Kindle Fire dominates US Android tablet sales
- 28 April, 2012 10:21
Never underestimate the power of a cheap, well-marketed tablet like Amazon's Kindle Fire. According to Comscore, the Kindle Fire accounts for 54.4 percent of Android tablets sold in the United States.
No other Android tablet comes close in Comscore's figures. Samsung's entire Galaxy Tab lineup only has 15.4 percent of the Android market. Motorola's Xoom -- the first Android tablet on the market -- has only a 7 percent share.
But the numbers are skewed for one big reason: Barnes & Noble's Nook Tablet and Nook Color are omitted from the measurements. Comscore considers those Nooks to be e-readers, not tablets -- even though they run apps, browse the Web, and play music and video on full color displays, just like the Kindle Fire.
Barnes & Noble would likely capture a sizable share if its slate was included. Before the Kindle Fire launched last year, the Nook Color was the second best-selling tablet on the market, behind Apple's iPad.
In any case, Comscore's numbers confirm what most tech watchers already assumed: Android tablets owe most of their success to the Kindle Fire and presumably the Nook tablets, which use heavily modified versions of open-source Android. Their interfaces are designed around simple media consumption, and their pricing starts at just $200, making them safe, low-budget alternatives to the iPad. A study from January found that Android's tablet share tripled to 39 percent in the fourth quarter, when Amazon and Barnes & Noble launched their tablets.
The success of the Kindle Fire and Nook tablets likely vexes Google, because its own app store and content services aren't available on those devices. Google is now trying to bolster its own ecosystem by re-branding it as "Google Play," and will likely launch its own low-cost, 7-inch tablet this year.
That may be Google's best hope at gaining ground, because no Android tablet that's taking on the iPad directly is getting any traction.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Tablet Competition Heats Up: Kindle Fire Captures more than Half of Android Tablet Market - comScore, Inc
- Barnes & Noble Launches Nook Tablet
- Android's Tablet Share at 39 Percent as Sales Triple, Says Study : PCWorld
- Google Targets Budget Tablets, CEO Says : PCWorld
- Jared Newman - Google+
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.