SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
CITIZEN
                           INFORMATION
GOVERNMENT
 CONSOLODATION                       TECHNOLOGY



                 WIRELESS
          CITIZEN SAFETY
 BUDGET                              CLOUD COMPUTING

        OPEN
                                     PUBLIC SAFETY
  BIG                       BYOD


                                             SECURITY
  DATA                      VIRTUALIZATION
                            DEVICE
                            MANAGEMENT
INFORMATION IS EVERYWHERE
GLOBAL MOBILE DATA TRAFFIC WILL GROW
NEARLY 100% PER YEAR FROM 2010 TO 20151
INFORMATION IS EVERYWHERE




BUT CAPTURING IT IS JUST THE START
GOVERNMENT NEEDS TO TURN INFORMATION
INTO INTELLIGENCE

70%
OF DEPARTMENTS ARE USING
                           72%
                           WANT TO USE VIDEO AND
SOME FORM OF PREDICTIVE    TEXT MESSAGES PROVIDED
POLICING2                  BY CITIZENS AT THE SCENE2
CHOOSE THE RIGHT BUSINESS MODEL
FOR YOUR ORGANIZATION




CUSTOMER                                                        COMMS
             CONTRACTED    HOSTED     MANAGED    BUILD, OWN,
OWNED                                                           AS A
             SERVICES      SERVICES   SERVICES   OPERATE
MANAGED                                                         SERVICE


 CAPITAL EXPENSE FOCUSED                         OPERATING EXPENSE FOCUSED
4 IN 10 GOVERNMENT LEADERS

PLAN TO INVEST IN
CLOUD SERVICES
OVER THE NEXT
TWO YEARS2

                    MISSION CRITICAL
SIMPLIFY NETWORK AND DEVICE MANAGEMENT


  NETWORK    CONFIGURATION   DEVICE




  SECURITY   PROVISIONING    BILLING




ONE INTEGRATED OPERATIONAL AND MANAGEMENT PORTAL DOES IT ALL
INFORMATION IS VULNERABLE


87%
WORRY
                            89%
                            CONCERNED
CRIMINALS HACK              WITH SECURITY OF
GOVERNMENT                  CONSUMER-GRADE
INFORMATION OVER A          DEVICES WHEN ACCESSING
PUBLIC NETWORK 2            PUBLIC SAFETY NETWORKS2
SECURING CRITICAL INFORMATION
INFORMATION ASSURANCE

CONFIDENTIALITY   INTEGRITY     AVAILABLITY
LEARN HOW TO MEET THE CHALLENGE OF
MANAGING THE COMPLEXITY




KEEP YOUR        MAXIMIZE      OPTIMIZE YOUR
SYSTEMS          YOUR SYSTEM   DEVICE AND
SECURE SO THEY   FROM START    NETWORK
ARE AVAILABLE    TO FINISH     EQUIPMENT
WHEN NEEDED
SOURCES
1.  ttp://images.erepublic.com/documents/CDG12_Trending+Up+Paper.pdf, page 32
   h

2. Motorola Public Safety Data Communications Technology Survey, January-February 2012

Weitere ähnliche Inhalte

Was ist angesagt?

MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARIUS EUGEN OPRAN
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...HackerOne
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureDavid Sweigert
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017Craig Hurst
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challengeLeonardo
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 

Was ist angesagt? (20)

MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 

Ähnlich wie Manage the Complexity

Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicCSC Australia
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions
 
Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Comms Connect
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Joseph Pindar
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldGENBANDcorporate
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
Data cloudasia2018 final
Data cloudasia2018 finalData cloudasia2018 final
Data cloudasia2018 finalWilliam Barney
 

Ähnlich wie Manage the Complexity (20)

Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
 
IBM zEnterprise: Government
IBM zEnterprise: GovernmentIBM zEnterprise: Government
IBM zEnterprise: Government
 
Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...Public safety LTE gives agencies new standards of intelligence to enhance com...
Public safety LTE gives agencies new standards of intelligence to enhance com...
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP World
 
Crowdring
CrowdringCrowdring
Crowdring
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
188
188188
188
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Comunidades e Innovación Abierta
Comunidades e Innovación Abierta Comunidades e Innovación Abierta
Comunidades e Innovación Abierta
 
Data cloudasia2018 final
Data cloudasia2018 finalData cloudasia2018 final
Data cloudasia2018 final
 

Mehr von Motorola Solutions

Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYMotorola Solutions
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillMotorola Solutions
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola Solutions
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaMotorola Solutions
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 

Mehr von Motorola Solutions (7)

Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 

Manage the Complexity

  • 1. CITIZEN INFORMATION GOVERNMENT CONSOLODATION TECHNOLOGY WIRELESS CITIZEN SAFETY BUDGET CLOUD COMPUTING OPEN PUBLIC SAFETY BIG BYOD SECURITY DATA VIRTUALIZATION DEVICE MANAGEMENT
  • 2. INFORMATION IS EVERYWHERE GLOBAL MOBILE DATA TRAFFIC WILL GROW NEARLY 100% PER YEAR FROM 2010 TO 20151
  • 3. INFORMATION IS EVERYWHERE BUT CAPTURING IT IS JUST THE START
  • 4. GOVERNMENT NEEDS TO TURN INFORMATION INTO INTELLIGENCE 70% OF DEPARTMENTS ARE USING 72% WANT TO USE VIDEO AND SOME FORM OF PREDICTIVE TEXT MESSAGES PROVIDED POLICING2 BY CITIZENS AT THE SCENE2
  • 5. CHOOSE THE RIGHT BUSINESS MODEL FOR YOUR ORGANIZATION CUSTOMER COMMS CONTRACTED HOSTED MANAGED BUILD, OWN, OWNED AS A SERVICES SERVICES SERVICES OPERATE MANAGED SERVICE CAPITAL EXPENSE FOCUSED OPERATING EXPENSE FOCUSED
  • 6. 4 IN 10 GOVERNMENT LEADERS PLAN TO INVEST IN CLOUD SERVICES OVER THE NEXT TWO YEARS2 MISSION CRITICAL
  • 7. SIMPLIFY NETWORK AND DEVICE MANAGEMENT NETWORK CONFIGURATION DEVICE SECURITY PROVISIONING BILLING ONE INTEGRATED OPERATIONAL AND MANAGEMENT PORTAL DOES IT ALL
  • 8. INFORMATION IS VULNERABLE 87% WORRY 89% CONCERNED CRIMINALS HACK WITH SECURITY OF GOVERNMENT CONSUMER-GRADE INFORMATION OVER A DEVICES WHEN ACCESSING PUBLIC NETWORK 2 PUBLIC SAFETY NETWORKS2
  • 9. SECURING CRITICAL INFORMATION INFORMATION ASSURANCE CONFIDENTIALITY INTEGRITY AVAILABLITY
  • 10. LEARN HOW TO MEET THE CHALLENGE OF MANAGING THE COMPLEXITY KEEP YOUR MAXIMIZE OPTIMIZE YOUR SYSTEMS YOUR SYSTEM DEVICE AND SECURE SO THEY FROM START NETWORK ARE AVAILABLE TO FINISH EQUIPMENT WHEN NEEDED
  • 11. SOURCES 1. ttp://images.erepublic.com/documents/CDG12_Trending+Up+Paper.pdf, page 32 h 2. Motorola Public Safety Data Communications Technology Survey, January-February 2012