Feeds

RIM's growth to 'outstrip Apple'

BlackBerry demand looks set to continue

High performance access to file storage

Reg Technology Panel A little while ago, a Reg Reader poll seemed to indicate that the Microsoft threat was going to clip the wings of RIM in the enterprise mobile messaging and applications space.

At that time, RIM was still suffering the effects of a legal spat over alleged patent infringements, and we were picking up a lot of anecdotal feedback from various vendors and service providers supporting the view that RIM's dominance was coming to an end.

Maybe some of this was wishful thinking on the part of those who complain about the BlackBerry business model, in which RIM has held its own with the mobile operator community and generally maintained its position at a premium price point across the market as a whole.

However, as RIM continues to stride ahead off the back of a string of new product releases (see here, here and here), there are no indications of a slowdown in its business.

In fact, in a research note we just received from TD Newcrest (a division of TD Securities Inc), financial analyst Chris Umiastowski said: "RIM's expected growth is far higher than Apple's. We are aware that many investors look to Apple as a comparable 'growth' company to RIM. Exhibit 2 shows that RIM appears to be outgrowing Apple significantly."

Here is Chris' chart to illustrate the point:

And there appears to be no shortage of evidence that the BlackBerry is still in demand – just look around you on any commuter train and there'll usually be someone tapping into a BlackBerry within a few rows of where you are sitting.

With all this in mind, we thought it was time for another check of what's going in readers' organisations with regard to mobile email use, and other forms of mobile solutions. So, if you have a few minutes, we'd be grateful if you could let us know about your own activities and plans in our latest mobile barometer survey here. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.