Feeds

World+dog keep taking the tablets

Shipments to exceed 80m

Security for virtualized datacentres

Annual shipments for tablet devices will reach 81 million by 2015, as new players and handset manufacturers flood the market.

Competition to Apple is likely to arrive in earnest in 2011, according to the market watcher Juniper Research. But Apple should be prepared for the challenge and ready to launch a new version of the iPad.

Juniper says long-established handset manufacturers face considerable obstacles, with RIM, Nokia and Microsoft most affected.

These companies have all developed new operating systems but have been slow to bring them to market, allowing Apple to cement its position and enabling Android to become the operating system of choice for new players.

Griffiin Elan Sleeve

Pad it out...

Other Juniper findings include:

  • Apple will maintain its market lead, at least for the medium term.
  • Android will continue to be adopted by new entrants, but products using the BlackBerry QNX, Window Phone 7 and MeeGo will also appear in 2011.
  • The netbook market may suffer as a result.

More details can be found at the Juniper Research website. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.