Yealink has come out on top for the SIP phones for a second consecutive year with a market share of 27.3% in 2018 and also received the highest customer satisfaction rating for its VoIP phones in the SME sector.
The “Acoustic Shield” technology used in Yealink phones brings HD distraction-free voice clarity which can remove background noise; and for conference units the AI-power feature automatically detects and suppresses non-human voices to optimise conference efficiency.
The recently introduced T5 series business phones comes equipped with adjustable HD displays, supports cordless DECT handsets and provide distraction free communication with “Acoustic Shield” technology.
Yealink has developed an increased product portfolio integrated seamlessly with MS Teams, which will soon be available with the CallSwitch platform.
If its time for a telephony change then CallSwitch and Yealink combine to provide the ideal solution
Do you ever hear people complaining that “this Wi-Fi” is better than “that Wi-Fi”? that’s because not all Wi-Fi is the same! Clearly hardware makes a significant difference to the “perceived quality” of Wi-Fi but the differences are actually much more fundamental than that; relating to the design and capability of the Wi-Fi version being employed.
Wi-Fi ( a common misconception is that the term Wi–Fi is short for “wireless fidelity,” however this is not the case. Wi–Fi is simply a trademarked phrase that means IEEE 802.11) was first released for consumers in 1997 as the original 802.11 standard; and has kept evolving (improving?) with the latest “version” released this year. The issue with variation in the “perceived quality” of Wi-Fi is down to the fact that most users are not experiencing the latest version of Wi-Fi.
1999 – 802.11b – 2.4 GHz radio frequency and data transfer rates of up to 11 Mbps and a range of up to 50 meters. At the same time 802.11a was introduced (because the 2.4 GHz frequency was somewhat “crowded”) using the 5 GHz frequency with data transfer rates of up to 54 Mbps, but hardware to support 802.11a was much more expensive than 802.11b.
2003 – 802.11g – 2.4 GHz radio frequency and data transfer rates of up to 54 Mbps
2009 – 802.11n (later renamed Wi-Fi 4) 2.4 & 5 GHz radio frequency and data transfer rates of up to 300~450 Mbps. Using MiMo (multiple input multiple output) technology that uses multiple transmitters and receivers to transfer more data at the same time.
2014 – 802.11ac (later renamed Wi-Fi 5) 5 GHz radio frequency and data transfer rates of up to 433 Mbps (in fact in theory the data transfer could go into multi Gb speed ranges) using beamforming (an adaptive antenna technology by which a wireless access point (WAP) selects an optimal transmit path out of many possible options. It is fundamentally an antenna technology, combining special hardware and sophisticated software) and Mu-MiMo downstream (meaning multi user multiple input multiple output; an enhanced form of the MiMo technology that enables multiple independent radio terminals to access a system) allowing hardware to efficiently connect to multiple devices simultaneously.
2019 – 802.11ax (Wi-Fi 6) designed for high user density environments and has a data transfer rate some four times faster than Wi-WI 5; potentially in excess of 5Gb/s. Utilises 2.4 & 5 GHz radio frequency simultaneously combined with Mu-MiMo both downstream and upstream; resulting in the ability to support large volumes of mobile devices simultaneously. It is worth noting that before you rush out and buy new Wi-Fi 6 hardware that WAPs need to be connected by Cat6a or Cat7a shielded structured cabling and because Wi-Fi 6 WAPs perform highly complex signal processing they are unable to operate within the 13-watt Power over Ethernet (PoE) budget that supported earlier generation Wi-Fi implementations. New Wi-Fi 6 WAPs must be supported by either a direct DC power connection or cables and connectors compatible with 30-watt Type 2 PoE. Its also worth noting that much of the older technology relating to Wi-Fi 4 and Wi-Fi 5 still exists in Wi-Fi 6 hardware, which means older connection devices that aren’t Wi-Fi 6 compatible will still be able to use Wi-Fi 6 WAPs, albeit at the lower data transfer rates that relate to Wi-Fi 5 or Wi-Fi 4.
So what is the difference between Wi-Fi 6 and 5G mobile wireless?
5G and Wi-Fi 6 both provide faster speeds, less latency, and more capacity than (for example) 4G and Wi-Fi 5, and both use advanced technologies like MU-MIMO and beamforming.
Where the two “ wireless” technologies differ is in the envisaged use and scope of deployment
Wi-Fi 6 is essentially a wireless local area network (WLAN) technology that is meant to operate “inside” in an office, hotel, or other” crowded” multi user spaces. 5G is a wide area network (WAN) technology that is designed for “outside” use in high density mobile data, IoT applications, and other “exterior” connections.
Wi-Fi 6 is somewhat backwards compatible (as are most of the previous version) but 5G is a completely new technology that isn’t backwards compatible, which means that new hardware is needed to broadcast and receive 5G signals. Existing non-5G devices won’t be able to connect to 5G networks, even at lower speeds. That’s why even the latest iPhone 11 isn’t 5G compatible even though it gets more out of 4G than previous iPhone models.
In short; if static use Wi-Fi6 and if moving use 5G
The UK government has launched a £30m UK-wide competition help rural areas seize the opportunities presented by 5G technology, which offers mobile connection speeds 10 to 20 times faster than 4G.
Currently only around 67% of the country can access a good 4G signal and therefore the government are planning reforms as a means to removing current barriers whilst realising that there must also be a balance between the interests of the landowners and mobile operators.
The Rural Connected Communities competition will see up to 10 rural locations selected to run trials of 5G applications with the aim of stimulating commercial investment in 5G technology.
5G technology is already being used in the Orkney Islands to remotely monitor salmon fisheries.
In line with this the government has also launched a consultation on proposals to simplify planning rules to improve rural mobile coverage across the country.
Reforming planning laws for mobile infrastructure was a pledge made by prime minister Boris Johnson during his campaign to replace Theresa May.
He said he wanted to “level-up connectivity” for communities across the UK, further support the roll-out of 5G and boost the economy.
The consultation on potential changes to permitted development rights for mobile infrastructure in England includes proposals on changing the permitted height of new masts to deliver better mobile coverage, promoting mast sharing between mobile providers and other utilities and minimising the need to build additional infrastructure.
Currently masts on public land must be no more than 25m high but the government wants to relax these rules and so the UK could see some as tall as 50m in the future.
Other proposals include allowing building-based masts nearer to main roads to support 5G and increase mobile coverage.
The new Horizon Call Recording service will be available by the end of September. This secure and compliant recording service is custom built for Horizon and embedded within the core network, offering a reliable way to record all incoming, outgoing and internal Horizon calls.
Horizon customers will benefit from these new advancements:
New Call Recording web portal – simple and secure
Multiple access policies – different actions permitted to different user types (Admin, Supervisor, Staff user)
MiFID II compliant
Simple to use
Full encryption and secure storage, with automatic deletion at end of retention period
We are pleased to announce the launch of our bulk migration process for Vodafone and O2 voice and data and data-only SIMs.
Our process enables us to easily migrate large bases of Vodafone and O2 SIMs, subject to network approval. End-users remaining on a chosen network and moving to our services can retain their existing SIM cards. Those moving to a new mobile network will need new SIMs.
Bulk migration includes capturing information such as : PAC code(s), serial numbers / ICCID numbers, requested port dates (etc).
Our packages are available on 30-day terms, giving end-users more flexibility. SIMs are managed and monitored in Mobile Manager to review data usage.
IoT security has a poor cyber security reputation. Frequently manufacturers and IoT service providers often do not implement appropriate safeguards. Businesses and consumers typically do not change the default passwords nor update the pre-installed software. IoT security is too easy to ignore because by default its not given enough priority.
The following guidelines should be part of best practice :-
Many IoT devices are being sold with universal default usernames and passwords. The customer is expected to change the password before use. Until all IoT device passwords shall be unique and not resettable to any universal factory default value users should change passwords as a matter of cyber security policy
Software resident in internet-connected devices should be securely updateable. Updates should be actioned in a timely manner.
Store credentials and sensitive data securely
Any credentials should be securely stored within IoT services and devices. Hard-coded credentials are not acceptable in device software.
Use of open, peer-reviewed internet security standards is highly recommended.
Limit exposed attack surfaces
Security-sensitive data should be encrypted when communicating, including any remote management and control. All keys should be securely managed.
IoT device software should be verified using secure boot mechanisms. When an unauthorized change is detected, the device should alert operators to the issue. The issue notification should not connect to wider networks than necessary to deliver the alert.
Data ownership and deletion
Who owns the collected data? IoT devices may change ownership and may be recycled or disposed of. Mechanisms should be provided that allow the users if they covered by GDPR and businesses to remain in control and remove data from services, devices and applications.