Nate, Nope, they aren't readily available for you to read. Did you see that written anywhere in what I said? Did you see me publish a URL to it?
But if you would do a little legwork and reading, you'll find that indeed, the hotspots access the DPlus network and that the G4ULF repeater is accessing the G2 network. If you look back in the DSTARInfo newsletter, you'll see the announcement where the G4ULF repeater was connected to and approved by the Trust Server Team. And just because you haven't see it, doesn't mean that it doesn't exist. You should have made it to Dayton where you could have sat down with everyone and actually seen it. And there were others, besides me, at Dayton, that DID see the solutions and DID see that they exist. And a lot of this is changing on a daily basis, so what I say today, might change tomorrow. Ed WA4YIH From: dstar_digital@yahoogroups.com [mailto:dstar_digi...@yahoogroups.com] On Behalf Of Nate Duehr Sent: Monday, May 17, 2010 3:09 PM To: dstar_digital@yahoogroups.com Subject: Re: [DSTAR_DIGITAL] Re: Honest questions ..... On 5/17/2010 11:57 AM, Woodrick, Ed wrote: And while you indicate that the G2 and DPlus protocols aren't open source, they definitely have been reversed engineered and we have third party solutions talking to them now. Which ones? Where can one find information on them? Did they publish their reverse-engineering work? Are they recommended for use in the overall network? Anything interesting/useful? Enlighten us Ed. I've seen Zip/Doo-Dah/Nada from the powers that be on any 3rd party applications talking to 2nd party applications that work in the network and are recommended (or even required) to be installed by the Trust Server team. Would love to know what they are and whether they're approved for use in the network. Nate WY0X