RIM delays BlackBerry 10, reports plummeting sales
- 28 June, 2012 21:23
Research In Motion is delaying the launch of its BlackBerry 10 operating system due to delays in completing the software.
BlackBerry 10, the next major upgrade to its OS, was due sometime before the end of the year but now won't see a release until the first quarter of 2013, the company said.
The delay was announced as RIM reported sharply lower revenue and a loss for the March-to-May quarter. Revenue was $US2.8 billion, down from $US4.9 billion a year earlier. The company reported a net loss of $US518 million against a profit of $US695 million a year earlier.
Also on Thursday, RIM announced it would eliminate abouty 5000 jobs as part of an ongoing restructuring. The layoffs will take place over the next nine months, the company said.
The results did not come as a total surprise. The Canadian smartphone maker said in May that it would probably post an operating loss for the March-to-May quarter, but at the time it didn't hint at how steep the drop off in business would be.
RIM's poor performance is largely due to the competitive market for smartphones.
The company is being squeezed by Apple, Google and Microsoft, all of which are wooing consumers and business users with upgrades to their phone operating systems.
One of the results of this has been a sharp drop in sales of new RIM devices. During the quarter, shipments of BlackBerry smartphones dropped by almost half to 7.8 million units.
With the BlackBerry 10 software delayed, RIM will now have to work harder convincing users that it's worth putting off the purchase of a new phone and sticking with BlackBerry until its software is ready.
"I am confident that the first BlackBerry 10 smartphones will provide a ground-breaking next-generation smartphone user experience," said Thorsten Heins, RIM's president and CEO, in a statement.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- IBM WebSphere MQ: The Right Information in the Right Place and Time
- Analyst Paper - The Total Economic Impact To IBM WebSphere Application Server Migrating From An Open Source Environment
- Expanding Your Gross Margin in Distribution
- Reputational Risk and IT
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.