Feeds

One billion PCs in use in 2008

Landfill operators of the world, rejoice!

3 Big data security analytics techniques

There will be over one billion PCs in use worldwide by the end of 2008, according to a new report by Forrester Research.

And with PC adoption in emerging markets growing fast, there will be more than two billion PCs in use by 2015, Forrester predicts.

It took 27 years to reach the one billion mark, but Forrester expects the rate of PC adoption to accelerate dramatically due to advancing technology, lower prices and global demand on the part of a technology-aware population.

According to Forrester, the emerging Brazil, Russia, India, and China (BRIC) market will account for more than 775 million new PCs by 2015.

"There is nothing more important to the long-term health of the technology industry and personal technology in particular than the ability to deliver relevant, accessible and affordable technology to the billions of people worldwide who have not been exposed to it," said Simon Yates, Forrester Research vice president and research director.

"The industry can probably survive selling incrementally better hardware and software to the people who already have technology in their lives, but the vast majority of growth in the PC and related industries will come from emerging markets," said Yates.

Forrester forecasts an acceleration in growth but also unpredictability in emerging markets. Vendors, it notes, are used to the predictability of buyers in mature markets, but high-volume launches into emerging markets are risky. According to Forrester, PC sellers won't have the luxury of introducing products on a small scale to test the market before going into full production because the economics will force suppliers to focus on bringing volume to market more quickly at much greater risk.

"There are risks. It is safe to assume that life cycles will be longer in emerging markets. Vendors, accustomed to mature markets where the average life cycle is between four and five years, will need to have a deep understanding of how to work in these markets and, with less of a market for replacement PCs, will need to band together to scale production for these emerging regions," said Yates.

Forrester praises Microsoft Unlimited Potential, the Intel World Ahead Program, AMD 50x15, and OLPC for their efforts in reaching untapped markets. Its findings are contained in a report entitled Worldwide PC Adoption Forecast to 2015.

© 2007 ENN

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.