Hi,
I am trying to understand the GSMA IMEI Database structure for Stolen Devices and also looking for the right protocol/technology to access this Database.
People who are into mobile telephony can understand what I am talking about, or they can ask me for further explanations.
Others may kindly excuse.
To my knowledge,this structure is heavily used in UK so may be someone from that country can chip-in?
People who are into mobile telephony can understand what I am talking about
Not necessarily. Just because someone has worked in mobile telecoms, why do you think they would know the structure of a database which is likely to have very restricted access?
People who are into mobile telephony can understand what I am talking about
Not necessarily. Just because someone has worked in mobile telecoms, why do you think they would know the structure of a database which is likely to have very restricted access?
Ok. Changed the subject line to make it more contextual.