First commercial GSM call marks 20-year milestone
- 02 July, 2011 01:39
On June 1, 1991, the first commercial calls over GSM were made in Finland and Sweden, Nokia Siemens and Ericsson noted Friday as they celebrated the anniversary by recollecting the early days of the technology.
In Finland, former prime minister Harri Holkeri called Kaarina Suonio, vice mayor of the city of Tampere, from Helsinki and spoke about how good the new technology was: "it is like speaking to a neighbor," Holkeri said.
On the other side of the Gulf of Bothnia a more low-key event took place. Late in the afternoon, Ericsson's Jan Wäreby -- who still works at the company and heads up sales and marketing -- and Yngve Zetterström, Televerket's (now TeliaSonera) GSM project manager called Tony Hagström, general director at Televerket, Wäreby recalls in the book Changing the World.
In Copenhagen, Ericsson also demonstrated GSM for the Danish telecom authority.
Like today, competition between vendors was cutthroat.
However, one thing all involved in the early days of GSM agree on is that they, back then, couldn't imagine the immense popularity the technology would eventually enjoy.
They knew GSM would be big, but not as big as it is today, according to Wäreby. Few even dared to dream about the future, Timo Ali-Vehmas, vice president of compatibility and industry collaboration Nokia, said.
Twenty years later, the technology covers 80 percent of the world's population, according to the GSM Association. Today's 838 GSM networks in 234 countries and independent territories around have more than 4.4 billion subscriptions, and another million subscriptions are added every day, according to industry organization Global mobile Suppliers Association.
Base stations and mobile phones have evolved enormously since the beginning of the nineties. The Nokia 1011, which arrived in 1992, weighed 475 grams, almost 4 times as much as the Samsung Galaxy S II, which comes in at 116 grams.
On the network side, base stations have increased their scalability from about 600 voice subscribers per site to 60,000 voice subscribers, according to Ericsson.
However, one thing that heavy users of today's smartphones can relate to was the need to constantly charge their phone. Though battery life is longer now, frequent mobile phone callers still must charge their devices every day.
Send news tips and comments to email@example.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
- Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
- Advanced Persistent Threats and Real-Time Threat Management
- Mobility Apps: What every developer should know
- Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!