Feeds

Apple sells more mobile PCs than Dell

But only if the iPad is a mobile PC

High performance access to file storage

Apple is now a more successful global seller of mobile computers than Dell, according to new third-quarter numbers from market watcher DisplaySearch.

The catch: it has to include iPad sales to do so.

According to DisplaySearch, Apple shipped 6.3m mobile computers - media tablets, laptops and netbooks, basically - in Q3 2010. Dell came in just behind it with shipments of 6.1m units.

Those figures give the two firms respectively 12.4 per cent and 11 per cent of the world mobile PC market.

Ahead of them both were HP - 9.5m units, 17.3 per cent market share - and Acer - 9.1m units, 16.5 per cent share. Toshiba came in fifth place, shipping 4.3m mobile computers for an eight per cent share of the market.

Q3 2010 Global Mobile Computer Shipments

DisplaySearch Q3 2010 mobile PC sales

Source: DisplaySearch

The top five brands account for 65.2 per cent of the total mobile PC market, said DisplaySearch, as punters increasingly want to buy machines from companies they have heard of.

DisplaySearch reckons the iPad alone accounted for eight per cent of all mobile computers shipped in Q3, matching Toshiba's four-odd million units. Take those out of the equation and Apple's share for the quarter falls to 4.8 per cent, putting it in eighth place.

The question is, then, do you count the iPad as a computer? Fans will say yes, anti-fans will say no. Folk with a less polar viewpoint will say, 'probably'.

If you define a personal computer as "an electronic device for storing and processing data" (New Oxford American Dictionary) or as "a programmable machine that receives input, stores and manipulates data, and provides output in a useful format" (Wikipedia) then you have to allow that the iPad is a computer.

Of course, you also have to allow that almost every smartphone is a computer too, which would up Apple's market share further and bring Nokia into the frame. Sellers of Android phones probably don't ship enough of them to make the top five individually, despite the Google OS' strength as a platform. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.