Feeds

Acer to launch Windows Phone 8 smartphone in 2013

Six devices planned, based on Qualcomm and MediaTek chips

High performance access to file storage

Acer has confirmed to The Reg that it plans to launch six new handsets next year including a Windows Phone 8 device.

Company president Jim Wong told Taiwanese tech title Digitimes that the six new models would be aimed to appeal to all segments of the market in Europe, south-east Asia and China.

The handsets will be Android-based, with the exception of the one Windows Phone 8 model. An entry-level model will feature chips from Taiwanese giant MediaTek while the higher end designs will score dual-core CPUs from Qualcomm.

Acer’s smartphones will be made mainly by ODMs Qisda and Compal in 2013, the report said.

In Europe, Acer will be looking to sell through existing sales channels and strike new deals with carriers, while in Asia it’s looking specifically at Indonesia, Thailand, Malaysia and India – some of the key growth markets in the region.

When it comes to the world’s biggest smartphone market, China, Acer said that it would be targeting entry and mid-level sales, but would steer clear of the ultra low price segment.

Whilst it’s probably wise not to get involved at the very bottom end of the Chinese smartphone market, Acer will still face stiff competition in the entry and mid-level, especially from home-grown rivals such as ZTE, Huawei and Lenovo.

The firm obviously thinks there’s enough room for everyone, and with 42 million devices shipped into the channel in China in Q2 – around 27 per cent of the global figure – it could have a point.

However, its brand is more commonly associated with laptops and tablets, despite the launch of the high-end CloudMobile S500 smartphone in Europe recently, following hot on the heels of the Liquid Galant and Liquid Glow.

Gartner analyst Tracy Tsai wouldn’t say whether she thought Acer’s gamble in the smartphone space is likely to pay off, but told The Reg the expansion of this part of its business was to be expected.

“The content, application, user interface and usage model is getting unified across different devices,” she said.

“It is inevitable for device vendors to expand their product portfolio in response to this market trend. This is the way they can provide consumers with an overall unified user experience.” ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.