Feeds

Japan's top-selling mobile: iPhone 3GS

Apple cracks 'difficult' market?

Business security measures using SSL

The iPhone 3GS was the top-selling mobile phone in Japan last month, figures from market watcher GfK show.

The Japanese mobile market is very different from those in the West. Over there, mobile net access has long been taken for granted, local phone makers are favoured and Japanese definitions of what makes a good handset don't match up with Westerners' ideas.

The list of top-ten phones contains only one brand we over here would consider major: Sony Ericsson. Nokia, Samsung, Motorola, LG and HTC don't make the list at all.

So it's a testament to the iPhone UI that Japanese buyers lifted it above popular offerings from Sharp, Panasonic, NEC and Casio.

The best-selling phone was the 32GB 3GS - the 16GB model came in ninth place. GfK said the 3GS sold twice as quickly as the 3G did last year.

Still, July was the 3GS' launch month and may have coincided with a general downturn in Japanese handset sales. Further months figures will be required to see whether Apple's success was a one-off or is a sign that it has become a major player in Japan. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.