Feeds

Tiny transforms into e-business

Tiny.com to go live on 20 Feb.

  • alert
  • submit to reddit

Tiny Computers has relaunched itself as Tiny.com, the UK PC maker said today. And the new, web-based operation has set itself the goal of winning over ten per cent of the UK home PC market by this time year.

In a move that harks back to the dotcom fever of the late 1990s, when businesses of all kinds dashed to append their trading names with a domain name, Tiny will become a web-based operation. Its site will be "open for business and fully functional" on 20 February.

However, the company will continue to take telephone orders for the time being, it admitted.

"Tiny.com will continue to offer a telephone advice service and take orders by telephone but our long term goal is to get customers to order on-line," said general manager Brian Boys.

The company plans to use both channels to shift 150,000 home PCs in the next 12 months, it said. If it manages to do so, it will gain almost ten per cent of the home PC market, it claimed.

Once the largest UK PC manufacturer, Tiny collapsed in January 2002 and was acquired shortly afterward by the Granville/Time Group, owner of the Time Computers, Tiny's chief rival. ®

Related Stories

Tiny Computers = big losses
Time rescues Tiny

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.