Feeds

Sony delays launch of PS3 virtual community

Far from Home

High performance access to file storage

Sony is to delay the launch of Home, its virtual community service for users of the PlayStation 3 console, until spring 2008. The service, which was originally scheduled for release this autumn, is a real-time interactive virtual world that serves as a meeting place for PlayStation 3 users.

Much like Second Life it allows individuals to create avatars to interact with others. It also enables them to play games against competitors, to shop, and to build their own personal space.

Kazuo Hirai, the new chief executive of Sony's video game business Sony Computer Entertainment, announced the delay in a keynote speech at the Tokyo Game Show.

"This is going to be a worldwide service that needs to offer a wide range of functions required in Japan, in the US, in Europe and in Asia," said Hirai. "We aim to launch this as something that can meet expectations of people all over the world."

The decision to postpone the launch of Home is yet another setback for Sony. The firm had to delay the European debut of the PlayStation 3 itself because of production issues, meaning that it came out one year after Microsoft launched its Xbox 360 console. The high cost of the PS3 and the runaway success enjoyed by Nintendo and its Wii console have has also impacted on the consumer electronics giant.

According to recent figures from Japanese analysts Nikkei Net Kansai, by the end of July, the Wii had sold nine million units across Japan, America and Germany, outdoing Microsoft Xbox 360 sales of 8.8 million during the same period despite launching a year later.

The Sony PlayStation 3 (PS3), which was launched in the US and Japan within a few days of the Wii, only sold 3.7 million units during the same timeframe. Sony is no doubt hoping the introduction of Home will enhance the appeal of the PS3 console amongst gamers.

When it does finally go live, Home will be available as a free download and will launch directly from the PS3 system's home menu.

© 2007 ENN

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.