|Wireless News Aggregation|
Welcome Back To The Wireless Messaging News
We are having a cold spell here in Southern Illinois. Temperatures are running below zero degrees Fahrenheit with the wind-chill rating much lower.
Another article this week from our contributor Rex Lee. Don't miss it. Rex does a lot of hard work researching the facts for his articles. I believe he is an ethical and honest person.
Rex M. Lee is a privacy and data security consultant and Blackops Partners senior analyst and researcher.
Apple to pay 14-year-old boy who spotted FaceTime bug
By Jade Scipioni
Apple rewards 14-year-old who discovered the FaceTime app bug Apple is rewarding 14-year-old Arizona high school student Grant Thompson, along with his mother, Michelle, who discovered the FaceTime app’s eavesdropping bug. FOX Business’ Dagen McDowell reports Apple has patched the software flaw.
The 14-year-old boy who discovered the eavesdropping security flaw Opens a New Window. in Apple’s FaceTime video-calling system that made national headlines last week, is set to get a big undisclosed payout from the tech giant.
Apple, Opens a New Window. which just released iOS 12.1.4 that includes a fix for the bug, said it also plans to compensate Grant Thompson, the Arizona-based teenager, who notified them about the problem in early January.
Thompson said he discovered the flaw when he was able to hear his friends before they had even picked up phone when using FaceTime to discuss video games.
Without disclosing the exact amount, Apple said it plans on compensating Thompson for discovering the vulnerability and will also provide an additional gift to fund his education.
FILE- In this Jan. 31, 2019, file photo Grant Thompson and his mother, Michele, look at an iPhone in the family's kitchen in Tucson, Ariz., on Thursday, Jan. 31, 2019. Apple has released an iPhone update to fix a FaceTime flaw that allowed people to eavesdrop on others while using its group video chat feature. The repair is included in the latest version of Apple's iOS 12 system, which became available to install Thursday. Apple credited the Tucson teenager, Grant Thompson, for discovering the FaceTime bug. (AP Photo/Brian Skoloff, File)
According to the Verge Opens a New Window. , Apple’s history with bug bounty rewards has been mixed over the years. The company originally paid out iOS bounties but many researchers have said they have been reluctant to help Apple recently as its rewards are not as valuable as elsewhere.
Earlier this week, one security researcher said he refused to submit an issue to Apple because they refused to pay for identification of macOS flaws, only iOS bugs.
While an Apple spokesperson did not immediately respond to FOX Business’ request for comment on the bug bounties, on Thursday it apologized to its customers regarding the FaceTime flaw.
"We again apologize to our customers and we thank them for their patience. In addition to addressing the bug that was reported, our team conducted a thorough security audit of the FaceTime service and made additional updates to both the FaceTime app and server to improve security. This includes a previously unidentified vulnerability in the Live Photos feature of FaceTime. To protect customers who have not yet upgraded to the latest software, we have updated our servers to block the Live Photos feature of FaceTime for older versions of iOS and macOS." [Source: FOXBusiness]
Apple reportedly ignored reports of this bug for over a week. Including a letter from the boy's mother who is an attorney (on her letterhead)!
This is a good example of not paying attention to running the business when you are too busy enjoying a fancy new office building and all the perks that go along with success. Remember what they teach in business management:
“Stick to the knitting!”
NO POLITICS HERE
This doesn't mean that nothing is ever published here that mentions a US political party—it just means that the editorial policy of this newsletter is to remain neutral on all political issues. We don't take sides.
A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account.
There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology.
We are having a cold spell in Southern, Illinois
I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it.
TIME TO HUDDLE UP
I spend the whole week searching the INTERNET for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.
Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association. I don't intend to hurt anyone's feelings, but I do freely express my own opinions.
Prism-IPX Systems is growing and they are looking for more good software developers with communications experience. Additional information is available on their web site. Click here .
We need your help. This is probably the only weekly news source about paging and wireless messaging.
* required field
Telecom and Tech Giant Conflict of Interest and Competition Violations: Part 1
January 30, 2019 Updated: January 30, 2019
Data-driven technology providers such as Google, Apple, and Microsoft control the operating system (OS) market for smartphones, tablet PCs, voice-automated products, connected products, and PCs.
They also employ aggressive surveillance and data-mining business practices that enable each OS developer and their affiliates (e.g. Amazon, Facebook, Baidu, etc.) to indiscriminately monitor, track, and data-mine the smartphone, tablet PC, and connected technology user for financial gain.
To put this in perspective, this type of access to smartphone users is no different than if AT&T sold access to home and office phone and PC users to multinational companies.
The OS is the conduit to the smartphone, tablet PC, and technology product user, which means that Google, Apple, and Microsoft have a huge advantage over any existing or future competitor.
If OS developers are the conduit to the product user, then the telecom provider (e.g., AT&T, Sprint, Verizon, T-Mobile) is the conduit to the telecommunications subscriber (“paying customer”) and any other authorized device users, such as spouses, employees, or kids.
Together, OS developers and telecom providers control access to the product user, making companies such as AT&T, Verizon, T-Mobile, Sprint, Apple, Google, and Microsoft the most powerful companies in the world.
Collectively, these companies have monetized their customers, which means these companies are exploiting their customers for financial gain, at the expense of the customers’ civil liberties, privacy, cyber security, and safety.
The exploitation takes place when each telecom provider and OS developer acquires personal and professional telecommunications and data from the product user’s device to exploit for financial gain without compensating the user for the use of the telecom-related information.
Telecom providers are exposing their users to data-driven technology providers, who employ predatory and harmful surveillance and data-mining business practices that I believe are illegal, according to existing consumer laws.
There is a clear conflict of interest between the OS developers and their affiliates, and telecom providers regarding the negative impact on the product user’s privacy and security as a result of the predatory surveillance and data-mining business practices.
Aside from privacy and cyber security concerns, there are also potential violations of existing law associated with antitrust and unfair business competition that the Federal Trade Commission (FTC), Federal Communications Commission (FCC), Department of Justice (DOJ), and lawmakers need to address.
One of the main concerns centers on the fact that companies such as Alphabet Inc. (Google)—which, since 2001, has been involved with more than 200 mergers and acquisitions—compete in many industries worldwide, yet are allowed to indiscriminately surveil and data-mine U.S. telecom product users, giving Google and its affiliates a huge advantage over their competitors.
This advantage is enabled through the provision of pre-installed surveillance and data-mining technology in the form of apps, widgets, and other intrusive content that the product owner can’t uninstall or, in many cases, control.
Due to this uncontrollable pre-installed technology, OS developers such as Google, Apple, and Microsoft are enabled to sell access to their product users, as well as telecom product users, to their affiliates, such as Amazon, Facebook, and Baidu.
No Escape From Google
Many people frankly don’t want anything to do with Google or Google’s predatory surveillance and data-mining business practices, but these people are finding it increasingly impossible to escape Google, because of what I believe are antitrust violations, coupled with unfair business competition practices.
The reason has to do with deals that Google is cutting with original equipment manufacturers (OEMs) who manufacture smartphones, tablet PCs, connected products, PCs, automobiles, and even home appliances, such as refrigerators.
Aside from telecom products, OEMs who manufacture everyday electronics such as appliances, speakers, radios, headphones, and other common electronic products are making deals with Google, Apple, Microsoft, and Amazon in order for their products to be connected to the Internet by way of the product’s OS or a voice-automated assistant, such as Alexa.
OEMs are putting Google, Apple, and Microsoft OS-, app-, and voice-driven cameras and microphones into all electronics these days, ensuring that the OS companies and their affiliates such as Amazon can indiscriminately monitor, track, and data-mine the product user for financial gain, whether the user wants to participate or not.
Due to exclusive deals cut with OEMs, no person will be able to escape companies that employ predatory surveillance and data-mining business practices.
CNBC wrote an article based on this fact, in relation to CES 2019, titled, “Amazon and Google Are Going to Be in Every Aspect of Your Life Whether You Want Them or Not.” The article corroborates the clear antitrust and unfair business competition practices discussed here.
The monopoly, with regard to controlling telecom products, electronics, and connected technology by the OS developers, is negatively affecting civil liberties, personal privacy, cyber security, safety, business competition, and innovation, and needs to be addressed by all government agencies and lawmakers.
Many companies that rely on brick-and-mortar retail locations are at a disadvantage because of the ability to order products and services over the Internet from dominant online marketers such as Amazon; this is okay because it’s a sign of business evolution.
However, many brick-and-mortar and smaller retailers are financially unable to buy access to smartphone, tablet PC, and connected-technology users in the same way that Facebook and Amazon have the ability to buy access to telecom subscribers and Google, Apple, and Microsoft OS users.
Companies such as Google, Apple, and Microsoft imply that they don’t sell the product users’ identifiable personal and professional information that each company collects from product users. However, these companies don’t publicly disclose that they sell access to their users to their affiliates and/or companies such as Amazon, Facebook, Twitter, and even Baidu, a nation-state company from China that is a Google content developer, as I discussed in a previous article.
This means that any existing or new company seeking to market to smartphone, tablet PC, and connected technology users has to go through the telecom providers plus Google, Apple, and Microsoft, who demand billions from companies that want access to their users.
As previously mentioned, companies such as Google, Apple, and Microsoft sell access to their product users through the use of uncontrollable pre-installed apps, widgets, and other intrusive content.
Established and new businesses that wish to compete within the online marketplace can only gain access by creating third-party apps that are distributed with millions of other apps through Google, Apple, and Microsoft’s online app stores, putting these businesses at a huge disadvantage to pre-installed apps.
There is a clear competitive advantage awarded to companies that develop the uncontrollable pre-installed content that supports mainstream products such as smartphones, compared with companies that have to develop third-party content distributed via app stores, which stifles competition and innovation.
Pre-installed content is forced onto the product owner, versus apps that have to be purchased and/or downloaded from sources such as app stores. Smartphone owners have no choice about which apps are pre-installed. Additionally, the smartphone owner is given no control over uninstalling the unwanted apps.
A recent Bloomberg article pointed out that Samsung smartphone users can’t uninstall the Facebook app, which is a clear example of why companies such as Google, Apple, Microsoft, Facebook, and Amazon hold a huge advantage over rivals or new companies that are forced to distribute their apps via app stores.
As a result of deals between telecom providers, OEMs, and OS developers, consumers are being forced to use addictive, intrusive, harmful, and exploitive apps developed by the tech giants.
Consequently, smartphones, tablet PCs, TVs, voice-automated products, connected products, connected automobiles, and PCs are no longer private, secure, or safe products to use, due to the predatory and harmful surveillance and data-mining business practices employed by the OS and app developers.
Companies such as Apple will sell access to their users to competitors such as Google, which Fortune and Business Insider reported in 2018. These types of relationships enable only a few companies to control the online marketplace.
With the exception of Walmart, most other established or new companies that are trying to compete within the digital marketplace are being crushed because of Google, Apple, and Microsoft’s control over smartphone, tablet PC, and technology product users.
The key to fair competition within the online marketplace of the future will be the ability for established and new companies to gain fair access to smartphone, tablet PC, and technology product users in general.
As long as telecom providers and Google, Apple, and Microsoft control access to their users, by way of uncontrollable pre-installed surveillance and data-mining technology, these OS developers and their affiliates will dominate the online marketplace, virtually unchallenged by way of violations of antitrust law and unfair business competition.
In part 2 of this series, I’ll address privacy and cyber security threats, plus the fact that the FCC, FTC, state attorneys general, DOJ, and lawmakers aren’t addressing antitrust and fair business competition, and aren’t enforcing existing consumer and antitrust laws.
Rex M. Lee is a privacy and data security consultant and Blackops Partners senior analyst and researcher. Visit him at MySmartPrivacy.com
Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times. [or The Wireless Messaging News.]
|Source:||The Epoch Times|
Paging Transmitters 150/900 MHz
The RFI High Performance Paging Transmitter is designed for use in campus, city, state and country-wide paging systems. Designed for use where reliable simulcast systems where RF signal overlap coverage is critical.
Built-in custom interface for Prism-IPX ipBSC Base Controller for remote control, management and alarm reporting.
Prism-IPX Systems LLC.
Back To Paging
Still The Most Reliable Protocol For Wireless Messaging!
Marin supervisors urged to reject 5G wireless antennas out of health concerns
By RICHARD HALSTEAD | firstname.lastname@example.org | Marin Independent Journal
Close to 200 people turned out this week to implore the Marin County Board of Supervisors to resist installation of antennas for the next generation of wireless telecommunications technology known as 5G.
Although a few speakers mentioned the unsightliness of the antennas, most focused on concerns about health due to increased exposure to radio waves.
Dozens of people spoke during a 3-½-hour workshop convened by the supervisors Tuesday to discuss direction to staff on possible amendments to the county’s regulations for wireless antenna siting.
“I’ve been at a lot of public meetings. I have never been in a 100-percent-for-one-side public meeting in my entire life,” said Judy Schriebman of San Rafael. “This is unprecedented.”
Three people did speak in favor of the new technology at the meeting; however, all were paid by wireless carriers to be there.
Supervisors made clear at the beginning of the workshop that the Telecommunications Act of 1996 and rules adopted by the Federal Communications Commission preclude them from prohibiting new 5G transmitters. The 1996 law expressly preempts local governments from adopting regulations based on environmental effects.
The county has joined with other jurisdictions to mount a legal challenge to the most recent FCC ruling, which limits aesthetic review, prohibits locational restrictions, and sets accelerated timelines for approving new sites. The supervisors concluded the workshop by asking staff to look into setting some restrictions on locating antennas in residential areas, even though it is unclear such restrictions would withstand a legal challenge by the wireless carriers.
The new 5G, or fifth generation wireless technology, uses higher-frequency waves than 4G. The waves support faster speeds but don’t travel as far so more transmitters will be needed and they will need to be located closer to users, which increases the anxiety of people worried about health effects.
Several speakers Tuesday night said they have already suffered health effects due to exposure to wireless radiation.
“You don’t want to become me; you don’t want to become electrically sensitive,” said Maggi Garloff, who proceeded to recite a long list of symptoms she attributes to exposure to radio waves.
The list included: depression, anxiety, panic attacks, irritability, headaches, difficulty sleeping, teeth grinding, chronic fatigue, shortness of breath, increased allergies, heart palpitations, nose bleeds, digestive and lower tract disorders, chronic pain, aching joints, muscle stiffness, dizziness, eye strain, dry skin, eczema, rashes and weight gain.
“I call this my litmus finger because when I go into really bad areas it starts tingling,” Garloff said.
Jess Lerner, who helped organize a group called 5G Free Marin, said she first noticed a wireless sensitivity when she was a graduate student at Brown University and her roommates installed a wireless router.
“In the years to come, with exposure increasing, it would become impossible to ignore,” Lerner said. She said her symptoms include headaches, a pounding and racing heart, shaking hands, feeling light-headed, general weakness, and insomnia.
Chandu Vyas of San Rafael said he discovered he was sensitive to wireless radiation after a smart meter was installed in his home.
“I suddenly developed terrible daily headaches,” Vyas said. “After many tests, my doctor found nothing wrong. Then I visited my family in India for a month and my headaches went away. When I came back home, my headaches also returned.”
It is well known that ionizing radiation emitted by sources such as X-ray machines boosts cancer risk by shredding molecules in the body. It has been assumed that the only effect produced by the non-ionizing radio-frequency radiation used by cellphones is the heating of tissue.
Tiffany Baer said, “The Federal Communications Commission (FCC) safety standards rely on thermal studies, but the effects go much deeper than the skin.”
David Schonbrunn said, “While the science back in the day only knew about the thermal effects of EMFs, it has progressed since then.”
Rachel Gaunt said, “Numerous peer-reviewed studies have shown harmful effects from levels well below the current FCC limits. Replicated research has shown that low-level wireless radiation will promote cancer growth in combination with other toxic exposures.”
Harry Lehmann of Novato said that a report issued by the National Toxicology Program in November 2018 confirmed findings that microwave radiation from cellular sources is carcinogenic and the mechanism of harm is nonthermal.
“This is no longer something that is even in rational dispute,” Lehmann said. “People who are saying this is not harmful have simply not looked at the scientific data.”
Referring to the research performed by the National Toxicology Program, which is part of the U.S. National Institutes of Health, a March 2018 article in Scientific American stated, “evidence advanced by the studies shows prolonged exposure to even very low levels of RF radiation, perhaps by mechanisms other than heating that remain unknown, makes rats uniquely prone to a rare tumor called a schwannoma, which affects a type of neuron (or nerve cell) called a Schwann cell.”
The article also noted, however, that “heart schwannomas are exceedingly rare in humans; only a handful of cases have ever been documented in the medical literature.”
Writing about this same study, the National Cancer Institute, stated, “These experimental findings raise new questions as to the potential for radio frequency radiation to result in cellular changes and offer potential avenues for further laboratory studies.”
None of the three industry representatives who spoke Tuesday addressed the health issue. They stressed that the transition to 5G is needed to accommodate increased demand for wireless service from customers.
“Most people have purchased smart phones and are increasingly relying on wireless devices for their home, residential and business uses,” said Matt Yergovich, a permitting specialist with AT&T.
Cris Villegos, a representative of Verizon Wireless, said cellphones are increasingly used to make 911 calls.
“In order to ensure that these calls are made successfully we have to ensure that the network is operating at its full potential,” Villegos said. Villegos said 5G would also allow for the installation of smart chips in cars that will provide collision avoidance.
William Hammett, a Sonoma engineer who certifies that carriers are meeting FCC emission standards did not identify himself as an industry representative when speaking, but said after the meeting that he was paid by Verizon to attend.
“People may not like the standards. My job as an engineer is to assess compliance with the standards,” he said. “These facilities will comply with FCC standards.”
|Source:||Marin Independent Journal||Courtesy of Tom Cook|
I would like to recommend Easy Solutions for Support of all Glenayre Paging Equipment. This Texas company is owned and operated by Vaughan Bowden. I have known Vaughan for over 35 years. Without going into a long list of his experience and qualifications, let me just say that he was the V.P. of Engineering at PageNet which was—at that time—the largest paging company in the world. So Vaughan knows Paging.
GTES is no longer offering support contracts. GTES was the original group from Vancouver that was setup to offer support to customers that wanted to continue with the legacy Glenayre support. Many U.S. customers chose not to use this service because of the price and the original requirement to upgrade to version 8.0 software (which required expensive hardware upgrades, etc.). Most contracts ended as of February 2018.
If you are at all concerned about future support of Glenayre products, especially the “king of the hill” the GL3000 paging control terminal, I encourage you to talk to Vaughan about a service contract and please tell him about my recommendation.
The Wireless Messaging News
The Board of Advisor members are people with whom I have developed a special rapport, and have met personally. They are not obligated to support the newsletter in any way, except with advice, and maybe an occasional letter to the editor.
Can You Help The Newsletter?
You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.
Newspapers generally cost
A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.
|Voluntary Newsletter Supporters By Donation|
Premium Newsletter Supporter
Premium Newsletter Supporter
Canyon Ridge Communications
Premium Newsletter Supporter
e*Message Wireless Information Services Europe
Donate to have your company's logo added.
Incyte Capital Holdings LLC
Click on the image above for more info about advertising here.
INTERNET Protocol Terminal
The IPT accepts INTERNET or serial messaging using various protocols and can easily convert them to different protocols, or send them out as paging messages.
An ideal platform for hospitals, on-site paging applications, or converting legacy systems to modern protocols.
Prism-IPX Systems LLC.
Paging Data Receiver PDR-4
The PDR-4 is a multi-function paging data receiver that decodes paging messages and outputs them via the serial port, USB or Ethernet connectors.
Designed for use with Prism-IPX ECHO software Message Logging Software to receive messages and log the information for proof of transmission over the air, and if the data was error free.
Prism-IPX Systems LLC.
Wireless Network Planners
Remote AB Switches
ABX-1 switches are often used at remote transmitter sites to convert from old, outdated and unsupported controllers to the new modern Prism-IPX ipBSC base station controllers. Remotely switch to new controllers with GUI commands.
ABX-3 switches are widely used for enabling or disabling remote equipment and switching I/O connections between redundant messaging systems.
Prism-IPX Systems LLC.
New emergency service paging site to be added in Pitt County
By: Kara Gann Posted: Feb 06, 2019 04:21 PM EST Updated: Feb 06, 2019 08:20 PM EST
PITT COUNTY, N.C. (WNCT) — It's a decision that could affect what happens the next time you call 9-1-1. On Monday, the Pitt County Board of Commissioners set aside funds to help improve the county's emergency paging system.
Areas like Clarks Neck, Grimesland, and Simpson, in the lower part of Pitt County have been dealing with a spotty emergency paging service for some time.
It is a problem first responders in those areas say could be detrimental.
"We are a hit or miss type situation in this area," said Chief Bryan Dixon, Clark's Neck Vol. Fire Chief. "We are a very low percentage of actually receiving them at this time."
Chief Dixon says this problem could have negative repercussions. "If your firefighters don't get the message that you've got a call, your man power response is reduced and in structure fires and that type of stuff you need that type of man power that can respond."
Dixon says the problem first started when Pitt County switched over from a "VHF" very high radio frequency to the "UHF" ultra high frequency system.
An issue Pitt County Engineer, Tim Corley and staff at Pitt County development are trying to fix.
They plan on adding an additional paging site to the communication tower in Grimesland --bringing the total number of paging sites on the tower to seven.
"This project is really just a further enhancement of the radio and paging project we just completed," said Corley.
Corley said this upgrade will cost the county around $335 thousand.
"The end result is it will help those firefighters and EMS folks out that way to be notified by the paging system, as well as clearly hear the speaking on their pagers and clearly hear what the call is that's coming into their station," Corley said. "The public can be very happy with knowing we have good coverage throughout the county."
Why Do Towers Fall Down?
By Jim Fryer, Managing Editor, Inside Towers
NATE Unite 2019
In an exclusive interview with Inside Towers, Wednesday at the NATE Unite 2019 show in Dallas, Griswold explained the myriad of factors that come into play in a tower collapse from wind vortex shedding, welding micro cracks, metallurgy failure, bad grouting and the primary catalysts that create the stress: cars, planes, ice and wind.
“Even if they’re built correctly,” Griswold said “they fall down. Monopoles are more likely to fatigue at the base.” While a non-expert might place the blame solely on wind-loading stressing the foundation, Griswold said it is due more to vortex shedding on the pole itself in winds as mild as five-to-twenty miles per hour that get the pole’s vibrating frequency up (“all structures have a frequency”, he said). High winds, in fact, often obliterate the offending vortex while poor grouting and welding can exacerbate a tower’s failure, Griswold said.
Self-standing sites have a much wider range of potential failure caused by inadequate bracing, unsecured footings, loose bolts, rust and large objects impacting them at a high rate of speed on the ground or in the air. Griswold is often brought in as the CSI-type investigator hired by insurance companies, carriers or towercos to develop a forensic study of the fallen victim. In his decades on the job, he has seen tens of thousands of downed steel structures lying in a crumpled mess waiting for their final inspection and assessment.
Guyed towers, of course, fail more often due to the feature built into their name: the wire and wire connections themselves that tether them into an upright position. Anchor corrosion, loose cables that cause “galloping,” shallow footings in relation to the soil and climate all contribute to their demise, according to Griswold.
|Source:||Inside Towers newsletter||Courtesy of the editor of Inside Towers.|
Selected portions [sometimes more — sometimes less] of the BloostonLaw Telecom Update and/or the BloostonLaw Private Users Update — newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP — are reproduced in this section of The Wireless Messaging News with kind permission from the firm. The firm's contact information is included at the end of this section of the newsletter.
FCC Form 477 Data Filing Deadline Extended to
LAW OFFICES OF
2120 L St. NW, Suite 300
— CONTACTS —
Harold Mordkofsky, 202-828-5520, email@example.com
This newsletter is not intended to provide legal advice. Those interested in more information should contact the firm.
|LETTERS TO THE EDITOR|
Hi Brad and I hope all is well?
I would like to draw your attention to a 3 hour workshop being run at IWCE specific to Critical Messaging. Myself, Jim Nelson and Graeme Hull will be on the panel pushing the paging barrow so it would be good to get as many of your readers as we can that are attending IWCE to come along and support the industry as well and maybe even learn something new. Below is the main details of the session as well as this web link.
Ph : 1300 001 875
Current member or former member of these organizations.
|THOUGHT FOR THE WEEK|
“I do believe we’re all connected. I do believe in positive energy. I do believe in the power of prayer. I do believe in putting good out into the world. And I believe in taking care of each other.” — Harvey Fierstein
|VIDEO OF THE WEEK|
|Home Page||Directory||Consulting||Newsletters||Free Subscription||Products||Reference||Glossary||Send e-mail|