Feeds

Sony Ericsson announces pre-slurp loss

Hopes things will look up after Sony takes reins

High performance access to file storage

Sony Ericsson has announced what it no doubt hopes will be one of its last quarterly losses for the end of 2011, just before it gets slurped in full by Sony.

The mobile phone maker, which has struggled to compete with big Android houses like Motorola and Samsung, is to be fully taken over by Sony in the next few months. The move should allow greater integration with Playstation and tablet devices from the Japanese firm, and thereby pimp up its smartphone offerings.

In the meantime, Sony Ericsson handsets have failed dismally to set the world on fire, making a loss of €207m in the last quarter of 2011 and a full year loss of €247m.

"Our fourth quarter results reflected intense competition, unfavourable macroeconomic conditions and the effects of a natural disaster in Thailand this quarter," CEO Bert Nordberg explained in a canned statement.

However, the first of these is clearly the biggest obstacle to be overcome, as by its own estimates, Sony Ericsson is only holding onto ten per cent of the Android smartphone market.

New and exciting things are expected from Sony when it fully takes over in February, expectations that have been fuelled by a leaked document listing new handsets for this year.

The document, allegedly a leaked sales report for India, has been widely circulated on the net and gives a list of 11 new handsets to be released throughout the year.

The prices given are in rupees and phones normally cost more in India than they do in the US, but the range gives an idea of the sorts of high- and medium-end smartphones Sony might be looking at. At the high end, the Hayabusa would be £412 in a direct UK currency conversion, while the Mint would come in at £470.

Sony has already unveiled two post-Ericsson smartphones – the Xperia Ion and the Xperia S – at the CES show in Las Vegas, and more are expected at Mobile World Congress next month. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.