newsletter logo

Wireless News Aggregation

Friday — June 7, 2019 — Issue No. 860

Welcome Back To The Wireless Messaging News

I only received one response to my lawyer jokes last week, and yes it was from a lawyer. Fortunately he didn't seem to be offended but he did ask that I even the score by including some jokes this week about ham radio operators. So here goes. . .







Wireless Messaging News

  • Emergency Radio Communications
  • Wireless Messaging
  • Critical Messaging
  • Two-way Radio
  • Technology
  • Telemetry
  • Science
  • Paging
  • Wi-Fi
Wireless
wireless logo medium
Messaging

NO POLITICS HERE

This doesn't mean that nothing is ever published here that mentions a US political party—it just means that the editorial policy of this newsletter is to remain neutral on all political issues. We don't take sides.

About Us

A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account.

There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology.

We are having a cold spell in Southern, Illinois

I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it.

TIME TO HUDDLE UP

Let's get together and share ideas. Our competitors are not other paging companies, they are other technologies.

I spend the whole week searching the Internet for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.

Editorial Policy

Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association. I don't intend to hurt anyone's feelings, but I do freely express my own opinions.

 

 

We need your help. This is the only remaining news source dedicated to information about Paging and Wireless Messaging.

animated left arrow

Service Monitors and Frequency Standards for Sale


Motorola Service Monitor

IFR Service Monitor

Efratom Rubidium Standard

(Images are typical units, not actual photos of items offered for sale here.)

Qty Item Notes
2 Late IFR 500As with new batteries
1 Motorola R 2001D  
4 Motorola R 2400 and 2410A  
5 Motorola R 2600 and R 2660 late S/Ns  
4 Motorola R 1200  
2 Motorola R 2200  
2 Stand-alone Efratom Rubidium Frequency Standards 10 MHz output
1 Telawave model 44 wattmeter Recently calibrated
1 IFR 1000S  
All sold with 7 day ROR (Right of Refusal), recent calibration, operation manual and accessories  
Factory carrying cases for each with calibration certificate  
Many parts and accessories  

Frank Moorman

fircls54@aol.com animated left arrow

(254) 596-1124

E-mail address has been corrected.

Subscribe Here

IT'S FREE

* required field

If you would like to subscribe to the newsletter just fill in the blanks in the form above, and then click on the “Subscribe” bar.

Advertiser Index

Easy Solutions  (Vaughan Bowden)
IWA Technical Services, Inc.  (Ira Wiesenfeld)
Leavitt Communications  (Phil Leavitt)
Media 1
Prism Paging  (Jim Nelson & John Bishop)
Paging & Wireless Network Planners LLC  (Ron Mercer)
Wex International Limited

blue line

Leavitt Communications

blue line

leavitt

Specialists in sales and service of equipment from these leading manufacturers, as well as other two-way radio and paging products:

bendix king COM

motorola blue Motorola SOLUTIONS

   
UNICATION

WE ARE STILL STOCKING AND SELLING THE UNICATION ELEGANT PAGERS

Contact us for price and availability please

Philip C. Leavitt
Manager
Leavitt Communications
7508 N. Red Ledge Drive
Paradise Valley, AZ 85253
CONTACT INFORMATION
E-mail: pcleavitt@leavittcom.com
Web Site: www.leavittcom.com
Mobile phone: 847-494-0000
Telephone: 847-955-0511
Fax: 270-447-1909
Skype ID: pcleavitt

Passive Audio Amps For Smart Phones

Small Brass Horn — Wood Base

This is an acoustic amplifier for a smartphone. It doesn't need electric power to operate and there are no moving parts. I works like a megaphone (speaking-trumpet, bullhorn, blowhorn, or loudhailer). Everyone that I have shown it to has said something like “Wow, I want one of those!” So I am building a few of them.

Of course there are more “Hi-Fi” ways to listen to audio on your smartphone but who would want to plug an elegant smartphone into some cheap, plastic gadget? Or even use Wi-Fi or Bluetooth, which are a pain in the neck to set up, even on a smartphone.

These will be made with hardwood bases and some of them will be exotic hardwoods with interesting grain patterns. The horns are polished brass — made from mostly old horns that had rubber bulbs on the ends and were used in “times gone by” by taxis and even clowns in circuses. These horns have been re-purposed, reshaped, and re-polished.

Of course when not listening to music or other interesting audio, you can appreciate it for its beauty, it looks just plain cool. This is a work of art.

Sorry to say that I didn't design this myself. It was designed by Daniel Jansson in Sweden. He is a graduate of Umeå Institute of Design with an MFA degree in Interactive Design.

If you see a horn that catches your fancy let me know and I will build an amp for you.

Pricing

  • Small Brass Horn — Wood Base
  • Large Brass Horn — Wood Base
  • Gramophone (special order)
  • Polished Cow Horn (design not yet finalized)
  • Horn of Plenty (Cornucopia)
  • Trombone Player
    • This has a large wooden base covered with beautiful African Zebrawood wood veneer and filled with 25 lbs of lead shot for stability and vibration damping.
  • Prices do not include shipping.

$199
$299
$499
$149
$399 Out of stock

$599

For questions or to order, click here. left arrow

This Zebrawood wood veneer trombone player is beautiful. It has been finished now and I believe it is the best one I have done so far. I have an idea about how it can be safely shipped in two boxes without too much cost. The USPS will accept a box weighing up to 40 pounds so I can put the base in one box and the horn in another. I will use construction foam to fill in the voids.

Zebrawood From equatorial western Africa, Zebrawood is usually logged by hand with a hundred men or more on mountain slopes. One of the most appealing features of Zebra is the exotic appearance of the colorful grain. Black & golden lines make this an excellent choice for many projects. For ease in finishing, use a sanding sealer to seal the open pores. Zebra has interlocking grain that can produce beautiful iridescence in quartersawn boards! [...] Uses include: furniture, cabinets, architectural applications (veneer), turned articles, rifle stocks, and boxes. [source]

WEX INTERNATIONAL LIMITED

Hong Kong
ONE SOURCE FOR ALL YOUR REQUIREMENTS OF PAGERS
FOR IN-HOUSE AND WIDE AREA NETWORK PAGING

POCSAG ALPHANUMERIC PAGERS TO SUIT EVERY REQUIREMENT

W8001 (4 Line/8 Line IP67 Alphanumeric Pager)

W8008 Thinnest IP67 Rated Alphanumeric Pager 4 Line/8 Line, OLED Display

W2028 (2 Line/4 Line Alphanumeric Pager)

For Trade inquiries contact:
Eric Dilip Kumar
eric@wex.com.hk

  • Available in VHF, UHF & 900 MHz Full Range Frequency Bands
  • We are OEM for Major Brand names in USA and Europe
  • We also Design and Manufacture POCSAG Decoder Boards
  • We can Design and Manufacture to customer specifications
  • Factory located in Shenzhen, China
  • Pagers have FCC, RoHs, C-Tick, CE-EMC, IC Approvals

Visit our websites for more details www.wex.com.hk

For ESPAÑOL, PORTUGUÊS AND DEUTSCH versions, please go to:
www.pagermaker.com

The star of WWDC wasn’t the Mac Pro or Dark Mode. It was privacy

Sign In with Apple could be the first step toward locked-down Apple authentication.

By Michael Simon
Staff Writer, Macworld | JUNE 06, 2019 03:00 AM PT


Apple

During Apple’s two-and-a-half hour WWDC keynote, we were treated to lots of great moments. Craig Federighi’s quip about how bloated iTunes has become. The introduction of iPadOS. And of course, the new Mac Pro.

But the theme of the show was a familiar one: privacy. For the past several years, Apple has hammered home its belief in our devices and data staying in our hands, but at WWDC, Apple put its privacy where its mouth is. Rather than rehashing themes or trotting out the usual rhetoric, Apple gave privacy a central role in every new product it announced, drawing attention to both how our devices protect our data and what could be a target.

Anyone can talk a good privacy game, but Apple is one of the few companies that is actually taking action. While Apple didn’t specifically mention Google or Facebook when talking about any of the new privacy features, the line in the sand between them and Apple became even deeper with features like one-time location sharing and background tracking alerts.


Apple

Apple’s privacy push extends to watchOS, too. One of the main features is an app called Noise, which routinely monitors background sound and alerts you when a sustained sound might be damaging to your hearing. It’s the kind of surprise-and-delight feature only Apple would think of putting in a smartwatch—let alone attempt to implement in an existing consumer product at a massive scale—but Apple also considered something most people wouldn’t think of: All of Noise’s audio processing are done in real time, and Apple doesn’t record or save any of the sounds it hears.

For any other company, that’s not a day one feature. It’s something that’s added following an apology when someone uncovers a secret trove of audio recordings on a server. Or even worse, after said recordings are stolen as part of a hack. The Noise app announcement could have came and went without a promise of privacy and no one would have questioned it. No one would have even thought of it.

Apple thought of a bunch of other things too. Click on any of the WWDC software announcements and you’ll find a section devoted to privacy. Apple is committed to making privacy and tracking simple, automatic, and easy to understand and limit, a stark difference to the way things work on all those other phones. And now Apple isn’t limiting privacy to iPhone users anymore.

Single, simple, and secure sign-ins

Apple privacy everywhere Single, simple, and secure sign-ins One of the low-key killer WWDC announcements is Sign In with Apple. Similar to the programs already offered by Google, Facebook, Twitter and others, the Sign In with Apple button will let you use your Apple ID to log into apps and websites without needing to set up a new account or create a new password.


Apple

But convenience is only part of what makes Sign In with Apple such an excellent feature. Apple has baked privacy and security so deep into Sign In with Apple that it won’t work unless your account is protected with two-factor authentication. It uses Face ID or Touch ID on the iPhone and iPad. The coolest feature of all: you can opt to use a fake email address that forwards to your real one so the service you’re signing into won’t have access to your contact info.

And of course, neither does Apple. To make sure developers adopt it, Apple is requiring it for all iOS apps that offer a sign-in option. Apple’s received a bit of criticism for making it mandatory, but I’m all for it. Yes, Apple customers are more likely to click the Sign In with Apple button, but that also means they’ll have a protected account. According to Aaron Parecki of Okta, who made a test app to try it out, Sign In with Apple prompts for a 2FA code every time you log into an app, which could get tedious for apps and devices that don’t use biometric authentication, but it’s a necessary step for insuring security.


Apple

Developers won’t even have access to your email when using Sign In with Apple.

Parecki also writes, “The only piece of useful data in the claims really is the sub value. This is the unique identifier for the user. It’s notable that this value doesn’t mean anything in particular, which is Apple’s way of preserving user privacy.” That means developers can track how often a certain user is signing into their service, but they won’t know who that user is.

Simply put, that’s a massive step forward for privacy. Developers may gripe that it’s a requirement it—and the rumor that Apple is forcing developers to put Sign in with Apple at the top of the list might go a little too far—but there’s no downside for users here. They can log into their favorite accounts and be protected from both prying eyes and unscrupulous developers. Truth be told, we don’t know what Google, Facebook, and developers are doing with the e-mails and info they get when you use an “easy” button to log in. With Sign In with Apple, we do know: nothing.

Apple privacy everywhere

Apple has long hammered home the belief that the iPhone is the most secure smartphone on the planet, but for the first time, it’s extending that beyond Siri and iCloud encryption. With Sign In with Apple, the privacy that you get with Apple apps to the other services we use.

You don’t even need an Apple device to take advantage of it. Apple will be allowing Sign In with Apple buttons for web log-ins as well, so people on Android and Windows could be using it as well, enjoying iPhone-caliber privacy without an Apple device. And I’m willing to bet Apple is working on taking it even further. I could see iOS 14 bringing an Apple Authenticator app for generating unique codes across platforms and apps. Or maybe just turning the Apple Watch into a Bluetooth security key.

Apple often says that privacy is a right and not a privilege. With iOS 13 and Sign In with Apple, it’s proving that you don’t need to buy a thousand-dollar device to get it.

Source: Macworld  

Paging Transmitters 150/900 MHz

The RFI High Performance Paging Transmitter is designed for use in campus, city, state and country-wide paging systems. Designed for use where reliable simulcast systems where RF signal overlap coverage is critical.

  • Commercial Paging systems.
  • Healthcare Paging systems.
  • Public Safety Emergency Services Paging systems.
  • Demand Response Energy Grid Management.

Built-in custom interface for Prism-IPX ipBSC Base Controller for remote control, management and alarm reporting.

  • Use as a stand-alone unit or in wide area network.
  • Mix with other transmitter brands in an existing paging network.
  • Adjustable from 20-250 watts.
  • 110/240 VAC or 48VDC.
  • Absolute Delay Correction.
  • Remote Diagnostics.
  • Configurable alarm thresholds.
  • Integrated Isolator.
  • Superb Reliability.
  • Improved amplifier efficiency.
  • Most reliable high-powered paging transmitter available.

Prism-IPX Systems LLC.

11175 Cicero Dr., Alpharetta, GA 30022
Ph: 678-242-5290 Email: sales@prism-ipx.com
prism-ipx.com

Back To Paging

pagerman

Still The Most Reliable Protocol For Wireless Messaging!

Newsletter Advertising

look

If you are reading this, your potential customers are reading it as well. Please click here to find out about our advertising options.


Licensed Adobe Stock Image

Easy Solutions

easy solutions

Providing Expert Support and Service Contracts for all Glenayre Paging Systems.

The GL3000 is the most prolific paging system in the world and Easy Solutions gladly welcomes you to join us in providing reliable support to the paging industry for many more decades in the future.

Easy Solutions provides cost effective computer and wireless solutions at affordable prices. We can help in most any situation with your communications systems. We have many years of experience and a vast network of resources to support the industry, your system and an ever changing completive landscape.

  • We treat our customers like family. We don’t just fix problems . . . We recommend and implement better cost-effective solutions.
  • We are not just another vendor . . . We are a part of your team. All the advantages of high priced full-time employment without the cost.
  • We are not in the Technical Services business . . . We are in the Customer Satisfaction business.

Experts in Paging Infrastructure

  • Glenayre, Motorola, Unipage, etc.
  • Excellent Service Contracts
  • Full Service—Beyond Factory Support
  • Making systems More Reliable and MORE PROFITABLE for over 30 years.

Please see our web site for exciting solutions designed specifically for the Wireless Industry. We also maintain a diagnostic lab and provide important repair and replacement parts services for Motorola and Glenayre equipment. Call or  e-mail  us for more information.

Easy Solutions
3220 San Simeon Way
Plano, Texas 75023

Vaughan Bowden
Telephone: 972-898-1119
Telephone: 214 785-8255
Website: www.EasySolutions4You.com
E-mail: vaughan@easysolutions4you.com

IMPORTANT

“Is Paging Going Away?” by Jim Nelson

  • Click here for English.
  • Click here for German. (Berlin Revision: November 8, 2016)
  • Click here for French.

Here is an English PDF edit of this paper formatted with page breaks and suitable for printing.

Volunteers needed for translations into other languages.

GLENAYRE INFRASTRUCTURE

I would like to recommend Easy Solutions for Support of all Glenayre Paging Equipment. This Texas company is owned and operated by Vaughan Bowden. I have known Vaughan for over 35 years. Without going into a long list of his experience and qualifications, let me just say that he was the V.P. of Engineering at PageNet which was—at that time—the largest paging company in the world. So Vaughan knows Paging.

GTES is no longer offering support contracts. GTES was the original group from Vancouver that was setup to offer support to customers that wanted to continue with the legacy Glenayre support. Many U.S. customers chose not to use this service because of the price and the original requirement to upgrade to version 8.0 software (which required expensive hardware upgrades, etc.). Most contracts ended as of February 2018.

If you are at all concerned about future support of Glenayre products, especially the “king of the hill” the GL3000 paging control terminal, I encourage you to talk to Vaughan about a service contract and please tell him about my recommendation.

SUBSCRIBE HERE

  • Broadcast Services over the Internet for Corporate Communications
  • Seeking Parties for Live Response Applications on Smartphones
  • Click here for more information

Board of Advisors

The Wireless Messaging News
Board of Advisors

Frank McNeill
Founder & CEO
Communications Specialists
Jim Nelson
President & CEO
Prism Systems International
Kevin D. McFarland, MSCIS
Sr. Application Systems Analyst
Dartmouth-Hitchcock
Medical Center
Paul Lauttamus, President
Lauttamus Communications & Security
R.H. (Ron) Mercer
Wireless Consultant
Barry Kanne
Paging Industry Veteran
Ira Wiesenfeld, P.E.
Consulting Engineer
Allan Angus
Consulting Engineer

The Board of Advisor members are people with whom I have developed a special rapport, and have met personally. They are not obligated to support the newsletter in any way, except with advice, and maybe an occasional letter to the editor.

CAN YOU HELP?

Can You Help The Newsletter?

animated left arrow

You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.

Reader Support

Newspapers generally cost 75¢ $1.50 a copy and they hardly ever mention paging or wireless messaging, unless in a negative way. If you receive some benefit from this publication maybe you would like to help support it financially?

A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.

Ignore HIPAA At Your Own Peril

Jun 4, 2019 | Posted by Industry Expert
Data Privacy and Security, Health Information Technology, HIPAA and Compliance
By Matt Fisher, Esq


Matt Fisher, Esq

After a lull in enforcement actions concerning HIPAA, the Office for Civil Rights re-entered the fray with a $3,000,000 bang. The settlement announced on May 6, 2019, imposes a significant fine after widespread non-compliance was found by OCR.

As with many prior settlements, the factual scenario underpinning the latest settlement is fairly egregious. As one of many missteps, the party with HIPAA troubles, in this instance Touchstone Medical Imaging, LLC (TMI), had its troubles revealed to it by the FBI. Around May 9, 2014, the FBI told TMI about an insecure FTP server that left patient information searchable on the internet. Likely unknown to TMI, OCR received notification of that insecurity at the same time and OCR confirmed the report only a few days later. While that combination of events would not necessarily indicate a big issue, OCR subsequently sent a notice of investigation to TMI on August 19, 2014 to obtain more background information about the breach.

The results of the investigation are where things turn a dramatic turn for the worse. According to the recitation of findings in the Resolution Agreement between OCR and TMI, the non-compliant conduct discovered included:

  • Determining that the breach impacted 307,839 individuals;
  • Lack of policies to limit access to the FTP server containing PHI;
  • Not putting a business associate agreement with MedIT Associates until June 2016 (the nature of services is not identified);
  • Continuing to work with another business associate (XO Communications) without a business associate agreement (it is not necessarily clear, but the Resolution Agreement implies that this failure is an ongoing violation);
  • Not conducting a thorough risk analysis until April 3, 2014 (the only positive is that this risk analysis at lest occurred prior to notification from the FBI or OCR);
  • Failure to notify individuals of the breach until October 3, 2014 (almost 5 months after being told by the FBI of the issue); and
  • Failure to notify the applicable media outlets of the breach until October 3, 2014.

As suggested, the initial underlying facts of not properly securing the FTP server could be chalked up to inadvertent error that would not bring a hammer down. However, as always happens following notification of a breach, OCR investigated the entity. When the investigation uncovered the widespread non-compliance, enforcement was bound to follow.

While the facts, as noted, are hopefully not indicative of how the majority of entities respond to breaches, there are some lessons to take away from the TMI settlement.

First, always check how all servers are implemented. No matter how secure a server, device, or other tools can be, the security will be quickly undercut by inadequate implementation. Oftentimes default settings will not be consistent with what an entity necessarily wants. To be sure security is effective, run through the settings and compare to best practices.

Second, do not share patient information with any downstream entity (namely from a covered entity to a business associate or from a business associate to a subcontractor) without putting a business associate agreement into place. The BAA is always the obligation of the entity higher up on the chain. If helpful, use a checklist where the boxes need to be completed when going through contracting. One of the foremost boxes to check needs to be putting a BAA into place. The fact that TMI may potentially still be sharing PHI without a BAA begs the question of how deliberate and willful the alleged misconduct may be classified. Avoiding the problem is easy though with careful attention to contracting detail.

Third, the frequent flier violation of no or delayed risk analysis appears again. It is possible that every settlement has found an inadequate risk analysis. The risk analysis is fundamental to being able to implement comprehensive and compliant security policies. The risk analysis is time-consuming and resource intensive, but skipping is not an option.

Lastly, when a breach occurs, notification is mandatory. As highlighted in a prior blog post, the required breach notification needs to be provided within 60 days of discovery of the breach. Discovery does not necessarily mean that all of the details have been finalized. When an entity is told about the breach by the FBI or other law enforcement, disputing the time of discovery will become difficult if not impossible. Pay attention to the ticking clock and inform individuals of breaches, even when such disclosure may be embarrassing.

As always, every settlement offers lessons even if the lessons may not be clear from the first glance. Ultimately, taking compliance obligations seriously and trying to do the right thing will go a long way to making those goals a reality.

Source: Hightech Answers  

Voluntary Newsletter Supporters By Donation

Kansas City

mobilfone

Premium Newsletter Supporter

gcs logo

Premium Newsletter Supporter

Canyon Ridge Communications

canyon ridge

Premium Newsletter Supporter

ProPage Inc.

propage

Newsletter Supporter

Metropolitan Communications

Metropolitan

Newsletter Supporter

e*Message Wireless Information Services Europe

Newsletter Supporter

Lekkerkerk, Netherlands

Newsletter Supporter

Donate to have your company's logo added.

Incyte Capital Holdings LLC
Dallas, Texas

Premium Newsletter Supporter

Le Réseau Mobilité Plus
Montreal, Quebec

reseau

Newsletter Supporter

Communication Specialists

communication specialists

Newsletter Supporter

Cook Paging

cook paging

Premium Newsletter Supporter

MethodLink

methodlink

Premium Newsletter Supporter

Citipage Ltd.
Edmonton, Alberta

citipage

Newsletter Supporter

Click on the image above for more info about advertising here.

blue line

Prism-IPX Systems

blue line

prism-ipx systems
Critical Messaging that works
Secure . . . Dependable . . .
and Encrypted

Who We Are

Prism-IPX is a leader in providing reliable communications systems using modern designs to meet today’s demands for critical message alerting and delivery. Prism-IPX designs versatile and robust Critical Message Management systems using paging and other wireless technologies for high performance and dependable communications.

What We Make

Prism-IPX Systems products include full-featured radio paging systems with VoIP input, IP based transmitter control systems and paging message encryption. Other options include e-mail messaging, remote switch controllers, Off-The-Air paging message decoders and logging systems.

Contact Us   left arrow

blue line

More On Apple and Privacy

By Rex Lee
June 4, 2019

Apple is only telling a half-truth but not addressing the real problem which is the fact that products such as a smartphone are supported by an “Open API Architecture.”

To fully privatize and secure a smartphone, tablet PC, connected product, or PC supported by the android OS, Apple iOS, or MS Windows OS, the APIs associated with the preinstalled apps need to be closed (see graphic below):

Your personal and professional information associated with the use of a rooted (“preinstalled”) app such as your text messaging, contact, calendar, or location app is collected by the app developers via the “open” API that supports the app and that information is then exported to the app developers servers.

What Tim Cook, CEO Apple, is saying is that Apple enables the Apple product user to secure to the device so that Apple and other developers cannot collect “certain” personal and professional information associated with the use of an app but they do not enable the user to fully secure all of data associated with the use of the Apple product which is misleading.

Additionally, if the user does not disable all permissions associated with any app (rooted or third-party- apps downloaded by user), the unsecure app will still enabled the app developer to surveil and data mine Apple product user for financial gain.

If Apple plans on addressing open APIs by closing the APIs while returning full control over the device back to the Apple product user, then I will believe that Apple is truly addressing the issues associated with surveillance and data mining business practices.


Previous article by Rex Lee on The Epoch Times published January 11th, 2019:

Apple’s CES Privacy Claim Is Misleading

blue line

Click on the image above for more info about advertising here.

Internet Protocol Terminal

The IPT accepts Internet or serial messaging using various protocols and can easily convert them to different protocols, or send them out as paging messages.

An ideal platform for hospitals, on-site paging applications, or converting legacy systems to modern protocols.

Input Protocols: Serial and IP
TAP TNPP SNPP
HTTP WCTP SMTP
POTS (DTMF) DID (DTMF)  
 
Output Protocols: Serial and IP
TAP TNPP SNPP
HTTP HTTPS SMPP
WCTP WCTPS SMTP
FLEX (optional PURC control)   POCSAG (optional PURC control)

Additional/Optional Features

  • Database of up to 5000 subscribers.
  • 4 serial ports on board.
  • Up to 8 phone lines (DID or POTS).
  • Can be configured for auto-fail-over to hot swap standby.
  • 1RU rack mount unit appliance—no moving parts.
  • Easily secure legacy system messages leaving site for HIPAA compliance.
  • Only purchase the protocols/options you need.
  • Add Paging Encryption for HIPAA compliance on site.

Prism-IPX Systems LLC.

11175 Cicero Dr., Alpharetta, GA 30022
Ph: 678-242-5290 e-mail: sales@prism-ipx.com
prism-ipx.com

blue line

Paging Data Receiver PDR-4

The PDR-4 is a multi-function paging data receiver that decodes paging messages and outputs them via the serial port, USB or Ethernet connectors.

Designed for use with Prism-IPX ECHO software Message Logging Software to receive messages and log the information for proof of transmission over the air, and if the data was error free.

  • Option—decode capcode list or all messages.
  • Large capcode capacity.
  • Serial, USB and Ethernet output.
  • POCSAG or FLEX page decoding, special SA protocols.
  • Receivers for paging bands in VHF, UHF, 900 MHz.
  • Message activated Alarm Output.
  • 8 programmable relay outputs.
  • Send notifications of a system problem.
  • Synthesized Receiver Tuning.
  • Selectivity better than 60 dB.
  • Frequencies 148-174, 450-470, 929-932 MHz.
  • Image Rejection better than 55 dB.
  • Spurious Rejection better than 55 dB.
  • Channel Spacing 12.5 or 25 kHz.
  • Power 5VDC.
  • Receiving Sensitivity 5µV at 1200 bps.

Prism-IPX Systems LLC.

11175 Cicero Dr., Alpharetta, GA 30022
Ph: 678-242-5290 e-mail: sales@prism-ipx.com
prism-ipx.com

Wireless Network Planners

Wireless Network Planners
Wireless Specialists

R.H. (Ron) Mercer
Consultant
217 First Street
East Northport, NY 11731

ron mercer
Telephone: 631-786-9359
www.wirelessplanners.com left arrow
wirelessplannerron@gmail.com left arrow

blue line

The Evolution of Mobile Phone Usage

Posted: Jun 03, 2019 6:39 PM CDT
Updated: Jun 04, 2019 6:00 AM CDT

By Matt Foley, President and Co-Founder, Scooch

Fifteen years ago, we owned several different gadgets to help us through the day, each offering a separate function. An iPod for music on the way into work, a GPS system to navigate our travels, a calculator to solve our problems, a computer to search the web, a television to watch the big game and a chunky mobile phone or landline to verbally communicate with the outside world. Today, we aren’t carrying several gadgets with us at all times. Instead, we now only need one device to perform all these functions, plus more – and it fits right in our pocket.

The mobile industry is growing at a rapid pace. In fact, the United States is one of the largest smartphone markets worldwide. Tech juggernaut, Apple, has grown its stock value by over 15,000% since 2001, leading to a worth of $1 trillion today, and the number of smartphone users in the U.S. is now 256.9 million. With millions using their smartphones nearly every minute of every day, it’s no wonder the way we use our phones has changed over the years. From pagers to T9 texting to touch screen technology, our phone usage has experienced a significant evolution and dramatically impacted each generation.

Understanding the past, present and future of the usage of our constant sidekicks will give us a glimpse into the history of the mobile industry and what lies ahead.

You paged?

Pagers and beepers, also known as portable mini radio frequency devices, allowed for instant communication. Throughout the 80s and 90s, pagers developed a certain kind of status. To have one dangling from your belt loop or constantly on your person made users feel exceptionally important – the kind of importance where you need to be reached at a moment’s notice. At the beginning of the 1980s, there were 3.2 million pager users, a number that climbed to 61 million by 1994.

In the midst of the beeper boom, the world gained its first glimpse of the cell phone in 1983 with the portable mobile phone from Motorola. It cost a whopping $4,000 and resembled a home phone that you could take with you – but size-wise, tossing it into your purse was out of the question. The phone allowed you to make calls, but that was its only function. Instead of a simple message like pagers, users could communicate anytime, anywhere, without the constraints of a landline. At the time, that was okay! We had other devices to use for our daily functions. Though, as the Internet boom began to rumble in the late 90s and 00s, the mobile industry knew only offering calls was no longer going to cut it.

Texting? There’s an app for that.

As years went on, keyboards with T9 (Texting on 9 keys) texting capabilities became all the rage. Flip phones with keypads allowed users to click through numbers for access to letters, allowing texting to take place of our calls. Now, users didn’t need to communicate verbally, they could simply send a text-based message to share with a loved one. When T9 texting proved to be inefficient, full-on keyboards were added to cellphones. With its full keyboard and data capabilities, the Blackberry was marketed towards the constantly on-the-go businessman who needed to do more – draft emails, search Google, and share text messages – to name a few.

Throughout the 00s, the mobile data revolution required phones to have access to wi-fi and full web browsing capabilities. The Apple iPhone was introduced in June 2007, and with it, phones began to work smarter. The term “smartphone” was coined and with it, a new function for the mobile industry. Applications, or apps for short, were a necessary component of the iPhone. These apps gave users the chance to switch between a wide array of various phone functions, all with the touch of a finger. “There’s an app for that” became a universally popular phrase, adding to the idea that anything you could think of could become an app.

Ready, set, stream.

With the exponential rise of streaming services such as Netflix and Hulu in the mid to late 2010s, phones became more than ever before. In fact, as of May 2019, Netflix remained the alpha of streaming services with 60 million U.S. subscribers; Hulu “trails” behind at 28 million. The “I want it now” attitude of younger generations paved the way for this type of video, TV and film content to be accessible wherever they want it, whenever they want it. With one-third of online activity spent watching videos, phone usage switched gears to stream content fast. And not just pre-recorded content – live streaming saw a boost in popularity with the creation of Facebook Live. In fact, 82% of viewers now prefer live video over social media posts. Additionally, 80% also prefer live video to reading a blog. With users demanding video content, instead of the once popular text-based content, a new era began its rise.

The growth of video streaming has also shaken up the travel industry. Instead of maneuvering a heavy laptop in the airport just to binge The Office, more people than ever simply need to bring one device – their phone. Travelers consider their smartphones to be the single most indispensable item they bring with them on their trip, ahead of their driver’s license, deodorant and toothbrush. Think about it: The last time you were on an airplane, how many people did you see glued to their phones for entertainment?

What’s next?

This year, the number of smartphone users in the world is expected to pass the five billion mark. For those five billion demanding more from their phones, what’s next for our devices? With internet video accounting for 80% of all consumer internet traffic in 2019, streaming will continue to grow exponentially. With it, our phones must adapt, and be capable of faster, higher quality streaming. A buffering YouTube video or a non-HD Game of Thrones episode is no longer going to cut it. As our phones have slowly evolved into our constant sidekicks, phones are no longer simply a tool to make calls or texts. Our devices are now branches of our own personality, each used for a different function based on an individual’s needs.

As pagers evolved to full keyboard texting which turned into video streaming, the mobile industry has experienced an incredible transformation in a short 30 years. As technology advances seemingly by the second, our smartphones might soon become smarter than us. All in all, the ability to adapt to change is necessary for the mobile industry to do more.

Matt Foley is the President and Co-Founder of Scooch.

Source: Inside Indiana Business  

blue line

Consulting Alliance

Brad Dye, Ron Mercer, Allan Angus, Vic Jackson, and Ira Wiesenfeld are friends and colleagues who work both together and independently, on wireline and wireless communications projects.

Click here left arrow for a summary of their qualifications and experience. Each one has unique abilities. We would be happy to help you with a project, and maybe save you some time and money.

Note: We do not like Patent Trolls, i.e. “a person or company who enforces patent rights against accused infringers in an attempt to collect licensing fees, but does not manufacture products or supply services based upon the patents in question.” We have helped some prominent law firms defend their clients against this annoyance, and would be happy to do some more of this same kind of work.

Some people use the title “consultant” when they don't have a real job. We actually do consulting work, and help others based on our many years of experience.

“If you would know the road ahead, ask someone who has traveled it.”
— Chinese Proverb

Consulting Alliance

Remote AB Switches

ABX-1 switches are often used at remote transmitter sites to convert from old, outdated and unsupported controllers to the new modern Prism-IPX ipBSC base station controllers. Remotely switch to new controllers with GUI commands.

ABX-1

ABX-3 switches are widely used for enabling or disabling remote equipment and switching I/O connections between redundant messaging systems.

ABX-3

Common Features:

  • RJ45 for A, B and Common connectors.
  • Manual push button or use Prism IP commands to switch one or more relays.
  • Single or Dual Port Control card for IP or Serial connection.
  • Form C relay—control local connection.
  • Power Loss Indicator.
  • Rear Panel Connector for controlling the switch externally.
  • Power Source: 5VDC for ABX-1; 12VDC for ABX-3.

Prism-IPX Systems LLC.

11175 Cicero Dr., Alpharetta, GA 30022
Ph: 678-242-5290 e-mail: sales@prism-ipx.com
prism-ipx.com

blue line

Leavitt Communications

blue line

We can supply alphanumeric display, numeric display, and voice pagers.

We also offer NEW and refurbished Alphamate 250s, refurbished Alphamate IIs, the original Alphamate refurbished, and new and refurbished pagers, pager repairs, pager parts, and accessories. We are FULL SERVICE in Paging! Outstanding service is our goal.

E-mail Phil Leavitt ( pcleavitt@leavittcom.com ) for pricing and delivery information, or for a list of other available paging and two-way related equipment.

Phil Leavitt
847-955-0511
pcleavitt@leavittcom.com

LEAVITT COMMUNICATIONS
7508 N. Red Ledge Drive
Paradise Valley, AZ 85253
www.leavittcom.com

blue line

Friday, June 7, 2019

Volume 7 | Issue 111

Pennsylvania is Not a ‘Happy Valley’ For Rural Coverage

Last week, a recently updated FCC report was criticized for overstating the availability of Internet service. Now, Penn State University has released a study on behalf of the Center for Rural Pennsylvania that shows the digital divide in rural parts of the state is widening rather than closing, according to TribLive.com.

The “Broadband Availability and Access in Rural Pennsylvania” study found there isn’t a single county where at least 50 percent of the population received broadband connectivity.

Additionally, the study found that while the Commission notes that more than 800,000 Pennsylvania residents do not have access to broadband connectivity, that number downplays the real digital divide across the state.

FCC maps rely on self-reported data by ISPs, while the Penn State research team conducted its study in 2018 by collecting more than 11 million broadband speed tests across the state. It found that median speeds did not meet the FCC’s criteria to qualify as a broadband connection, according to TribLive.com.

“The take-home message from these analyses is this: It appears that official broadband maps are becoming less accurate over time — particularly those for rural areas — and the methodology used by the FCC not only overstates broadband speeds and availability but also shows results that are less and less accurate year after year,” the study said.

In response to the study, Gov. Tom Wolf said, “Broadband is as essential in today’s society as electricity. Not having broadband limits your ability to do business, find a job, access information, and so much more. Our lack of broadband access keeps children from accessing online assignments and homework and deters businesses from moving to our state.”

Wolf introduced a Restore Pennsylvania initiative to “bridge the digital divide” in communities across the state, notes TribLive.com.

Source: Inside Towers newsletter Courtesy of the editor of Inside Towers.
It is daily by subscription. Check it out.

blue line

BloostonLaw Newsletter

blue line

Selected portions [sometimes more — sometimes less — sometimes the whole updates] of the BloostonLaw Telecom Update and/or the BloostonLaw Private Users Update — newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP — are reproduced in this section of The Wireless Messaging News with kind permission from the firm. The firm's contact information is included at the end of this section of the newsletter.


 BloostonLaw Telecom Update Vol. 22, No. 24 June 5, 2019 

Correction to Form 481 Filing Reminder

Last week, the BloostonLaw Telecom Update inadvertently ran an older version of its annual Form 481 reminder, which described several aspects of the Form 481 filing that are no longer required. Form 481 is still due July 1. However, as with last year’s filing, network outage information for voice; unfulfilled service requests for voice and broadband; number of complaints per 1,000 subscribers for voice and broadband services; voice and broadband service rates; and the service quality certification are not required. Further, the FCC does not require copies of Form 481 to be filed with the FCC, state commissions, or tribal authorities. However, state commissions may have their own rules regarding the form that are still in effect.

We apologize for any confusion the previous Update caused.

BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Sal Taillefer.

Headlines


FCC Issues Proposed Rulemaking on USF Cap

On May 31, the FCC released a Notice of Proposed Rulemaking, originally adopted May 15, seeking comment on establishing a cap on the Universal Service Fund (USF or Fund). Comment and reply comment deadlines have not yet been established.

First, the FCC broadly seeks comment on establishing an annual combined USF cap and how to adjust it over time. By way of example, the FCC proposes $11.42 billion, which is the sum of the budgets for all four USF programs in 2018, but seeks comment on whether some other amount would be appropriate. The FCC also seeks comment on whether there are ways to adjust the budget for inflation other than those methods currently in effect.

Second, the FCC seeks comment on how an overall cap could be successfully implemented. One example would be to determine when disbursements are projected to exceed the overall USF cap and, in that event, to reduce projected universal service expenditures to stay within the cap. Another method proposed by the FCC is to cap the commitments issued by USAC. As a part of this aspect of the NPRM, the FCC also seeks comment on how it can use USAC demand projections to better implement a cap. Specifically, the FCC proposes a process whereby USAC will notify the FCC if demand calculations suggest the cap will be exceeded, and seeks comment on limiting commitments by USAC that exceed the demand forecast window. In conjunction with this proposal, the FCC also seeks comment one extending USAC demand forecasts beyond the calendar year, and whether to make this information public.

Third, the FCC seeks comment on how to reduce expenditures if USAC projects the cap will be exceeded. One such proposal is to direct USAC and FCC staff to make administrative changes to reduce the size or amount of funding available to the individual program caps in an upcoming year if demand is projected to exceed the overall cap, such as limiting some or all of the automatic inflation increases in the programs projected to exceed the cap. Another is to prioritize the funding among the four universal service programs and other possible universal service pilots or programs to expenditures where USAC projects that total disbursements will exceed the overall cap. Potential metrics of prioritization could be rurality of recipient, or cost-effectiveness based on estimates of improper payments.

Finally, the FCC seeks comment on how it can make changes to individual USF programs to better manage the overall budget, such as implementing self-enforcing caps on each program, or combining the E-Rate and Rural Healthcare caps.

BloostonLaw Contacts: Ben Dickens, Gerry Duffy, Mary Sisak, and Sal Taillefer.

Service Quality Standards for Intermediate Providers Effect July 5

On June 4, the FCC published in the Federal Register its Fourth Report and Order on the implementation of the Improving Rural Call Quality and Reliability Act of 2017 (RCC Act). As a result, the service quality standards for intermediate providers — as well as the exception to those standards for intermediate providers that qualify for the covered provider safe harbor — will be effective July 5.

First, the FCC imposed on intermediate providers a general duty to complete calls. Specifically, the FCC required intermediate providers to take steps reasonably calculated to ensure that any calls they handle are in fact completed. If an intermediate provider knows, or should know, that calls are not being completed to certain areas, the intermediate provider may be in violation of this general duty if it engages in acts or omissions that allow or effectively allow these conditions to persist. According to the FCC, nothing in this rule should be construed to dictate how intermediate providers must route their traffic, nor does the general duty to deliver covered voice communications impose strict liability upon intermediate providers who fail to complete calls.

Second, when routing traffic destined for rural areas, intermediate providers must actively monitor the performance of any directly contracted downstream intermediate provider and, based on the results of such monitoring, take steps to address any identified performance issues with that provider. According to the FCC, the monitoring obligation “entails both prospective evaluation to prevent problems and retrospective investigation of any problems that arise.” The FCC clarified that prospective monitoring “includes regular observation of intermediate provider performance and call routing decision-making; periodic evaluation to determine whether to make changes to improve rural call completion performance; and actions to promote improved call completion performance where warranted,” and that retrospective monitoring requires intermediate providers to take steps reasonably calculated to correct any identified performance problems.

Third, intermediate providers must ensure that any additional intermediate providers to which they hand off calls are registered with the FCC. However, the FCC declined to require intermediate providers to submit a certification to the FCC stating that they do not transmit covered voice communications to other unregistered intermediate providers. The FCC also declined to require intermediate providers to take responsibility for ensuring the registration status of downstream intermediate providers with which they do not share a direct relationship, as it did for covered providers.

BloostonLaw Contacts: Ben Dickens, Mary Sisak, and Sal Taillefer.

FCC Delays Performance Measures Testing Until 2020

On May 30, the FCC issued a Public Notice announcing a delay in the requirement to begin testing and reporting of speed and latency results until the first quarter of 2020. These requirements, adopted in July of 2018 in the FCC’s Performance Measures Order, originally required carriers subject to performance measures to begin testing in the third and fourth quarters of 2019 and report these results with an accompanying certification by July 1, 2020.

In light of issues raised in Petitions for Reconsideration and Applications for Review of the Performance Measures Order, however, as well as the need for additional technical development of the interfaces required, and the requirement for PRA approval, the FCC has elected to delay the requirement that carriers begin testing until the first quarter of 2020.

Carriers with questions about the broadband speed and latency testing requirements should contact the firm for more information.

BloostonLaw Contacts: Ben Dickens and Sal Taillefer.

FCC Announces Official Agenda for June Open Meeting

On May 31, the FCC issued a Public Notice announcing the official agenda for its upcoming Open Meeting, currently scheduled for June 6. At the meeting, the FCC will consider the following items:

  • Clarification of the FCC’s Call-Blocking Rules: a Declaratory Ruling and Third Further Notice of Proposed Rulemaking clarifying that voice service providers may block illegal and unwanted calls as the default before they reach consumers’ phones, and proposes a safe harbor for providers that block calls that fail call authentication while ensuring that emergency and other critical calls reach consumers. See the article below for more. (CG Docket No. 17-59, WC Docket No. 17-97)
  • Leased Commercial Access: a Report and Order and Second Further Notice of Proposed Rulemaking that would vacate its 2008 Leased Access Order, modernize the existing leased access rules to reflect changes in the video programming market, and propose to simplify the leased access rate formula. (MB Docket Nos. 07-42; 17-105)
  • Amendment of the FCC’s Rules to Promote Aviation Safety: a Notice of Proposed Rulemaking that would propose to modernize the FCC’s rules to improve aviation safety, support the deployment of more advanced avionics technology, and increase the efficient use of limited spectrum resources. (WT Docket No. 19-140)

The links included in the descriptions of these items are to public drafts that are not final and may differ from what the FCC ultimately considers.

Open Meetings are streamed live at www.fcc.gov/live and can be followed on social media with #OpenMtgFCC.

BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and John Prendergast.

Law & Regulation


Senate Introduces STREAMLINE Small Cell Deployment Act

On June 3, Senator John Thune and Senator Brian Schatz introduced the STREAMLINE Small Cell Deployment Act, which would cut costs and streamline the approval periods for small cells. Specifically, this bill amends the Communications Act to require that the regulation of the placement, construction, or modification of small personal wireless service facilities by any state or local government: (1) not unreasonably discriminate among providers of the same service using comparable equipment; and (2) only permit a state or local government to approve or deny a permit or other permission to deploy such a facility. The bill further states that a state or local government may charge a fee to consider an application for such placement, construction, or modification, or to use a right-of-way or a facility in a right-of-way owned or managed by the state or local government if the fee is: (1) competitively neutral, technology neutral, and nondiscriminatory; (2) publicly disclosed; and (3) based on actual and direct costs.

Senators Thune and Schatz previously introduced this bill in the 115th Congress. FCC Commissioner Brendan Carr released the following statement:

“I commend Senator Thune and Senator Schatz for their leadership on smart infrastructure policies. Their bill demonstrates bipartisan support for fee limits, timelines, and other reforms that are key to accelerating the buildout of 5G infrastructure in communities across the country. If passed, their work to modernize our country’s approach to small cells would notch another solid win for the U.S. in the race to 5G.”

BloostonLaw Contacts: John Prendergast and Cary Mitchell.

Comment Sought on E-Rate Petition for Rulemaking

On May 30, the FCC issued a Public Notice seeking comment on a Petition for Rulemaking filed by Central Texas Telephone Cooperative, Inc., Peoples Telephone Cooperative, Inc., and Totelcom Communications, LLC regarding use of E-Rate funding in areas with existing fiber networks. Comments are due July 1, and reply comments are due July 16.

According to the Public Notice, the petitioners “urge the Commission to initiate a rulemaking proceeding to consider amending Part 54 of the Commission Rules, specifically with respect to the Universal Service Fund (“USF”) Schools and Libraries Program (“E-Rate”) competitive bidding requirements, to include safeguards which would discourage overbuilding of existing federally supported fiber networks.” In particular, the petitioners urge the Commission to “adopt rules that prohibit the use of universal service funds for special construction of fiber networks that overbuild existing fiber networks.”

Carriers interested in filing comments or reply comments on the Petition should contact the firm for more information.

BloostonLaw Contacts: Ben Dickens, Mary Sisak, and Sal Taillefer.

Auction 103 Officially Scheduled to Begin December 10; FCC Issues Incumbent Reconfiguration Notice

On May 31, the FCC published in the Federal Register its Public Notice adopting procedures to reconfigure and modify existing 39 GHz licenses in preparation for Auction 103, an incentive auction that will offer licenses the Upper 37 GHz, 39 GHz, and 47 GHz bands. In particular, publication of the Public Notice in the Federal Register establishes an official start date of December 10 for Auction 103.

Today, the FCC released the Public Notice establishing procedures for 39 GHz incumbent reconfiguration. This Public Notice provides information for incumbent 39 GHz licensees in making an Initial Commitment with respect to their existing 39 GHz holdings. As part of the reconfiguration process, each 39 GHz incumbent will submit its selection of one of three Initial Commitment options. Each incumbent may either: (1) accept modified licenses based on the FCC’s proposed reconfigured holdings announced in Attachment 1 to this Public Notice (Option 1); (2) accept modified licenses based on an acceptable alternative reconfiguration submitted by the incumbent that is consistent with FCC requirements (Option 2); or (3) relinquish spectrum usage rights under all its 39 GHz licenses in exchange for an incentive payment and eligibility to bid on new licenses (Option 3).

The Public Notice also sets forth the timeline for remaining steps in the reconfiguration process, which will be followed by the pre-bidding process for Auction 103 and then bidding on new licenses. As noted in the timeline, existing licenses will be modified or canceled in exchange for any incentive payments after Auction 103 has concluded. The timeline of upcoming events in the reconfiguration of existing 39 GHz licenses is as follows:

Short-Form Application Instructions/Tutorial Available June 12, 2019
Short-Form Filing Window Opens July 9, 2019; 12:00 noon Eastern Time (ET)
Short Form Filing Window Closes (Deadline) July 15, 2019; 6:00 p.m. ET
Initial Commitment Guide and Tutorial Available July 11, 2019
Secure Tokens for Initial Commitment System Sent By August 6, 2019
Initial Commitment Filing Window Opens August 13, 2019; 12:00 noon (ET)
Initial Commitment Filing Window Closes (Deadline) August 15, 2019; 6:00 p.m. ET
Public Notice Announcing Spectrum Blocks Available August 23, 2019

With the above timeline, short forms for the 39 GHz auction participants will likely fall due in September or early October.

BloostonLaw Contacts: John Prendergast and Cary Mitchell.

Industry


iconectiv Selected as SHARKEN/STIR Policy Administrator

On May 30, ATIS announced its selection of iconectiv as the Secure Telephone Identity Policy Administrator (STI-PA). As the STI-PA, iconectiv will apply and enforce the rules to operationalize the SHAKEN (Signature-based Handling of Asserted information using toKENs) framework.

The SHAKEN framework is a mechanism for service providers to authenticate calls and verify the information displayed on caller ID is accurate. The STI-PA will apply and enforce mechanisms designed to ensure that STI certificates are only available to authorized service providers, and that that STI Certification Authorities (STI-CAs) perform all security functions specified to maintain the integrity of the SHAKEN framework.

As reported in a previous edition of the BloostonLaw Telecom Update, FCC Chairman Ajit Pai has been an open advocate of the SHAKEN/STIR framework, and sent letters demanding that the large carriers begin providing caller ID authentication for consumers in 2019. Chairman Pai indicated that he believes that wireless providers, interconnected VoIP providers, and telephone companies should make the SHAKEN/STIR framework a priority, and that major carriers can meet his 2019 goal.

Detailed Winning Bidder Information Announced for Auction 101 and 102

On June 3, the FCC issued a pair of Public Notices providing detailed information on the winners of Auctions 101, for 28 GHz licenses, and Auction 102, for 24 GHz licenses. Under the limited information procedures established for Auctions 101 and 102, the FCC released certain detailed Auction 101 results data remained non-public until after the close of bidding in Auction 102. With the close of bidding in the assignment phase of Auction 102 on May 28, the FCC now announces the availability of detailed Auction 101 application and bidding information that was previously withheld, including bidders’ license selections, upfront payment amounts, bidding eligibility, bids, and other bidding-related actions.

Files containing Auction 101 and 102 results are now available in the Public Reporting System (PRS), including the identities of bidders and the net amounts of bids. This information may be viewed on screen or downloaded as a comma-separated values (CSV) file. Additionally, the publicly available applications to participate in the auction (FCC Forms 175) now display the licenses that were selected by each applicant. The applications are viewable via the Auction Application Search at: https://auctionfiling.fcc.gov/form175/search175/index.htm.

Additional information includes: Auction Results by Bidder (101, 102), Bidder Payments/Refunds (101, 102), and Withdrawal/Payment Summaries (101, 102).

Deadlines


JULY 1: FCC FORM 481 (CARRIER ANNUAL REPORTING DATA COLLECTION FORM). All eligible telecommunications carriers (ETCs) must report the information required by Section 54.313, which includes information on the ETC’s holding company, operating companies, ETC affiliates and any branding in response to section 54.313(a)(8); its CAF-ICC certification, if applicable; its financial information, if a privately held rate-of-return carrier; and its satellite backhaul certification, if applicable.

BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Sal Taillefer.

JULY 1: MOBILITY FUND PHASE I ANNUAL REPORT. Winning bidders in Auction 901 that are authorized to receive Mobility Fund Phase I support are required to submit to the FCC an annual report each year on July 1 for the five years following authorization. Each annual report must be submitted to the Office of the Secretary, clearly referencing WT Docket No. 10-208; the Universal Service Administrator; and the relevant state commissions, relevant authority in a U.S. Territory, or Tribal governments, as appropriate. The information and certifications required to be included in the annual report are described in Section 54.1009 of the FCC’s rules.

BloostonLaw Contacts: John Prendergast and Sal Taillefer.

JULY 31: FCC FORM 507, UNIVERSAL SERVICE QUARTERLY LINE COUNT UPDATE. Line count updates are required to recalculate a carrier's per line universal service support, and is filed with the Universal Service Administrative Company (USAC). This information must be submitted on July 31 each year by all rate-of-return incumbent carriers, and on a quarterly basis if a competitive eligible telecommunications carrier (CETC) has initiated service in the rate-of-return incumbent carrier’s service area and reported line count data to USAC in the rate-of-return incumbent carrier’s service area, in order for the incumbent carrier to be eligible to receive Interstate Common Line Support (ICLS). This quarterly filing is due July 31 and covers lines served as of December 31, 2018. Incumbent carriers filing on a quarterly basis must also file on September 30 (for lines served as of March 31, 2019); December 30 (for lines served as of June 30, 2019), and March 31, 2020, for lines served as of September 30, 2019).

BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Mary Sisak.

JULY 31: CARRIER IDENTIFICATION CODE (CIC) REPORTS. Carrier Identification Code (CIC) Reports must be filed by the last business day of July (this year, July 31). These reports are required of all carriers who have been assigned a CIC code by NANPA. Failure to file could result in an effort by NANPA to reclaim it, although according to the Guidelines this process is initiated with a letter from NANPA regarding the apparent non-use of the CIC code. The assignee can then respond with an explanation. (Guidelines Section 6.2). The CIC Reporting Requirement is included in the CIC Assignment Guidelines, produced by ATIS. According to section 1.4 of that document: At the direction of the NANPA, the access providers and the entities who are assigned CICs will be requested to provide access and usage information to the NANPA, on a semi-annual basis to ensure effective management of the CIC resource. (Holders of codes may respond to the request at their own election). Access provider and entity reports shall be submitted to NANPA no later than January 31 for the period ending December 31, and no later than July 31 for the period ending June 30. It is also referenced in the NANPA Technical Requirements Document, which states at 7.18.6: CIC holders shall provide a usage report to the NANPA per the industry CIC guidelines … The NAS shall be capable of accepting CIC usage reports per guideline requirements on January 31 for the period ending December 31 and no later than July 31 for the period ending June 30. These reports may also be mailed and accepted by the NANPA in paper form. Finally, according to the NANPA website, if no local exchange carrier reports access or usage for a given CIC, NANPA is obliged to reclaim it. The semi-annual utilization and access reporting mechanism is described at length in the guidelines.

BloostonLaw Contacts: Ben Dickens and Gerry Duffy.

AUGUST 1: FCC FORM 499-Q, TELECOMMUNICATIONS REPORTING WORKSHEET. All telecommunications common carriers that expect to contribute more than $10,000 to federal Universal Service Fund (USF) support mechanisms must file this quarterly form. The FCC has modified this form in light of its recent decision to establish interim measures for USF contribution assessments. The form contains revenue information from the prior quarter plus projections for the next quarter. Form 499-Q relates only to USF contributions. It does not relate to the cost recovery mechanisms for the Telecommunications Relay Service (TRS) Fund, the North American Numbering Plan Administration (NANPA), and the shared costs of local number portability (LNP), which are covered in the annual form (Form 499-A) that was due April 1.

BloostonLaw Contacts: Ben Dickens and Gerry Duffy.

AUGUST 1: FCC FORM 502, NUMBER UTILIZATION AND FORECAST REPORT: Any wireless or wireline carrier (including paging companies) that have received number blocks—including 100, 1,000, or 10,000 number blocks—from the North American Numbering Plan Administrator (NANPA), a Pooling Administrator, or from another carrier, must file Form 502 by August 1. Carriers porting numbers for the purpose of transferring an established customer’s service to another service provider must also report, but the carrier receiving numbers through porting does not. Resold services should also be treated like ported numbers, meaning the carrier transferring the resold service to another carrier is required to report those numbers but the carrier receiving such numbers should not report them. Reporting carriers file utilization and forecast reports semiannually on or before February 1 for the preceding six-month reporting period ending December 31, and on or before August 1 for the preceding six-month reporting period ending June 30.

BloostonLaw Contacts: Ben Dickens and Gerry Duffy.

AUGUST 29: COPYRIGHT STATEMENT OF ACCOUNTS. The Copyright Statement of Accounts form plus royalty payment for the first half of calendar year 2019 is due to be filed August 29 at the Library of Congress’ Copyright Office by cable TV service providers.

BloostonLaw Contact: Gerry Duffy.

Calendar At-a-Glance


June
Jun. 10 – Reply comments due on 833 Toll-Free Auction Procedures.
Jun. 17 – 15-Day Tariff Filings are due.
Jun. 17 – Deadline to accept A-CAM II Offers.
Jun. 17 – Reply comments on OTARD Rule are due.
Jun. 17 – Reply comments are due on RAY BAUM’S Act Information Sharing Report.
Jun. 17 – Comments are due on Google Fiber Waiver Petition.
Jun. 18 – Reply comments are due on Location Accuracy Requirements.
Jun. 21 – Loan/grant combination applications for ReConnect Program are due.
Jun. 24 – Petitions re: 15-Day Tariff Filings are due.
Jun. 25 – 7-Day Tariff Filings are due.
Jun. 27 – Petitions re: 7-Day Tariff Filings are due (no later than noon E.T.)
Jun. 28 – Replies to Petitions re: 7-Day and 15-Day Tariff Filings are due (no later than noon E.T.)

July
Jul. 1 – FCC Form 481 (Carrier Annual Reporting Data Collection Form) is due.
Jul. 1 – FCC Form 690 (Mobility Fund Phase I Auction Winner Annual Report) is due.
Jul. 1 – Reply comments are due on Google Fiber Waiver Petition.
Jul. 1 – Comments are due on E-Rate Petition for Reconsideration.
Jul. 2 – 7-Day and 15-Day Tariff Filings are effective.
Jul. 3 – Reply comments are due on MOBILE NOW Act Implementation NPRM.
Jul. 5 – Intermediate Provider Quality Standard Requirements effective.
Jul. 12 – Loan applications for ReConnect Program are due.
Jul. 15 – Deadline for Covered Providers to Use Only Registered Intermediate Providers.
Jul. 15 – Auction 103 Short Forms are due.
Jul. 16 – Reply comments are due on E-Rate Petition for Reconsideration.
Jul. 31 – FCC Form 507 (Universal Service Quarterly Line Count Update) is due.
Jul. 31 – Carrier Identification Code (CIC) Report is due.

August
Aug. 1 – FCC Form 502 due (North American Numbering Plan Utilization and Forecast Report).
Aug. 1 – FCC Form 499-Q (Quarterly Telecommunications Reporting Worksheet) is due.
Aug. 1 – Live 911 Call Data Reports from Non-Nationwide Providers are due.
Aug. 15 – Auction 103 Initial Commitment filings are due.


Law Offices Of
Blooston, Mordkofsky, Dickens,
Duffy & Prendergast, LLP

2120 L St. NW, Suite 300
Washington, D.C. 20037
(202) 659-0830
(202) 828-5568 (fax)

— CONTACTS —

Harold Mordkofsky, 202-828-5520, hma@bloostonlaw.com
Benjamin H. Dickens, Jr., 202-828-5510, bhd@bloostonlaw.com
Gerard J. Duffy, 202-828-5528, gjd@bloostonlaw.com
John A. Prendergast, 202-828-5540, jap@bloostonlaw.com
Richard D. Rubino, 202-828-5519, rdr@bloostonlaw.com
Mary J. Sisak, 202-828-5554, mjs@bloostonlaw.com
D. Cary Mitchell, 202-828-5538, cary@bloostonlaw.com
Salvatore Taillefer, Jr., 202-828-5562, sta@bloostonlaw.com

This newsletter is not intended to provide legal advice. Those interested in more information should contact the firm.

blue line

Complete Technical Services for the Communications and Electronics Industries


Technical Services Inc.

Texas Registered Engineering Firm #F16945

“It's more than Push-To-Talk”

7711 Scotia Drive
Dallas, TX 75248-3112

Ira Wiesenfeld, P.E.

President • Principal Engineer
CETsr CA GROL IEEE LSM
WA5GXP

Cell: 214-707-7711
E-mail: iwiesenfel@aol.com
Toll Free: 844-IWA-TECH (844-492-8324)

Design  •  Installation  •  Maintenance  •  Training

blue line

LETTERS TO THE EDITOR

blue line

From: Richard Glass
Subject: Looking for work
Date: June 3, 2019
To: Brad Dye

Brad,

Been a long time!

I'm looking to do some contract/consulting work.

Have a look at my resume and see if I can stay active.

Richard B. Glass Resumé left arrow

Can you sign me up for your news letter?

Thanks,
Richard Glass
glassman1253@aol.com

blue line

From: Alan Tilles
Subject: The Wireless Messaging News for Alan Tilles
Date: May 31, 2019
To: Brad Dye

Next week — Ham Radio Operator jokes!

ALAN S. TILLES

ATTORNEY AT LAW
CHAIRMAN - TECHNOLOGY, MEDIA AND TELECOMMUNICATIONS DEPARTMENT

ATilles@shulmanrogers.com | T (301) 231-0930 | F (301) 230-2891
12505 PARK POTOMAC AVENUE, 6TH FLOOR, POTOMAC, MD 20854


A Professional Association

blue line

Current member or former member of these organizations.


Best regards,
brad's signature
Newsletter Editor
73 DE K9IQY
Licensed since 1957
Institute Electrical and
ieee
Electronics Engineers

MENSA MEMBER
mensa member
If you are curious about why I joined Mensa, click here .

A Public Library of
animated gif
Paging and Wireless Messaging
Information
Wireless
wireless logo medium
Messaging

Brad Dye
P.O. Box 266
Fairfield, IL 62837 USA

Critical Messaging
cmma
Association
European Mobile Messaging Association
emma logo
Former Board Member
ZP5TQ

Radio Club of Paraguay
Quarter Century
qcwa
Wireless Association
Back To Paging
pagerman
Still The Most Reliable
Wireless Protocol
For Emergencies!
American Association

of Woodturners
U.S. Navy

Radioman
U.S. Navy
Radioman

radioman second class
Second Class
Petty Officer
Boy Scouts of America

National Honor Society
Creator of The

Paging Wheel of Fortune
National Skeet

Shooting Association
The National

Rifle Association
American
Radio

arrl
Relay
League
The Radio Club
of America
Life is good!

I am a person in long-term recovery.

CONTACT INFO & LINKS

Skype: braddye
Twitter: @BradDye1
Telephone: +1-618-599-7869
E–mail: brad@braddye.com
Wireless: Consulting page
Paging: Home Page
Marketing & Engineering Papers
K9IQY: Ham Radio Page

Amateur Radio
K9IQY

  • ex KN9IQY, KN4BK, KM5NK, WB4JCF, ZP5TQ, WA4VXU, WA9RVL, /TI2, /9Y4, /6Y5, /KP4, HH2FJ
  • Licensed FCC Amateur Radio operator since 1957
  • Licensed FCC First-Class-Commercial Operator/Engineer since 1964
VETERAN

United States Navy

The above is just like the old men who have stickers on the rear window of their pickup trucks.

blue line

blue line

Home Page Directory Consulting Newsletters Free Subscription Products Reference Glossary Send e-mail