black line

the wireless messaging news

black line

Wireless News Aggregation

black line

Friday — August 15, 2014 — Issue No. 618

black line

Paging and Wireless Messaging Home Page image Newsletter Archive image Carrier Directory image Recommended Products and Services
imageimageimageimage
Reference Papers Consulting Glossary of Terms Send an e-mail to Brad Dye

black line

Dear Friends of Wireless Messaging,

TELEPHONE COMPANIES TO EVENTUALLY TRANSITION FROM COPPER-WIRE LINES TO VOIP

I think this is an important topic and I would like to start a discussion.

One reader wrote:

Hay Brad,

Just wanted to throw a question out there for you.

One of the trends we are seeing with ATT, Verizon, etc., that the copper-land providers, are looking to eliminate copper . . . appears by around 2020.

As a hospital, I am concerned regarding performance reliability  of VOIP and having to rely on cellular.

Have you heard from anyone in healthcare or Life/Safety related fields, how they plan on creating a replacement that will be a reliable as copper?

Is there any other alternative anyone is exploring?

Also, from our paging providers, this will impact their reliability.

And this:

I know the standard response is probably going to be that VOIP is reliable and you can have a fully redundant system, and with proper configuration will not have the lags, buffered, and missed sound bites.

But, for example,  I am even  “Hearing” issues when even I call Verizon enterprise business center to activate a cell phone . . . there are distortions in their on hold music, and sometimes you can only catch every other word of the representative.

Our organization, like all others is moving to VOIP, and now that ATT (Verizon and others too) is in the process of beginning to phase out copper, I am concerned about my Emergency Codes in the hospital.

The copper was my “Failsafe” if there were ever VOIP problems . . .  my copper-power-fail phones could save the day. By the end of the decade, what will be our alternative?

Yes, I know it is about 5 to 6 years away, but I want to start asking now and I would hope there is someone else out there who is also trying to come up with a reliable backup solution.

One suggestion was to have one of the devices mounted that could convert and send to wireless in the event of a VOIP outage. My first response was to remember the tornado that touched down at the airport . . . NONE of the cell phones in the area could even get through with the high volume congestion, and sending to wireless is NOT a good option for Emergency Codes.

Modern technology is great, but for the gains we seem to be making, we are also sacrificing as well. Is it just me, or is nobody else noticing?

Surely this merits an open discussion. Please click HERE to send me your comments and opinions.

black line

Now on to more news and views.

 

 

 

 

 

 

P.S. — Oh yes, it's funds raising time.

 

CAN YOU HELP?

black line

Can You Help The Newsletter?

left arrow

You can help support the Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.

Reader Support

Newspapers generally cost 75¢ $1.50 a copy and they hardly ever mention paging or wireless messaging. If you receive some benefit from this publication maybe you would like to help support it financially? A donation of $50.00 would certainly help cover a one-year paid subscription. If you are wiling and able, please click on the PayPal Donate button above.

The Weather in
Wayne County‚ Illinois

Find more about Weather in Fairfield, IL
Click for weather forecast

Wireless Messaging News
  • Emergency Radio Communications
  • Wireless Messaging
  • Critical Messaging
  • Telemetry
  • Paging
  • Wi-Fi
Wireless
wireless logo medium
Messaging

black line

About Us

A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn't fill up your incoming e-mail account.

There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world's major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It's all about staying up-to-date with business trends and technology.

I regularly get readers' comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it.

I spend the whole week searching the Internet for news that I think may be of interest to you — so you won't have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.

black line

Editorial Policy

Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association.

black line

Back To Paging

pagerman

Still The Most Reliable Protocol For Wireless Messaging!

black line

Subscriptions

* required field

If you would like to subscribe to the newsletter just fill in the blanks in the form above, and then click on the “Subscribe” bar.

free There is no charge for subscription and there are no membership restrictions. It's all about staying up-to-date with business trends and technology.

free

black line

look

Newsletter Advertising

advertise here

If you are reading this, your potential customers are probably reading it as well. Please click here to find out how.

 

black line

twitter

black line

facebook

black line

Valid CSS!

black line

 

 

black line

black line

Advertiser Index

American Messaging
Critical Alert Systems
Critical Response Systems
Easy Solutions
Hahntech USA
Hark Technologies
Infostream Pty Limited
Ira Wiesenfeld & Associates
Ivycorp
Leavitt Communications
Preferred Wireless
Prism Paging
Product Support Services — (PSSI)
Paging & Wireless Network Planners LLC — (Ron Mercer)
WaveWare Technologies
WiPath Communications

black line

black line

American Messaging

black line

amsi

black line

American Messaging

black line

 

 

black line

WaveWare Technologies

wavewear
sales@wirelessmessaging.com
800-373-1466
2630 National Dr., Garland, TX 75041

New Products

SPS-5v9E Paging System

  • 1 Serial Port Connection
  • 2 Ethernet Connections
  • Browser and Serial Port Config
  • TAP, COMP2, Scope, WaveWare SNPP, COMP2, & PET Protocols
  • 2W, 5W Option

DMG Protocol Converter

  • Linux Based Embedded System
  • Up to 4 Serial Port Connections
  • Ethernet Connections
  • Browser Configuration
  • Protocol Conversion
  • TAP, XMPP, SMS, HTTP, UDP
  • Additional Protocols Available Soon
WaveWare Technologies

black line

black line

Easy Solutions

black line

easy solutions

Easy Solutions provides cost effective computer and wireless solutions at affordable prices. We can help in most any situation with your communications systems. We have many years of experience and a vast network of resources to support the industry, your system and an ever changing completive landscape.

  • We treat our customers like family. We don't just fix problems . . . We recommend and implement better cost effective solutions.
  • We are not just another vendor . . . We are a part of your team. All the advantages of high priced full time employment without the cost.
  • We are not in the Technical Services business . . . We are in the Customer Satisfaction business.

Experts in Paging Infrastructure

  • Glenayre, Motorola, Unipage, etc.
  • Excellent Service Contracts
  • Full Service—Beyond Factory Support
  • Contracts for Glenayre and other Systems starting at $100
  • Making systems More Reliable and MORE PROFITABLE for over 30 years.

Please see our web site for exciting solutions designed specifically for the Wireless Industry. We also maintain a diagnostic lab and provide important repair and replacement parts services for Motorola and Glenayre equipment. Call or e-mail us for more information.

Easy Solutions
3220 San Simeon Way
Plano, Texas 75023

Vaughan Bowden
Telephone: 972-898-1119
Website: www.EasySolutions4You.com
E-mail: vaughan@easysolutions4you.com

black line

Easy Solutions

black line

black line

Why one of cybersecurity’s thought leaders uses a pager instead of a smart phone

By Andrea Peterson
August 11

Dan Geer puts on his glasses at the beginning of his keynote at Black Hat USA 2014.
(Image courtesy of Black Hat)

In the computer and network security industry, few people are as well known as Dan Geer. A long-time researcher who is thought of as one of the industry's thought leaders, Geer is currently the Chief Information Security Officer at In-Q-Tel — a non-profit venture capital firm that invests in technology to support the Central Intelligence Agency.

Speaking on his own behalf as the keynote at Black Hat USA last week, Geer laid out an ambitious plan to help secure the Internet and define privacy in the digital age, including mandating security breach disclosure, having the U.S. government buy and disclose all the zero day vulnerabilities it can find, and supporting an even stronger "right to be forgotten" than is currently being tried out by the European Union. His full keynote is available to watch on YouTube — or to read via Black Hat's Web site.

The Switch spoke with him after his keynote to dig into a different topic that he touched on: His distrust of increasing data collection and how he tries to stay off the digital grid in his own life. This interview has been lightly edited for length and clarity.

One of the things I was very interested in from your talk was your personal approach to technology now — as one of the sort of elders of the cybersecurity community you really seem to try to stay off the network as much as possible. Is that accurate?

I don't carry a cellphone. Honestly, it's a nuisance — it would be very helpful because as you know things aren't about planning these days, they're about coordination. "Oh, did you see this? Get over here." It's about coordination rather than planning.

But on the other hand, I testified actually twice — once at the FCC, once in a congressional committee — that if you required location tracking, I was going to give one up. And to an extent, it's only putting my money where my mouth is. I said I would give it up, and went ahead and did it. So you say, "Well, you're cutting of your nose to cut your face, you're just being stubborn." But no, I meant it.

You no doubt have written about data retention laws and the like... The whole bit about data retention laws bothers me in many ways. On the other hand, if you're an optimist or you're in an position to control how data is used you'll be much more comfortable about having it. Does the name Alessandro Acquisti mean anything to you?

It does — although probably more to you...

He's a professor at Carnegie Mellon. I think he's about as good as a designer of experiments in privacy — in particular people's real opinions on privacy — as anybody. He's really good at experimental design, which speaking as someone who was once trained as a statistician appeals to me. He runs very clever experiments, and those clever experiments include getting past the institutional review committee which is not exactly a walk in the park...

But he's done a bunch of things, and shown that if you give people fine-grained control over what their information is in public, people reveal more. They might say if you give me a lot of control, they'd reveal less — but it doesn't work that way. People will reveal more if they have more control so to a certain extent is what he's verifying is sort of my own feeling: If I don't have control I don't want to reveal it.

Part of my personal opinion about all this is that I don't trust a situation where I have not only no control about its use, but no visibility about whether it is being used. Take electronic health records. We're obviously going towards it in a big way. But I ask you, who owns the electronic health records?

That's a good question.

I worked in Harvard's teaching hospitals for 10 years after getting out of college. And in 1974, I'm fairly certain that was the year — this is by memory, but I'm fairly certain that was the year — but in Massachusetts that's when who owned the medical record changed from being the individual to the institution. Before that, when I went to the window I could say "give me my record" and you would have to produce a stack of paper and when I took it and walked out, I had my records. There wasn't another.

That was changed, ostensibly, to combat insurance fraud — people were taking records, removing parts of it and going to another institution to get more medicine or more whatever. Insurance fraud, okay? But the point was there was a record and you knew where it was — because if I have it, you don't, and if you have it, I don't. But now electronic health records, where is that going to go? There are people who argue that in the world of electronic health records, it's natural for it to revert to the patients. I think that's probably true — but let's think about this.

I have a practicing lawyer friend who argues in a world where malpractice suits are so ordinary, common, and frequent that if might not be the case. If you are a practitioner and it's 100 percent electronic records and you're worried about being sued, will you or will you not want a copy of that record in your files as well as wherever else I might be? Or are you willing to say, "I looked at Dan's records in this cloud at this time and it told me I should give you the transfusion" versus "I've got a copy of the record and this is what I used to make my decision and you know that my copy and this copy are not the same, so someone has modified it?"

So that's going back to what this guy is actually talking about doing: Founding a company that provides time-stamped delivery of medical records fragments so that someone can say, "no, this is what I had and I can prove it — this third party over here can say, no that is what I transmitted to Dan's doctor on this date. We don't know what's in it because it was encrypted, but we can say it was the same bits because we stamped it in a certain way."

And I think he's right about that — the integrity in electronic health records becomes perhaps more important than confidentiality. It may well be that we are at a moment in time when what changes under the pressure to provide observability. I'm using electronic health records, but it could just as easily be cars, or the smart grid or anything else. What changes is confidentiality for better or worse goes away. But that leaves the question of integrity.

I'm sure you've seen this, but the so-called CIA rule — confidentiality, integrity and availability — is a traditional triad about computer security concerns. Availability is not as big of one, but it has to do with "if I go looking for Dan's records will I actually get it." Integrity is "has anybody mucked with it?" And confidentiality is "has anyone whose never had any reason to know able to see it?" I think it's honest to say we may lose a certain amount of confidentiality control. It would be most unfortunate if we lost integrity control at the same time.

So what do we do when there's lots of fragments of my medical records and every practitioner I deal with wants their piece of it, or maybe the whole thing? Integrity actually is the big deal then, I would argue.

Arguably the same points could be made about tracking cars for insurance purposes. . .

And I understand why you would say you want to record everything with a car — I understand that. Where's it has been? One of the things Tim O'Reilly suggested in his work on Algorithmic Regulation was, well you know you could make obeying the speed limit built into the car, but you could also make the speed limit dependent on how crowded the roads are — so you could drive faster in the off hours. In rush hour, the car would drive slower. Yeah, we'd probably do what they do in London and adjust for congestion. But his point is that instead of regulating the prior conditions — "you can't go faster than this, or you can't do that" — regulate it on the run with an algorithm. Of course, that way lies wonderful things and terrible things. It's what do you think is probable? As for myself...

I'm not a Luddite. Luddites smash machines. But I am getting older, and it's easier to say "why do I care?" To continue with the cellphone conversation, it would be especially useful. A member of my family is mentally ill, I've been carrying a paging device but the pager companies are slowly going out of business because of this [points towards cellphone being used to record interview] for obvious reasons. But it's important for some people to be able to reach me for certain situations that occur, as you might guess. Maybe I'll give up and do this. GPS built into cars, or OnStar that you can't turn off. Do you care about that? As I'm sure you know, the most common reaction is "I live a good life, I have nothing to hide." Daniel Solove has a book about this in which he dismembers that argument, showing that just because you have nothing to hide doesn't mean that you want everything recorded.

This comes down to what do you expect as defaults. For me, the default I find easier to expect is "data doesn't exist" rather than "data exists but we handle it properly. Look, I mean nobody who contributed to the 1.2 billion passwords [reportedly in the hands of Russian cybercriminals] expected to do that. That's presumably a rare event — reasonably rare — but what default you are willing to accept or what default feels natural to you is really what it comes down to. For me the default of "the data doesn't exist" seems more natural to me than trusting everyone to not abuse it.

So you don't trust a world where data creation and collection is the default.

Trust, what's the definition of trust? You know I have a sort of personal definition of privacy and a personal definition of security. For me, trust is the availability of effective recourse. I don't guard myself if I have effective recourse, so I trust family members because of course you always have some recourse if it's family — one way or another you do, maybe not today, maybe not with your grandmother, but you do. There's always something. But there's lots of situations now where I would have no effective recourse, so I don't trust it. If I don't trust it, what should be my default? The answer is probably the creation of data is something I should avoid if I can do so. That's an awfully long-winded answer to your initial question, but nuances matter.

Do you think that the new default as surveillance has become more ubiquitous is that everything is public to a certain extent?

Man, what is public these days? If I can read your newspaper from orbit, what is public? If I can tell where you are in your house by imaging through the wall, what is public? On and on and on. We're not there yet, but I figure we're within a few years of being able to figure out if you're in a room by sniffing out your DNA. Is that public? Or putting it differently, as that sphere enlarges, what remains private? Do you have to own a house to have privacy in it or not? If your landlord owns a house...

And mine does.

So does he have the right to examine the records of a smart meter and see if you're running the toaster and the washer and the air conditioning at full blast? The farm that we have, we have several people who live there who work there just because with horses if you have an emergency, like god forbid a fire, you have a very short time — there's no time to call people and ask them to get their pants on to come help. It's now or never. So we have a certain number of people, six, two trainers, three groomers, and a vet in training. I did, in fact, put in a water meter of sorts — a flow rate meter — because one of our wells kept running dry and I wanted to know if there was a leak in the pipes and it was just seeping down into the ground or if someone was taking six hour showers or what. You might say, that's a little invasive. Turned out, one of the tenants had a bad leak in the bathroom and thought nothing of it. "You could have told me" was my reaction.

But the point is that after I ascertained that water was indeed not going back into the ground, I knew it had to be going somewhere. And I don't go visit other people's apartments at random — I could but I don't. But sure, I put a meter on. And certainly your average electrical engineering student could create a device to determine if you're on your cell phone. Maybe that doesn't matter, but they could tell when you're on the phone. So they wait until you're on the phone, run up to the porch and steal your newspaper.

I'm making this up, but if it's observable does that mean it's public? That's sort of your question, and my question too. Just because it's observable without crossing the boundaries of your property, does that mean it's public? I think if we don't do something, that's where it's going. What was it, the 1920s [ Olmstead ] through the 1960s [ Katz ] where wiretaps went from not requiring warrants to, of course they do? It was very plausible — this wire leaves your property, why wouldn't you expect it to be listened to on someone else's property? The decision that overruled that was "no, you have a reasonable expectation of privacy." But that phrase, reasonable expectation is open to interpretation. What's a reasonable expectation. As you know, it doesn't take much to have a parabolic antenna and we can listen to you in an open room.

Yep, someone else could be recording this interview right now.

Absolutely. Or there could be a ghost in your machine.

Yep.

But it's observable, because it's in public. I'd like to think that we stopped there for a little bit. We can always let go later. We can always say, "nope, your copyright is invalid because it was published three times" and it's now in the public domain. That happened once to the poem "Desiderata"—"go placidly amid the noise and haste" — it was published repeatedly in church newsletters and the courts said it was in the public domain. What is the public domain? That's really the question. Technology is changing what is public by changing what is observable, and that's what I'm getting at. And I don't know the answer, but I do know that if we don't answer it, things will continue.

So one of the points you made earlier was that it is actually very inconvenient for you not to have a smartphone. Clearly, I'm recording this interview on my smartphone — actually I have two smartphones on me, and a laptop, and all other kinds of gadgetry...

Of course.

But it seems like the lifestyle choice you've made would be very difficult for a lot of people without your technical understanding or resources. . .

Yes, and maybe without my gray hair. I'm not asking how old you are, but young people such as yourself in a way can't do without social media. If you're a high school student for example and you don't play that game you will not be part of any circle of friends — or probably not, maybe if you're going to a forestry high school or something, but you know what I'm saying: Generally speaking, it changes what is possible on the human scale that you almost have no choice and I understand that. Just to be clear, I'm not belittling that at all.

Your question was about lifestyle choice, and I said it in the talk: There's an old engineering rule about fast, cheap, and reliable — choose two. If you're at NASA and you're sending something to the moon you need it to be fast and reliable, but you can throw away cheap. Throwaway medical instruments in an operating room need to have a different thing — doesn't have to work for long, and since you're going to throw it away it would be nice if it's cheap, so you make your trade-offs.

That as a rule of thumb is mostly what engineering is about. You can have most things, but not everything. I think security engineering are about tolerable failure modes — are about what the tolerable levels of failure are. Determine what failure modes are tolerable and what are not and I can design around not having the intolerable ones. But the cost of it will be some others, because you can't have them all. So when I say, not not fast, cheap and reliable but freedom, security, and convenience, choose two — it's in that spirit as an engineer.

I was once trained as an electrical engineer, so that rings true to me for maybe you could say reasons of indoctrination. But I would say really everything in life is a trade-off. There's an economic argument that the cost to everything is the forgoing of an alternative. You buy a hundred dollar this you can't buy a hundred dollar something else. In this case, the forgone alternative is on the risk accumulation side. But it was a choice saying, "what do I need" versus "what do I want?"

I live in a world of old machinery — with hat number two [as a farmer] on. And old machinery has an interesting characteristic compared to new machinery. New machinery doesn't break very often, but when it does you cannot fix it. The old machinery breaks all the damn time, but anybody with a few wrenches, a hammer, and a willingness to get dirty can fix it. One of my guys set an old tractor on fire — burnt out the wiring harness. I have no instructions, but it's so straight forward. It was a freakin' mix, but it's fixable. Maybe your newspaper has covered the right to repair.

Yes, we've talked to the iFixit folks about how consumers' ability to repair items in their own lives has really changed.

Right. I'm in a sense flying in formation out of regular contact with those folks. As I said, I live with old machinery which breaks often, but any idiot can fix. Who fixes their own Prius? I haven't heard of anybody — there's one guy I know who could and might well, but he also spent an entire summer working in a Prius shop because he wanted to know how it works.

Which is not a luxury everyone else has.

It's not a luxury everyone else has. In fact, when I said from the podium when I said that one way for a supplier to avoid liability would be to give consumers the right to recompile, well I was talking to someone a few days ago who said "well, nobody wants to recompile, nobody knows how — who do you think you are?" It was a good point, not denying that at all.

But if the choice is "here are the means to change it or repair it or whatever, you don't have to use them, if you do use them it will work, but if you want to do that, the following rules apply: you must bring it to the dealership, you must bring it on schedule, and if you have a collision we need to know about it." I'm making this all up, but lithium batteries don't take shocks very well so if you do have a collision with a bunch of lithium batteries in the back of your car, you probably ought to look at it.

You know, Jeff [Moss, the founder of Black Hat also known as The Dark Tangent] was talking in his opening remarks about "radical simplicity" — I'm not quite sure what that means in plain English. Is that a movement or a term of art or something?

I don't know, quote, what it means, but let me guess: You can actually draw a line around something and say, "all of the moving parts in the system are inside this box — I don't have to know about a cloud in Singapore, I don't have to know." After all, how did Target get taken over? Their air conditioning contractor — who probably knows nothing about computers and shouldn't have to. If you go to the big banks in New York, I wish I could say which ones, but I probably shouldn't. But most of the ones I know, and that is a subset, are really bearing down on what they call counter party risk: If you have access to my data through some relationship, then an invasion of you is an invasion of me therefore I'm going to hold you to standards that are relevant to me. Even if they aren't relevant to you, if you want to do business with me you're going to have to do this.

And the banks are really enforcing this. If you're a trade clearance firm, what are you doing? The answer is making lists and comparing them and looking for good matches — but no, there are all sort of other requirements because you won't be able to do business with your clients because they need to make sure your air conditioning contractor can't get into you like Target's got a hold of them. That's the complexity and maybe what this radical simplicity says: I should be able to ascertain the the moving parts are.

What is it that Leslie Lamport says? A distributed system is one where the failure of a machine you've never heard of stops you from being able to do your job.

Yes, I've had that problem many times. . .

I went to check out and they told me I couldn't because their computer wasn't working, and I was like "wait a minute, do you know what audience you have here?" I didn't say anything, but you know when you can't give money to the front desk at this conference [it] just seems highly coincidental.

Andrea Peterson covers technology policy for The Washington Post, with an emphasis on cybersecurity, consumer privacy, transparency, surveillance and open government.
Source: The Washington Post  

black line

infostream

black line


State-of-the-art paging network infrastructure, fully supported at an affordable price – and it integrates with your other gear, include most makes of transmitters

Whether you are replacing or upgrading your existing network or building out new infrastructure, Infostream has the new equipment and systems that you need.

  • POCSAG & FLEX
  • Optimised for mission critical and public safety networks
  • Highly integrated base station controller
    • GPS
    • 3G modem
    • HTML User Interface
    • Ethernet switch, IP and router
    • Optional integrated radio modems
    • Dual channel capable
    • Integrated off-air (self monitoring) receiver
  • Ultra high reliability configuration (99.999%)
  • Message encryption plug-in
  • Fully featured central site VOIP, CAD, HTML, TAP, TNPP, SMPP access
  • NMS integration including Nagios, SNMP and syslog
  • Comprehensive diagnostics including adjacent site monitoring
  • Deployed internationally in mission critical applications
  • 21 years of industry experience in design, build and integration

Infostream is a world leading supplier of paging and messaging infrastructure, specialized paging receivers and consultancy services. The company was founded in 1993 and has engineered and supplied equipment for some of the largest public safety networks and private paging customers around the world.

Medical • Fire • Police • Security • Mining • Petrochemicals • Financial Markets • Telemetry • Custom Applications

infostreamInfostream Pty Limited
Suite 10, 7 Narabang Way, Belrose, NSW 2085, AUSTRALIA
Sales Email: sales@infostream.com.au | Phone: +61 2 9986 3588 | Afterhours: +61 417 555 525

black line

Motorola's Road to Irrelevancy – Focusing on Its Core

8/06/2014 @ 11:01AM

Adam Hartung
Contributor

Remember the RAZR phone? Whatever happened to that company?

Motorola has a great tradition . Motorola pioneered the development of wireless communications, and was once a leader in all things radio. In an earlier era Motorola was the company that provided 2-way radios (and walkie-talkies for those old enough to remember them) not only for the military, police and fire departments, but connected taxies to dispatchers, and businesses from electricians to plumbers to their “home office.”

Motorola was the company that developed not only the thing in a customer’s hand, but the base stations in offices and even the towers (and equipment on those towers) to allow for wireless communication to work. Motorola even invented mobile telephony , developing the cellular infrastructure as well as the mobile devices. And, for many years, Motorola was the market share leader in cellular phones, first with analog phones and later with digital phones like the RAZR .

English: Motorola RAZR V3i mobile phone (Photo credit: Wikipedia)

That was then — a far cry from Motorola today

That was the former Motorola, not the renamed Motorola Solutions of today. The last few years most news about Motorola has been about layoffs , downsizings, cost reductions , real estate sales , seeking tenants for underused buildings and now looking for a real estate partner to help the company find a use for its dramatically under-utilized corporate headquarters campus in suburban Chicago.

How did Motorola Solutions become a mere shell of its former self?

Unfortunately, several years ago Motorola was a victim of disruptive innovation, and leadership reacted by deciding to “focus” on its “core” markets. Focus and core are two words often used by leadership when they don’t know what to do next. Too often investment analysts like the sound of these two words, and trumpet management’s decision – knowing that the code implies cost reductions to prop up short term profits.

But smart investors know that the real implication of management “focusing on our core” is the company will soon lose relevancy as markets advance. This will lead to significant sales declines, margin compression, draconian actions to create short-term P&L benefits and eventually the company will disappear.

Blackberry was the game changer that overtook Motorola

Motorola’s market decline started when Blackberry used its server software to help corporations more securely use mobile devices for instant communications amongst employees. The mobile phone transitioned from a consumer device to a business device, and Blackberry quickly grabbed market share as Motorola focused on trying to defend RAZR sales with price reductions while extending the RAZR platform with new gimmicks like additional colors for cases, and adding an MP3 player (called the ROKR.) The Blackberry was a game changer for mobile phones, and Motorola missed this disruptive innovation as it focused on trying to make sustaining improvements in its historical products.

Of course, it did not take long before Apple brought out the iPhone, and with those thousands of apps changed the game on Blackberry. This left Motorola completely out of the market, and the company abandoned its old platform hoping it could use Google’s Android to get back in the game. But, unfortunately, Motorola brought nothing new to users and the Android shift gave it no market benefits, so its market share dropped to nearly nothing.

Mobile phones made 2-way radios largely obsolete

The mobile phone business quickly overtook much of the old Motorola 2-way radio business. No electrician or plumber, or any other business person, needed the old-fashioned radios upon which Motorola built its original business. Even police officers used mobile phones for much of their communication, making the demand for those old-style devices rarer with each passing quarter.

But rather than develop a new game changer that would make it once again competitive, Motorola decided to split the company into 2 parts. One would be the very old, and diminishing, radio business still sold to government agencies and niche business applications. This business was profitable, if shrinking. This organizational machination did nothing to improve any part of Motorola, but the reason given was so leadership could “focus” on this historical “core” market. Even if it was rapidly becoming obsolete.

Motorola started selling off businesses, rather than fix them

The mobile phone business was put out on its own, and lacking anything more than an historical patent portfolio, with no relevant market position, it racked up quarter after quarter of losses. Lacking any innovation to change the market, and desperate to get rid of the losses, in 2011 Motorola sold the mobile phone business – industry creator and former market share leader – to Google . Again, the claim was this would allow leadership to even better “focus” on its historical “core” markets.

But the money from the Google sale was invested in trying to defend the old market and outdated technology, which was clearly headed for obsolescence. Profit pressures intensified every quarter as sales were harder to find because customers had alternative solutions available from ever improving mobile technology.

As the historical market continued to weaken, and leadership learned it had under-invested in innovation while overspending to try defending aging solutions, Motorola again cut the business substantially by selling a chunk of its assets – called its “enterprise business” – to a much smaller Zebra Technologies . The ostensible benefit was it would now allow Motorola leadership to even further “focus” on its ever smaller “core” business in government and niche market sales of aging radio technology.

“Focusing on its core” was the mantra defending Motorola’s march to irrelevancy

This ongoing “focus” on its “core” has failed to produce any revenue growth. So Motorola has been forced to undertake wave after wave of layoffs. As buildings empty they go for lease, or sale. And nobody cares, any longer, about Motorola. There are no news articles about new products, or new innovations, or new markets. Motorola has lost all market relevancy as its leaders used “focus” on its “core” business to decimate the company’s R&D, product development, sales and employment.

Retrenchment to focus on a core market is not a strategy which can benefit shareholders, customers, employees or the community in which a business operates. It is an admission that the leaders missed a major market shift, and have no idea how to respond. It is the language adopted by leaders that lack any vision of how to grow, lack any innovation, and are quickly going to reduce the company to insignificance. It is the first step on the road to irrelevancy.

Straight from Dr. Christensen’s “ Innovator’s Dilemma ” we now have another brand name to add to the list of those which were once great and meaningful, but now are being relegated to Wikipedia historical memorabilia — victims of their inability to react to disruptive innovations while trying to sustain aging market positions. Motorola, Sears, Montgomery Wards, Circuit City, Sony, Compaq, DEC, American Motors, Coleman, Piper, Sara Lee. . .

Source: Forbes

black line

Ivy Corp 

black line

ivy

ivy

left arrow

black line

Critical Response Systems

black line

More than Paging.
First Responder Solutions.

Our patented technology notifies clinical personnel immediately, while tracking who receives and responds to each alarm. Users confirm or defer each event with a single button press, and analytic dashboards display response statistics in real time, as well as historically broken down by time, unit, room, and individual.

Our systems not only notify your personnel quickly and reliably, but also provide actionable feedback to fine-tune your procedures, reduce unnecessary alarms, and improve patient outcomes.

www.criticalresponsesystems.com

black line

In a kerfuffle about the Facebook messaging app? Here are 5 things you should know

Published August 12, 2014
Associated Press

REUTERS/Dado Ruvic

NEW YORK — Facebook's recent effort to force people to adopt its standalone mobile messaging app has privacy-concerned users up in arms. Many of them believe the app is especially invasive.

One blog from the Huffington Post published in December has gone viral, making the rounds on the social network recently because it claims the app gives Facebook "direct control over your mobile device" and allows Facebook to call phone numbers without a users' intervention and send text messages without confirmation, but none of that is accurate.

In truth, Facebook Messenger isn't any more invasive than Facebook's main app — or other similar applications.

The fear and confusion stem from a message that greets owners of Android devices when they install the app. It explains that the app requires permission access to the device's camera, microphone, list of contacts and other information.

Here's what Facebook's mobile messaging app does and doesn't do.

— Myth: You have to use the Messenger app if you want to send messages to your Facebook friends.

— Reality: While it's required to download if you are using Facebook's mobile app on the iPhone or Android smartphones, you can avoid it if use the Facebook messenger service on your desktop or laptop, iPad or even the mobile Facebook website.

— Myth: The Facebook Messenger app's terms of service are different from — and more intrusive than — Facebook's own official terms.

— Reality: Facebook's terms of service are the same for all its mobile apps, including the main Facebook app. You can read it here: m.facebook.com/policies. What's upsetting people is the list of "permissions" they see when they download and install the app on an Android phone. It's a long list with 10 items, each of which states that the app needs access to features on your phone including contacts, calendar, location data and Wi-Fi information. Sure, that's a lot of personal data. But it's the same data most messaging apps have access to. On the iPhone, users don't get the list of permissions when they install the app, but when they use it, permissions pop up individually. You can view the app's list of permissions here. Click "view details" under Permissions.

— Myth: Facebook's Messenger app will use your phone's microphone to record you.

— Reality: The app needs permission to use your phone's microphone and camera. But it requires that access because the microphone is needed for voice calling, a service that the standalone app offers that the Facebook app doesn't, and sending sound with videos. Same with the camera, it needs access if you want to send your friends pictures.

— Myth: Facebook will direct the app to send SMS, or text, messages without your permission.

— Reality: One of the permissions does say that Facebook can edit, receive, read and send SMS messages. But the company says the reason it wants to send and receive SMS messages is so that if you add a phone number to your Messenger account, you can confirm by a confirmation code that Facebook sends via text message.

— Myth: The Messenger app is new.

— Reality: Facebook's Messenger app has been around since 2011. In April, it started requiring that users in Europe download and install the app if they wish to send messages to Facebook friends. Two weeks ago, the company said it would expand the requirement to other parts of the world. Facebook says it's forcing users to make the switch because a standalone app offers more features. For example, the app is faster, it offers a selfie cam, stickers and can be used to reach people on your contact list who are not Facebook users.

Source: FOX NEWS

black line

leavitt

Specialists in sales and service of equipment from these leading manufacturers, as well as other two-way radio and paging products:

UNICATIONbendix king
ZETRON

motorola blue Motorola SOLUTIONS

COMmotorola red Motorola MOBILITY spacer
 usalert
Philip C. Leavitt
Manager
Leavitt Communications
7508 N. Red Ledge Drive
Paradise Valley, AZ 85253
CONTACT INFORMATION
E-mail: pcleavitt@leavittcom.com
Web Site: www.leavittcom.com
Mobile phone:847-494-0000
Telephone:847-955-0511
Fax:270-447-1909
Skype ID:pcleavitt

black line

Product Support Services, Inc.

black line

 

Repair and Refurbishment Services

pssi logo

pssi

Product Support Services, Inc.

511 South Royal Lane
Coppell, Texas 75019
(972) 462-3970 Ext. 261
sales@pssirl.com left arrow
www.pssirl.com left arrow

PSSI is the industry leader in reverse logistics, our services include depot repair, product returns management, RMA and RTV management, product audit, test, refurbishment, re-kitting and value recovery.

black line

Leavitt Communications

black line

its stil here

It's still here — the tried and true Motorola Alphamate 250. Now owned, supported, and available from Leavitt Communications. Call us for new or reconditioned units, parts, manuals, and repairs.

We also offer refurbished Alphamate 250's, Alphamate IIs, the original Alphamate and new and refurbished pagers, pager repairs, pager parts and accessories. We are FULL SERVICE in Paging!

E-mail Phil Leavitt ( pcleavitt@leavittcom.com ) for pricing and delivery information or for a list of other available paging and two-way related equipment.

black line

Phil Leavitt
847-955-0511
pcleavitt@leavittcom.com

leavitt logo

7508 N. Red Ledge Drive
Paradise Valley, AZ 85253
www.leavittcom.com

black line

New antenna rules to save tower companies millions in safety cost

Posted On 12 Aug 2014 By AHN

Windsor Genova – Fourth Estate Cooperative Contributor

Washington, DC, United States (4E) – Antenna tower companies are expected to save millions of dollars in yearly safety cost under the revised Federal Communications Commission (FCC) rules on the construction, marking and lighting of such structures.

The new rules released Friday provide clarity and reduce the regulatory burden on tower owners and licensees, the FCC said in a press release.

One of the new rules allow tower owners to provide tenants with antenna structure registration (ASR) information via mail, email or other electronic methods. In the old rule, tower owners are required to physically send tenants a copy of the ASR.

“We’ve already heard from one tower company familiar with the order that this rule change will reduce costs substantially by modernizing the way it can notify tenants on its 20,000 towers that its ASR have been modified,” said FCC Chairman Tom Wheeler.

The FCC also streamlines rules regarding the maintenance of tower lighting and marking by exempting tower structures that employ robust, continuous monitoring systems from the requirement for quarterly physical inspections of lighting systems.

Towers that would now be exempted from the physical inspection obligations are those equipped with advanced self-diagnostic systems, such as alarm notification and 24-hour polling, that report malfunctions of either the lighting or monitoring system to a Network Operations Center that is staffed around the clock.

“Both of these changes will significantly reduce costs for the tower industry,” the FCC said.

“American Tower estimates, for example, that it spends approximately $1.7 million/year to conduct required inspections – even though it maintains a state-of-the-art monitoring system,” said Wheeler, referring to the country’s No. 2 tower company in terms of number of towers owned.

American Tower owns more than 28,000 towers nationwide, according to Wireless Estimator.

The FCC added that the streamlines rules will remove barriers to wireless deployment and encourage providers to continue to deploy advanced systems that facilitate safety while preserving the safeguards to protect historic, environmental and local interests.

FCC chairman Tom Wheeler added that the new rules will harmonize with the Federal Aviation Administration’s guidelines that also govern antenna structure lighting and marking to ensure the safety of pilots and aircraft passengers nationwide.

The previous FCC rules on antenna tower were already outdated for nine years, according to Wheeler.

Also standing to gain from the new FCC rules are antenna tower builders such as Eastower Communications ( www.eastower.com ), which has offices in Florida and Oklahoma.

Eastower serves major wireless telcos Verizon, AT&T, Sprint and T-Mobile as well as other tower builders, including American Tower and Crown Castle, the leading tower owner in the U.S. Its services include project management, network rollouts, construction, collocation, installation, maintenance, mapping and inspection, warehousing, decommissioning, troubleshooting and repair.

Source: Gant Daily

black line

black line

Consulting Alliance

black line

Brad Dye, Ron Mercer, Allan Angus, Vic Jackson, and Ira Wiesenfeld are friends and colleagues who work both together and independently, on wireline and wireless communications projects.

Click here left arrow for a summary of their qualifications and experience. Each one has unique abilities. We would be happy to help you with a project, and maybe save you some time and money.

black line

Consulting Alliance

black line

 

advertise

 

black line

HahntechUSA

black line

HahntechUSA

Telemetry solution

Easy Application & Better Performance

 

NPCS Telemetry Modem

BLUE LINE

(ReFLEX 2.7.5)

telemetry

finger

E-mail: sales@hahntechUSA.com

Website: hahntechUSA.com

 

black line

HahntechUSA

black line

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

black line

Preferred Wireless

black line

preferred logo

Terminals & Controllers:
1ASC1500 Complete, w/Spares  
3Glenayre GL C2100 Link Repeaters
3CNET Platinum Controllers 
2GL3100 RF Director 
1GL3000 ES — 2 Chassis
40SkyData 8466 B Receivers
1GL3000L Complete w/Spares
1Unipage—Many Unipage Cards & Chassis
16Zetron M66 Transmitter Controllers  
Link Transmitters:
1QT-5701, 35W, UHF, Link Transmitter
4Glenayre QT4201 25W Midband Link TX
1Glenayre QT6994, 150W, 900 MHz Link TX
3Motorola 10W, 900 MHz Link TX (C35JZB6106)
2Eagle 900 MHz Link Transmitters, 60 & 80W
2Motorola Q2630A, 30W, UHF Link TX
VHF Paging Transmitters
1Glenayre QT7505
1Glenayre QT8505
1Nucleus VHF, 125W, Advanced Control
UHF Paging Transmitters:
20Glenayre UHF GLT5340, 125W, DSP Exciter
900 MHz Paging Transmitters:
2Glenayre GLT8200, 25W (NEW)
15Glenayre GLT-8500 250W
3Glenayre GLT 8600, 500W
 
August FEATURED ITEM
40Motorola Nucleus 900 MHz 300W CNET Transmitters, some dual flash — $750 Each

black line

Motorola Nucleus 900 MHz Paging Transmitter

black line

NIU 2 with Flash Card

black line

Nucleus II Control Module

black line

SEE WEB FOR COMPLETE LIST:

www.preferredwireless.com/equipment left arrow

Too Much To List • Call or E-Mail

Rick McMichael
Preferred Wireless, Inc.
10658 St. Charles Rock Rd.
St. Louis, MO 63074
888-429-4171 or 314-429-3000
rickm@preferredwireless.com left arrow

black line

Preferred Wireless

black line

black line

 
critical alert CA Partner’s Program
 

Providing better communications solutions to hospitals across the country — together!

For CAS, strong partnerships remain key to providing our software-based communications solutions to our customers. These solutions include:

ca dr and nurse
nurse call systemscritical messaging solutionsmobile health applications

We provide the communication, training and resources required to become a CA partner. In turn, our partners provide customers with the highest levels of local service & support. CA Partners may come from any number of business sectors, including:

  • Service Providers
  • System Integrators
  • Value Added Resellers and Distributors
  • Expert Contractors
If you would like to hear more about our CA Partners program, we’d love to hear from you. criticalalert.com

black line

Selected portions of the BloostonLaw Telecom Update, and/or the BloostonLaw Private Users Update —newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP are reproduced in this section with the firm's permission.

black line

BloostonLaw Telecom UpdateVol. 17, No. 31August 6, 2014

black line

The BloostonLaw Telecom Update newsletter will be on our traditional August recess, in light of the usual slowdown in the news cycle. We will resume publication on September 3. Meanwhile, we will keep clients apprised of significant developments via memos and special supplements.

This newsletter is not intended to provide legal advice. Those interested in more information should contact the firm. For additional information, please contact Hal Mordkofsky at 202-828-5520 or halmor@bloostonlaw.com .

black line

Voluntary Newsletter Supporters By Donation

black line

Kansas City

mobilfone

Premium Newsletter Supporter

mobilfone

black line

gcs logo

Premium Newsletter Supporter

black line

Canyon Ridge Communications

canyon ridge

Premium Newsletter Supporter

(Above and beyond the call of duty.)

black line

ProPage Inc.

propage

Newsletter Supporter

black line

Metropolitan Communications

Metropolitan

Newsletter Supporter

black line

Le Réseau Mobilité Plus
Montreal, Quebec

reseau

Newsletter Supporter

black line

Communication Specialists

communication specialists

Newsletter Supporter

black line

Cook Paging

cook paging

Premium Newsletter Supporter

black line

MethodLink

methodlink

Premium Newsletter Supporter

black line

Citipage Ltd.
Edmonton, Alberta

citipage

Newsletter Supporter

black line

black line

Friends & Colleagues

black line

Ira Wiesenfeld, P.E.

black line

Complete Technical Services For The Communications and Electronics Industries Design • Installation • Maintenance • Training • Engineering • Licensing • Technical Assistance

black line

Ira Wiesenfeld, P.E.
Consulting Engineer
Registered Professional Engineer

Tel/Fax: 972-960-9336
Cell: 214-707-7711
Web: IWA-RADIO.com
7711 Scotia Dr.
Dallas, TX 75248-3112
E-mail: iwiesenfel@aol.com

black line

Ira Wiesenfeld, P.E.

black line

subscribe free

black line

Wireless Network Planners

black line

Wireless Network Planners
Wireless Specialists

www.wirelessplanners.com
wirelessplannerron@gmail.com

R.H. (Ron) Mercer
Consultant
217 First Street
East Northport, NY 11731
ron mercer

Cellphone: 631-786-9359

black line

Wireless Network Planners

black line

black line

Prism Paging

black line

prism
white line

PRISM IP MESSAGE GATEWAY

white line

THE ULTIMATE IN COMMERCIAL AND PRIVATE RADIO PAGING SYSTEMS

prism
  • VoIP telephone access — eliminate interconnect expense
  • Call from anywhere — Prism SIP Gateway allows calls from PSTN and PBX
  • All the Features for Paging, Voice-mail, Text-to-Pager, Wireless and DECT phones
  • Prism Inet, the new IP interface for TAP, TNPP, SNPP, SMTP — Industry standard message input
  • Direct Connect to NurseCall, Assisted Living, Aged Care, Remote Monitoring, Access Control Systems
prism
prism

black line

black line

WiPath Communications

black line

Intelligent Solutions for Paging & Wireless Data

WiPath manufactures a wide range of highly unique and innovative hardware and software solutions in paging and mobile data for:

  • Emergency Mass Alert & Messaging
  • Emergency Services Communications
  • Utilities Job Management
  • Telemetry and Remote Switching
  • Fire House Automation
  • Load Shedding and Electrical Services Control

black line

PDT3000 Paging Data Terminal

pdt 2000 image

  • FLEX & POCSAG
  • Built-in POCSAG encoder
  • Huge capcode capacity
  • Parallel, 2 serial ports, 4 relays
  • Message & system monitoring

black line

Paging Controlled Moving Message LED Displays

welcom wipath

  • Variety of sizes
  • Indoor/outdoor
  • Integrated paging receiver

black line

PDR3000/PSR3000 Paging Data Receivers

paging data receiver

  • Highly programmable, off-air decoders
  • Message Logging & remote control
  • Multiple I/O combinations and capabilities
  • Network monitoring and alarm reporting

black line

Specialized Paging Solutions

paging data receiver

  • Emergency Mass Alerting
  • Remote telemetry switching & control
  • Fire station automation
  • PC interfacing and message management
  • Paging software and customized solutions
  • Message interception, filtering, redirection, printing & logging Cross band repeating, paging coverage infill, store and forward
  • Alarm interfaces, satellite linking, IP transmitters, on-site systems

black line

Mobile Data Terminals & Two Way Wireless  Solutions

mobile data terminal

radio interface

  • Fleet tracking, messaging, job processing, and field service management
  • Automatic vehicle location (AVL), GPS
  • CDMA, GPRS, ReFLEX, conventional, and trunked radio interfaces

black line

Contact
Postal
Address:
WiPath Communications LLC
4845 Dumbbarton Court
Cumming, GA 30040
Street
Address:
4845 Dumbbarton Court
Cumming, GA 30040
Web site: www.wipath.com left arrow CLICK
E-mail: info@wipath.com left arrow CLICK
Phone:770-844-6218
Fax:770-844-6574
WiPath Communications

black line

black line

Hark Technologies

black line

hark logo

Wireless Communication Solutions

black line

USB Paging Encoder

paging encoder

  • Single channel up to eight zones
  • Connects to Linux computer via USB
  • Programmable timeouts and batch sizes
  • Supports 2-tone, 5/6-tone, POCSAG 512/1200/2400, GOLAY
  • Supports Tone Only, Voice, Numeric, and Alphanumeric
  • PURC or direct connect
  • Pictured version mounts in 5.25" drive bay
  • Other mounting options available
  • Available as a daughter board for our embedded Internet Paging Terminal (IPT)

black line

Paging Data Receiver (PDR)

pdr

  • Frequency agile—only one receiver to stock
  • USB or RS-232 interface
  • Two contact closures
  • End-user programmable w/o requiring special hardware
  • 16 capcodes
  • POCSAG
  • Eight contact closure version also available
  • Product customization available

black line

Other products

black line

Please see our web site for other products including Internet Messaging Gateways, Unified Messaging Servers, test equipment, and Paging Terminals.

Contact
Hark Technologies
717 Old Trolley Rd Ste 6 #163
Summerville, SC 29485
Tel: 843-821-6888
Fax: 843-821-6894
E-mail: sales@harktech.com left arrow CLICK
Web: http://www.harktech.com left arrow CLICK

hark David George and Bill Noyes
of Hark Technologies.

black line

Hark Technologies

black line

advertise

Click on the logo above for more info.

black line

UNTIIL NEXT WEEK

black line

The Wireless Messaging News


Best regards,
brad's signature
Newsletter Editor
73 DE K9IQY

Brad Dye
P.O. Box 266
Fairfield, IL 62837 USA

mensa member animated gif

CONTACT INFO & LINKS
Skype: braddye
Twitter: @BradDye1
Telephone: 618-599-7869
E–mail: brad@braddye.com
Wireless: Consulting page
Paging: Home Page
Marketing & Engineering Papers
K9IQY: Ham Radio Page

Back To Paging
pagerman
Still The Most Reliable Wireless Protocol For Emergencies!

Wireless
wireless logo medium
Messaging

black line

THOUGHTS FOR THE WEEK

black line

“I have a dream that my four little children will one day live in a nation where they will not be judged by the color of their skin but by the content of their character.”

― Martin Luther King Jr.

black line

PHOTOS OF THE WEEK

black line

The Most Wanted Man in the World: Behind the Scenes with Edward Snowden from WIRED on Vimeo .

black line

black line

Home Page | Directory | Consulting | Newsletters
Products | Reference | Glossary | Send e-mail