The cost of talking

November 2001 Infrastructure

Organisations worldwide are implementing drastic cost-saving measures, such as pay and staff cuts, to counteract the current global economic slump.

However, many still overlook one of the more costly areas within their operations: communications. A common problem is that of using mobile phones when relatively inexpensive two-way radio technology can be substituted

According to Nik Patel, Business Manager for Motorola CGISS Middle East and Africa, many companies are ringing up unnecessarily high communications bills because they view two-way radio as an antiquated technology that lacks functionality and has no place in today's hi-tech world. To prove this point, Motorola commissioned a survey by BMI-TechKnowledge to investigate the levels of awareness and identify the cost of talking among some large industry players.

"Of the 20 nonuser companies interviewed, only a third had done a cost comparison between two-way radio and cellular telephony. The number of cellular phones per company averaged 151," remarks Patel. "If you then look at the average monthly cellular costs, it amounts to R71 130 per company (an average cost of R470 per user). Compare this to the companies using two-way radios (where the average number of two-way radios was 529 per company) that had an average monthly cost of R47 000, which works out to R89 per user per month."

Referring to the tables, we see that Company R (Table 1), for example, has 500 cellphone users and pays an average of R250 000 per month. Company G (Table 2) has 500 two-way radio users and pays R1250, thus saving R248 750 per month.

Company O (Table 1) has 100 cellphone users, which costs R25 000 on average each month. Compared to Company H (Table 2), which has 100 two-way radio users and pays an average of R1000 per month, Company O pays an additional R24 000 each month. So, the more users you have, the greater the saving with two-way radio technology.

Table 1. Nonusers of two-way radio
Table 1. Nonusers of two-way radio

Table 2. Two-way radio users
Table 2. Two-way radio users

The reason two-way radio is such a cost-effective communication tool is the fact that users pay a once-off fee for setting up the network, which can include base stations, repeaters, accessories and handsets.

After this, they only pay an annual licence fee which depends on the number of frequencies used, repeater sites and number of handsets. So while the initial outlay may be higher than that for cellphones, the real saving comes from the absence of monthly call charges. Two-way radio users do not pay for the cost of a call, whereas cellular users pay a monthly contract fee and a fixed rate per unit per call."

While two-way radios do limit communications to pre-determined talk groups, and therefore do not allow users access to people who are not on the network, they are the ideal communications technology for group communication on site. Unlike cellular phones, the average range of a two-way radio is 2 km for a portable and 20 km for a mobile radio operating on line-of-site. However, this can be extended significantly using repeaters to create a local area network.

"We are not advocating the replacement of all cellular phones with two-way radios because they are two very specific technologies," says Patel. "We are saying that in certain environments two-way radios are a more effective, efficient and economical alternative.

"With features such as emergency signalling that sends a help signal to a pre-defined person or group of people; a lone worker function, which causes the radio to enter emergency mode if the user fails to respond to a warning signal; alphanumeric phonebooks, call forward, voice messaging and missed call alerts, the two-way radios available today have far more functionality than their cumbersome predecessors," he concludes.

For further details contact Nik Patel, Business Manager, Motorola CGISS on tel: (011) 800 7800.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.