Internode Blog

The evolution of the mobile phone

Wednesday, October 20th, 2021 by

Can you believe it’s been nearly fifty years since the invention of the mobile phone? It’s true! A prototype mobile handset developed by Motorola was used to make the world’s first mobile phone call in 1973 – they called one of their competitors to let them know the good news.

However, while mobile phones existed way back in the 70s, it would be a long time before the average person owned one! In Australia, the earliest mobile network wasn’t built until 1981 with just three 500MHz base stations operating out of Melbourne, and 2G mobile networks didn’t roll out in capital cities until 1993. It’s fair to say that mobiles have gotten pretty popular in the decades that followed, with 75.8% of Aussies owning a smartphone as of 2017.

Let’s take a walk down mobile memory lane and find out how our handsets got to be the way they are today.

(more…)

15 podcasts to binge this spring

Tuesday, September 28th, 2021 by
Man with headphones looks at his tablet

The morning commute, making dinner, weeding the garden – we all have chunks of time in our week when our eyes are occupied but our mind is on autopilot.

While ‘doing nothing’ is far from a bad thing (in fact, there is even a Dutch practice called ‘Niksen’ which calls upon people to be idle in order to combat burnout) it’s sometimes nice to learn something new as you go about your daily schedule.

If you’re nodding your head to what we’re saying, you’re in luck – we’ve put together a list of 15 podcasts to add to your listening rotation this spring.

(more…)
Post tags: ,

How to spot scams

Tuesday, September 21st, 2021 by

So far this year, over $190 million has been lost to scams and hoaxes. The most common method of attack is a practice called Phishing.

Not to be confused with the leisurely pastime of catching fish, “phishing” works by luring people to give out their important personal information, such as account passwords or payment details, to use in fraud and theft.

The typically done by pretending to be a trusted, well-known company in an attempt to trick you into supplying personal information, visiting fraudulent websites or installing malicious software on your devices.

We’ve put together some handy advice to help you stay protected.

(more…)
« Newer Posts   Older Posts »