View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
September 22, 2008

Motorola enhances wireless next generation architecture

Motorola has announced the addition of a real-time location solution to the wireless next generation architecture for its RF wireless switches.

By CBR Staff Writer

Motorola said that the real-time location system (RTLS) strengthens the company’s all-wireless enterprise portfolio by delivering location awareness and standards-based application programming interfaces for third-party business applications across Motorola’s indoor and outdoor wireless LAN (WLAN) infrastructure.

The Motorola wireless next generation architecture, powered by the embedded RTLS engine, is claimed to enable accurate location determination and presence detection capabilities for Wi-Fi-based devices, Wi-Fi-based active RFID tags and passive RFID tags. The solution can be deployed by small, medium and large organizations using Motorola’s full RF Switch portfolio in both indoor and outdoor environments.

Motorola’s location solution is both RF- and tag-agnostic, and includes built-in location determination algorithms that can integrate data from third-party location engines. An industry-standard application level events interface allows developers to create location-based business applications using location data.

Sujai Hajela, vice president and general manager of enterprise WLAN for Motorola Enterprise Mobility business, said: Motorola’s Wi-NG architecture with RTLS allows business applications to harness the full value of a location-aware infrastructure.

Without having to worry about RF or tag technology, wireless enterprise deployments in healthcare, manufacturing, retail and many other industries can easily leverage new business applications like asset tracking, automated workflow management, complex event processing, inventory management or location-based security on Motorola’s WLAN infrastructure.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU