Feeds

HTC and O2 split over XDA future

Carrier seeking new suppliers for smart-phone line

High performance access to file storage

UK carrier O2 this week confirmed it is looking for new handset maker partners to push its XDA smart phone family forward following a parting of the ways with its original XDA supplier, HTC. Long-time HTC customer i-mate may also be for the chop, if comments from the manufacturer are to be taken at face value.

It was the Taiwanese manufacturer that effectively signalled the break earlier this week. A senior executive with the company's Dopod subsidiary, Prim Krithivasan, told Cnet Australia: "O2 doesn't have the relationship [with HTC] anymore... [and] going forward the HTC relationship won't extend to i-mate."

Krithivasan's comments came a day after O2 Germany announced two new XDAs, both made by HTC: the XDA Cosmo and the XDA Orbit.

Two weeks ago, i-mate launched its Jaq smart phone, the company's first device not designed and manufactured by HTC. The Jaq is believed to be made by Inventec.

O2 wouldn't say when its relationship with HTC came to an end, or which of them initiated the break. Instead, a company spokeswoman put a brave face on the split, stressing instead the opportunities the carrier hopes to leverage to work with fresh new partners going forward.

Still, it's a blow for the company's XDA efforts, which have relied almost entirely on HTC's device development savvy since the range was introduced in June 2002. Indeed, O2 was HTC's first European carrier partner.

O2 may turn to Quanta for future XDAs. The Taiwanese manufacturer already produces the XDA Atom for O2's Asian subsidiary, though the device has never made it to O2's European heartland.

HTC has been looking to strengthen its own name in the smart phone market for more than a year now, but the plan gathered further momentum in June this year when the company re-launched itself with a more consumer-friendly brand. It also acquired a big but undisclosed stake in Dopod, another of its many handset supplier customers which include carriers Orange, Vodafone, T-Mobile as well as O2 and i-mate. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.