Payment & Shipping Terms:
|Button:||Touchable Interface , No Physical Buttons||Sound Pickup:||Heart Type Capacitance|
|Display:||OLED Display 128 × 32||Sensitivity:||-46 DBV / Pa|
|Operating Temperature:||0 ℃ To + 55 ℃||Color:||Black|
wireless meeting microphone system,
wireless table microphone
Wireless Conference Microphone High Speed 5G WiFi Microphone For Meeting Room
- Keep your desk clean and tidy without any cables
- Wireless conference system and wireless presentation system provide convenient local audio and video access solutions
- One-click quick sharing experience, allowing attendees to pay more attention to the meeting itself
-60CM ultra-long sound pickup distance
- Possible to achieve efficient meetings.
|Button||Touchable interface, no physical buttons|
|Sound Pickup||heart type capacitance|
|Display||OLED display 128 × 32|
|Sensitivity||-46 dBV / Pa|
|Maximum power consumption||2.0W|
|Directivity||0 ° / 180 °> 20 dB (1 kHz)|
|Headphone jack||3.5mm stereo|
|Frequency response||20 ~ 20000Hz|
|Equivalent noise||20dBA (SPL)|
|Operating temperature||0 ℃ to + 55 ℃|
|The maximum sound pressure||125dB (THD <3%)|
|Weight||1.1kg (with microphone)|
Can I run multiple systems in one building or on the same floor?
With a multi-band wireless system that works in the 2.4GHz and 5GHz bands, you have 25 channels to choose from (in Europe). So you can set each system up to work on a different channel, so that one doesn’t interfere with the other. Our quick selecting menu on each unit even allow you to move freely the unit from one room to another room to use.
How Can I guarantee the confidentiality of the meeting?
It goes without saying that security is an important issue and should not be treated lightly. But consider this: if you make the right choice, anyone trying to listen in on your meeting would have to leap three major hurdles. The first is proprietary protocol. If the eavesdropper does not have the same type of equipment, he will have to figure out first how the communication protocol works before he can start decoding information. Then there is the access list – a list of identified and trusted units that are part of your conference system. This access list is stored in the system and used to verify whether a unit is allowed to be part of the system. A rogue unit that tries to connect will be rejected because its unique identifier is not in the list of trusted units. Finally, encryption. By using our system, all communication between the delegate units and the Wireless Conference Access point will be secured with an encryption key. With these security measures in place, unauthorized eavesdropping is virtually impossible.
Contact Person: VISSONIC