A fight over what you can do with a cell phone
A war looms between smartphone manufacturers. Go to full story... ...
- Written by Urgent Communications Administrator
- 15th June 2007
A war looms between smartphone manufacturers.
Tags: Call Center/Command content
Most Recent
-
Leaders outline struggles, benefits associated with ‘journey’ to NG911ORLANDO—Migrating public-safety answering points (PSAPs) to an IP-based next-generation 911 (NG911) platform is challenging and can include setbacks, leaders of two high-profile NG911 deployment efforts in the states of California and Texas said during an IWCE 2024 conference session. Budge Currier (pictured above), assistant director of public-safety communications for California Governor’s Office of Emergency Services […]
-
Is LMR the best solution for first responders? Should 4.9 GHz license go to the FirstNet Authority?Recently there was an article titled “LMR remains most reliable technology for public-safety communications,” written by the executive director of the Forestry Conservation Communications Association (“FCCA”). To some extent there are some truths to that, but it is not an absolute. Indeed, it is far from it. There were some assertions in the article that […]
-
Rescue 42: Tim O'Connell outlines capabilities of Network Systems Deployable (NSD), Deployable Networks as a Service (DNaaS) offeringsRescue 42 President, CEO and CTO Tim O’Connell describes the functionality of his company’s Network Systems Deployable (NSD) and Deployable Networks as a Service (DNaaS) products that can work with a variety of carrier systems. IWCE 2024 attendees can learn more about Rescue 42 by visiting company officials at Booth #1333 in the exhibit […]
-
Changing concepts of identity underscore 'Perfect Storm' of cyber riskSecurity teams are facing “the perfect storm” these days, with four seemingly major contributing factors at play: AI and generative AI; geopolitical dynamics; changing regulatory compliance requirements; and, notably, continuing growth in ransomware. They all lead to a very complex threat scenario that requires significant effort from cybersecurity professionals to protect their enterprises. At the heart […]