Solved

Motorola P25 trunked radio

Posted on 2011-03-08
3
802 Views
Last Modified: 2012-08-14
How can a voice logging recorder company integrate with Motorola P25 trunked radio
0
Comment
Question by:churchouse
3 Comments
 
LVL 27

Accepted Solution

by:
michko earned 500 total points
ID: 35096213
Essentially the voice recorder software has to integrate with the software that controls channel assignment for the trunked radios.  It can then monitor, log, and record those channels whenever traffic passes through them.

You'll want to start by contacting your voice logging/recording company and see if they already have solutions available for logging the Motorola trunked radios.

If they don't, then Motorola offers their own logging recorder:
http://www.motorola.com/Business/US-EN/Business+Product+and+Services/Dispatch/Logging+Recorders/MCC+7500+IP+Recorder_US-EN

So does Pinnacle Wireless and Higher Ground:
http://www.pinnacle-wireless.com/projects.php
http://www.highergroundinc.com/


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35381954
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question