Intrado: Steve Lowe discusses strategies to ensure that next-gen data does not overwhelm 911 telecommunicators
Steve Lowe, senior vice president for Intrado, talks about some of the strategies the company is pursuing to help simplify next-gen 911 interfaces for telecommunicators, many of which have expressed concern that they could be overwhelmed by multimedia information in the next-gen environment.
Most Recent
-
Final cases made about Airwave, ESN, before CMA issues provisional decision on Motorola Solutions
Key players in the United Kingdom (UK) plans to deliver public-safety communications via the Airwave TETRA system or the much-delayed LTE-based Emergency Services Network (ESN) offered very different opinions on what should be done as UK competition watchdog prepares to make it provisional decision on the roles played by Motorola Solutions in both networks. Yesterday, […]
-
Polaris Wireless: Manlio Allegra talks 911 Z-axis tech, future IoT opportunities
Manlio Allegra, co-founder and CEO at Polaris Wireless, outlines the latest developments in 911 location, including recent announcements of industry compliance with FCC requirements to provide Z-axis vertical-location information for all 911 callers, even when calling wirelessly from inside a multi-story building. In addition to providing this Z-axis location for feature-phone makers like Schok, […]
-
Biden's net-neutrality strategy looks doomed
There is mounting evidence that Gigi Sohn, President Biden’s nomination to the Federal Communications Commission (FCC), may never get Senate approval. That could spell the end of his efforts to reinstate the agency’s net neutrality guidelines trashed by former President Trump. “All indications suggest that it’s over and [the White House] is just figuring out how to […]
-
Only 3% of open-source software bugs are actually attackable, researchers say
With vulnerability-management workloads ballooning in the era of heightened software supply chain security risks, a study out today suggests that only about 3% of today’s flaws are actually reachable by attackers. The data implies that if application security (appsec) pros and developers work to focus on fixing and mitigating what’s truly attackable, they could drastically […]