Feeds

iPhone outlook goosed to 21m for early 2011

With a hefty dollop of CDMA sauce

High performance access to file storage

The iPhone juggernaut shows no signs of slowing down, with Apple boosting production of its money-minting smartphone from a previously planned 19 million to a cool 20 to 21 million in the first calendar quarter of 2011.

That's the word from "Taiwan-based component suppliers", as reported by the market-watchers at DigiTimes on Monday. Of those 20-21 million units, the report contends that five to six million will be CDMA phones, set to launch in North America and Asia in that first quarter.

According to Apple's 2010 annual report, filed after the company's fourth fiscal quarter that ended on September 25, iPhone sales grew from 11.6 million in 2008 to 20.7 million in 2009, a 78 per cent increase, and then to 40 million in 2010, a 93 per cent jump.

During the conference call with reporters and analysts that accompanied Apple's announcement of its fourth-quarter successes, CEO Steve Jobs noted that iPhone sales had been particularly brisk in that quarter: "iPhone sales of 14.1 million were up 91 percent year-over-year," he boasted – and then he couldn't resist adding a dig at the competition: "handily beating the 12.1 million phones RIM sold in their most recent quarter."

According to DigiTimes, that 14.1 record is now being broken during 2010's fourth calendar quarter as worldwide iPhone shipments are estimated to total 15.5 million, resulting in total sales for calendar 2010 of 47 million Cupertinian handsets.

Although the competition for top smartphone is clearly heating up, what with Android phones taking a ever-growing bite out of the iPhone's market share, the total handset pie appears to be growing fast enough to feed all comers.

The DigiTimes report also adds another dash of credence to the oft-repeated rumors of a CMDA-savvy Verizon iPhone appearing in the US during first quarter of 2011. ®

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.