pinnacle Wireless and Higher Ground:
http://www.pinnacle-wireless.com/projects.php
http://www.highergroundinc.com/


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35381954
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now