Feeds

Palm cuts developer PDA prices by up to 40%

Unsold stock mountain

  • alert
  • submit to reddit

High performance access to file storage

Palm is attempting to clear its huge inventory of unsold PDAs by flogging them off at a huge discount to developers, according to an email seen by The Register.

Devices are available for up to 40 per cent off their standard price.

Of course, the PDA pioneer spins it as a "thank you" for all those applications third-party coders have come up with, but since the offer doesn't extend to Palm's new m500 and m505 models, it's seems pretty clear to us that the company has an ulterior motive. Certainly, those machines, with their SDMC add-in slot, new peripheral connector and other refinements, will be high on developers' shopping lists - higher, at any rate, than the older PDAs.

The discounts are significant. The IIIc, Vx and VIIx are all available at 40 per cent off, while the consumer-oriented m100 and m105 have had 35 per cent knocked off their retail price.

PDA Discount (%)    Price
m100    35 $88.85 (£62.57)
m105 35 $129.35 (£91.09)
IIIc 35 $179.40 (£126.34)
Vx 35 $179.40 (£126.34)
VIIx 35 $119.40 (£84.09)

Still, Palm doesn't want to lose too much money on the deal - the offer ends on 31 August and is limited to three machines per developer.

Oh, and non-US developers can pretty much get stuffed, as far as Palm is concerned, it seems. Says the rather po-faced Palm Developer Web site: "Palm, Inc. currently does not have a hardware discount program for our International Palm Alliance Members."

But what else can Palm do to erode the unsold PDA mountain? Our suggestions, culled from a brainstorming meeting in our palatial executive boardroom.... er... lounge bar at the Old Monk include:

  • The construction of a 9km-high wall around Washington, DC to protect the city from ballistic missile attack.

  • Fuel for the new power plants California so desperately needs.

  • Anti-flooding construction material (applicable to US and UK markets...)

  • Seeded in the upper atmosphere to block harmful UV radiation and thus patch the Ozone Layer. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.