Research found that on a 2G network the cheaper handsets were much better at picking up weak signals compared to newer smartphone handsets. Rungroj Yongrit / EPA
Research found that on a 2G network the cheaper handsets were much better at picking up weak signals compared to newer smartphone handsets. Rungroj Yongrit / EPA

Smartphones from Apple and Samsung ‘not as good as mobiles from a decade ago’



Today’s top of the range smartphones are not as good for basic communications as the mobile devices available a decade ago, new research has revealed.

The Daily Telegraph on Wednesday quoted a study commissioned by UK telecoms industry regulator Ofcom that has found that despite the new technology included in the latest smartphones from manufacturers including Apple and Samsung, devices costing much less typically offer better signal performance for voice calls and texts.

Although Ofcom refused to reveal how each manufacturer's devices performed specifically, the research, "conducted in controlled lab conditions on a selection of popular smartphones and non-smart phones currently on the market, found that on a 2G network the cheaper handsets were much better at picking up weak signals", The Telegraph reported. Some smartphones require a minimum signal 10 times stronger than the best non-smart phone before they can make or receive a call, according to Ofcom's research. The research also found smartphones performing below international standards for mobile broadband signal performance.

An Ofcom spokesman told The Telegraph: "we tested a very small number of mobile phones, not for ranking but to understand how handsets performed in different situations. As no one device consistently outperformed the others we chose not to list the handsets."

The results of the survey from the UK telecoms regulator come as an increasing number of residents in the UAE switch to the latest smartphones.

According to data released in October by the Telecommunications Regulatory Authority, the most popular smartphone in the country in the second quarter of this year was the Apple iPhone 6 with market share of 4.9 per cent. Prices for the device start at Dh2,199 in the UAE. The TRA said that 67 per cent of handsets registered on the UAE’s networks during the second quarter were smartphones, “a figure that has been constantly increasing over time”.

“For the first time, the 3 most commonly used handsets in the UAE in Q2-2015 were smartphones,” the TRA said. “The market shares of the most popular feature phones including 105/1050, Nokia 101/1010, Nokia X1, E5, and 1280/1282 declined during the last 3 quarters.”

business@thenational.ae

The%20US%20Congress%2C%20explained
%3Cp%3E-%20US%20Congress%20is%20divided%20into%20two%20chambers%3A%20the%20House%20of%20Representatives%20and%20Senate%3C%2Fp%3E%0A%3Cp%3E-%20435%20members%20make%20up%20the%20House%2C%20and%20100%20in%20the%20Senate%3C%2Fp%3E%0A%3Cp%3E-%20A%20party%20needs%20control%20of%20218%20seats%20to%20have%20a%20majority%20in%20the%20House%3C%2Fp%3E%0A%3Cp%3E-%20In%20the%20Senate%2C%20a%20party%20needs%20to%20hold%2051%20seats%20for%20control%3C%2Fp%3E%0A%3Cp%3E-%20In%20the%20event%20of%20a%2050-50%20split%2C%20the%20vice%20president's%20party%20retains%20power%20in%20the%20Senate%3C%2Fp%3E%0A
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20Hoopla%3Cbr%3E%3Cstrong%3EDate%20started%3A%20%3C%2Fstrong%3EMarch%202023%3Cbr%3E%3Cstrong%3EFounder%3A%3C%2Fstrong%3E%20Jacqueline%20Perrottet%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%3C%2Fstrong%3E%2010%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3EPre-seed%3Cbr%3E%3Cstrong%3EInvestment%20required%3A%3C%2Fstrong%3E%20%24500%2C000%3C%2Fp%3E%0A
Disclaimer

Director: Alfonso Cuaron 

Stars: Cate Blanchett, Kevin Kline, Lesley Manville 

Rating: 4/5

COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20Alaan%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202021%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Parthi%20Duraisamy%20and%20Karun%20Kurien%3Cbr%3E%3Cstrong%3ESector%3A%3C%2Fstrong%3E%20FinTech%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%3C%2Fstrong%3E%20%247%20million%20raised%20in%20total%20%E2%80%94%20%242.5%20million%20in%20a%20seed%20round%20and%20%244.5%20million%20in%20a%20pre-series%20A%20round%3Cbr%3E%3Cbr%3E%3C%2Fp%3E%0A
Nayanthara: Beyond The Fairy Tale

Starring: Nayanthara, Vignesh Shivan, Radhika Sarathkumar, Nagarjuna Akkineni

Director: Amith Krishnan

Rating: 3.5/5

Our legal consultant

Name: Dr Hassan Mohsen Elhais

Position: legal consultant with Al Rowaad Advocates and Legal Consultants.