Feeds

RIM reports middling results

4.5 million new friends? Meh

3 Big data security analytics techniques

BlackBerry maker RIM has reported decent second quarter results, albeit with disappointment on some fronts.

Reporting on its second 2010 quarter (pdf), RIM said net income was up and it had shipped more than 12 million handsets, though a proportion of those will be languishing on shop shelves.

More importantly it had indoctrinated another 4.5 million people into the BlackBerry way of life: disappointing only because it had hoped to recruit five million over the same period.

A net income of almost $800m is a distinct improvement on the same period last year, when the company brought in less than $500m. Almost half that income coming from outside North America these days too. Revenues were up 31 per cent to $6.62bn.

Much of the credit goes to the BlackBerry Torch, not because it's revolutionary but because it's good enough to placate corporate souls overwhelmed with jealousy engendered by their iPhone-wielding peers. Executives demanding the right to use their own handsets are a significant risk to RIM, and the Torch (the most successful BlackBerry ever) has gone a long way to mitigate that risk.

But it's not just shiny iOS/Android handsets that have been chipping away at RIM - the company has been a victim of its own encryption with users in India, UAE and Saudi Arabia switching handset for fear of government-mandated disconnection (a fear that was realised in Saudi, if only for a day or two). Governments have great difficultly intercepting BlackBerry communications, and RIM only has a month left to sort out lawful access before the threat of national bans returns.

RIM offers great bravado - confident that it can placate governments, and that its handsets will come to eclipse the competition. The markets seem to agree that RIM is on the up with shares rising more than four per cent on the results, though we'll be waiting to see the proposed lawful-interception technology before making any bets. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE & Vodafone will let you BONK on the TUBE – with Boris' blessing
Transport for London: You can pay, but don't touch
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
Google eyes business service in latest Fiber trials
Lucky Kansas City buggers to host yet another pilot program
Huawei exec: 'Word of mouth' will beat Apple and Samsung in Europe
World Mobile Telephone Factory No.3 won't fling the big bucks around just yet
Brazilian president signs internet civil rights law
Marco Civil bill enshines 'net neutrality', 'privacy' as law
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.