Feeds

Majority of humans still don't have a mobile

Hello? HELLO?

3 Big data security analytics techniques

The world still has some way to go before it is fully mobile, with global subscriber penetration standing at just 45 per cent despite the huge strides made in countries such as China and India, according to a new report from industry body The GSMA.

Global penetration based on total connections will exceed 100 per cent by next year, however, the report pointed to a disparity between the number of mobile connections and individual mobile subscribers, thanks to inactive SIMs and multiple SIM ownership. The average Joe apparently uses 1.85 SIM cards.

The total number of mobile subscribers worldwide will be 3.2 billion by Q4 2012, rising to 4 billion in the next five years, with around a third of the planet’s seven billion-strong population currently unconnected, GSMA said.

Unsurprisingly, Europe was said to have the highest mobile penetration in the world, with the UK, Denmark, Finland, Germany and others averaging almost 90 per cent subscriber penetration.

The majority of Chinese still aren’t mobed up. Subscriber penetration there will grow from 43 per cent to 52 per cent over the next five years, GSMA said.

Most analyst stats point out that the majority of those that are connected in the People’s Republic use feature phones, although shipments of smartphones are apparently now in the ascendancy.

Accelerating the move to more powerful, internet-connected devices are local handset makers who are increasingly targeting these feature phone users with sub-1000 yuan (£99) devices.

In another huge mobile market, India, around half a billion people in rural areas are unconnected and growth is likely to be slow, GSMA cautioned.

Nevertheless, news that over two billion people are currently mobile-less will be welcomed by network operators and handset makers alike, even though some of these will be unable or unwilling to get connected.

“In developing markets, where there is clearly an opportunity for growth for the mobile industry, SIM per user patterns are influenced by cost-conscious, low-usage consumers who tend to accumulate prepaid SIM cards depending on the latest and most affordable prepaid tariffs,” said GSMA director general Anne Bouverot in a canned comment.

“In developed markets, SIM per user patterns are influenced by the ownership of smartphones, tablets and other devices connected to mobile broadband networks and through the wider availability of shared data plans.” ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
Google eyes business service in latest Fiber trials
Lucky Kansas City buggers to host yet another pilot program
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.