The UK government has launched a £30m UK-wide competition help rural areas seize the opportunities presented by 5G technology, which offers mobile connection speeds 10 to 20 times faster than 4G.
Currently only around 67% of the country can access a good 4G signal and therefore the government are planning reforms as a means to removing current barriers whilst realising that there must also be a balance between the interests of the landowners and mobile operators.
The Rural Connected Communities competition will see up to 10 rural locations selected to run trials of 5G applications with the aim of stimulating commercial investment in 5G technology.
5G technology is already being used in the Orkney Islands to remotely monitor salmon fisheries.
In line with this the government has also launched a consultation on proposals to simplify planning rules to improve rural mobile coverage across the country.
Reforming planning laws for mobile infrastructure was a pledge made by prime minister Boris Johnson during his campaign to replace Theresa May.
He said he wanted to “level-up connectivity” for communities across the UK, further support the roll-out of 5G and boost the economy.
The consultation on potential changes to permitted development rights for mobile infrastructure in England includes proposals on changing the permitted height of new masts to deliver better mobile coverage, promoting mast sharing between mobile providers and other utilities and minimising the need to build additional infrastructure.
Currently masts on public land must be no more than 25m high but the government wants to relax these rules and so the UK could see some as tall as 50m in the future.
Other proposals include allowing building-based masts nearer to main roads to support 5G and increase mobile coverage.
The new Horizon Call Recording service will be available by the end of September. This secure and compliant recording service is custom built for Horizon and embedded within the core network, offering a reliable way to record all incoming, outgoing and internal Horizon calls.
Horizon customers will benefit from these new advancements:
New Call Recording web portal – simple and secure
Multiple access policies – different actions permitted to different user types (Admin, Supervisor, Staff user)
MiFID II compliant
Simple to use
Full encryption and secure storage, with automatic deletion at end of retention period
We are pleased to announce the launch of our bulk migration process for Vodafone and O2 voice and data and data-only SIMs.
Our process enables us to easily migrate large bases of Vodafone and O2 SIMs, subject to network approval. End-users remaining on a chosen network and moving to our services can retain their existing SIM cards. Those moving to a new mobile network will need new SIMs.
Bulk migration includes capturing information such as : PAC code(s), serial numbers / ICCID numbers, requested port dates (etc).
Our packages are available on 30-day terms, giving end-users more flexibility. SIMs are managed and monitored in Mobile Manager to review data usage.
IoT security has a poor cyber security reputation. Frequently manufacturers and IoT service providers often do not implement appropriate safeguards. Businesses and consumers typically do not change the default passwords nor update the pre-installed software. IoT security is too easy to ignore because by default its not given enough priority.
The following guidelines should be part of best practice :-
Many IoT devices are being sold with universal default usernames and passwords. The customer is expected to change the password before use. Until all IoT device passwords shall be unique and not resettable to any universal factory default value users should change passwords as a matter of cyber security policy
Software resident in internet-connected devices should be securely updateable. Updates should be actioned in a timely manner.
Store credentials and sensitive data securely
Any credentials should be securely stored within IoT services and devices. Hard-coded credentials are not acceptable in device software.
Use of open, peer-reviewed internet security standards is highly recommended.
Limit exposed attack surfaces
Security-sensitive data should be encrypted when communicating, including any remote management and control. All keys should be securely managed.
IoT device software should be verified using secure boot mechanisms. When an unauthorized change is detected, the device should alert operators to the issue. The issue notification should not connect to wider networks than necessary to deliver the alert.
Data ownership and deletion
Who owns the collected data? IoT devices may change ownership and may be recycled or disposed of. Mechanisms should be provided that allow the users if they covered by GDPR and businesses to remain in control and remove data from services, devices and applications.
EE has launched their 5G services first in the UK but we quickly learned that unless you live in a particular part of the right city there is zero use for the services.
Belfast, Birmingham, Cardiff, Edinburgh, London and Manchester are the lucky cities to be turned onto 5G from the get-go, however the lowest-priced deal is an eye watering £54 a month (plus the cost of a 5G handset).
Looking at the EE 5G coverage map over London it looks patchy at best.
Vodafone are also on the cusp of launching their services (due in a few weeks). A bit of competition can do wonders to a market, and the prices offered.
Also, the speeds delivered aren’t quite what we thought 5G would be delivering. EE has suggested that 150-200Mbps is a realistic speed to expect with 1Gbps reached at quiet times.
5G will really set to turn the dial for IoT and the connected home. The rise of the smart home, and the smart office, will provide an endless supply of opportunity in connecting ‘things’ and then providing analytics back to users to enable them to live and work more efficiently
ISDN phone lines are being completely phased out within the next few years. There has never been a better time to consider switching your communications system to more sophisticated and agile technology.
SIP Trunking Solutions explained
Session Initiation Protocol (SIP) Trunking is a way of delivering voice services over the Internet. SIP can be supported on the IP (Internet Protocol) based phone systems or we can use a Gateway to connect to legacy ISDN2e or ISDN30 telephone lines
SIP trunks are the modern alternative to ISDN.
How we can help
There are still around two million ISDN trunks in everyday use across the UK. If you’re still using them in your business it’s probably because;
Your existing PBX can’t support SIP Trunks
• It’s too costly to add to your existing PBX
• Your existing PBX does everything you need and you want to maximise your investment for as long as possible
ISIP is a range of ISDN to SIP converters which allows you to keep your current PBX, whilst providing instant access to all the benefits of SIP.
ISIP is simple to deploy – just un-plug the ISDN cables from the BT service, plug them into ISIP, connect your new SIP service and away you go. ISIP is cost-effective and available in seven different Basic Rate/ISDN 2 & Primary Rate/ ISDN 30 variants – just choose the one that matches your current ISDN trunk capacity.