Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Motorola P25 trunked radio

Posted on 2011-03-08
3
803 Views
Last Modified: 2012-08-14
How can a voice logging recorder company integrate with Motorola P25 trunked radio
0
Comment
Question by:churchouse
3 Comments
 
LVL 27

Accepted Solution

by:
michko earned 500 total points
ID: 35096213
Essentially the voice recorder software has to integrate with the software that controls channel assignment for the trunked radios.  It can then monitor, log, and record those channels whenever traffic passes through them.

You'll want to start by contacting your voice logging/recording company and see if they already have solutions available for logging the Motorola trunked radios.

If they don't, then Motorola offers their own logging recorder:
http://www.motorola.com/Business/US-EN/Business+Product+and+Services/Dispatch/Logging+Recorders/MCC+7500+IP+Recorder_US-EN

So does Pinnacle Wireless and Higher Ground:
http://www.pinnacle-wireless.com/projects.php
http://www.highergroundinc.com/


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35381954
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question