Solved

Motorola P25 trunked radio

Posted on 2011-03-08
3
806 Views
Last Modified: 2012-08-14
How can a voice logging recorder company integrate with Motorola P25 trunked radio
0
Comment
Question by:churchouse
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 27

Accepted Solution

by:
michko earned 500 total points
ID: 35096213
Essentially the voice recorder software has to integrate with the software that controls channel assignment for the trunked radios.  It can then monitor, log, and record those channels whenever traffic passes through them.

You'll want to start by contacting your voice logging/recording company and see if they already have solutions available for logging the Motorola trunked radios.

If they don't, then Motorola offers their own logging recorder:
http://www.motorola.com/Business/US-EN/Business+Product+and+Services/Dispatch/Logging+Recorders/MCC+7500+IP+Recorder_US-EN

So does Pinnacle Wireless and Higher Ground:
http://www.pinnacle-wireless.com/projects.php
http://www.highergroundinc.com/


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35381954
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question