Feeds

BlackBerry 10: Dozens of networks probe the final RIM shot

Phone maker VERY EXCITED about mega mobe probe

Providing a secure and efficient Helpdesk

RIM reckons more than 50 network operators are testing its BlackBerry 10 handsets, which sounds impressive until one remembers that testing is just a first step on the long journey to market.

Nonetheless, the trouble mobe maker is keen to prove its radio electronics and phone performance are up to scratch.

"We have passed a critical milestone in the development of our brand new mobile computing platform," RIM CEO Thorsten Heins gushed, adding that the handsets have achieved "lab entry".

Lab testing is a requirement for most mobile network operators, though few bother running handsets through the full gamut of testing if their competitors have already done so; engineers don't like repeating work any more than anyone else. Operators frequently receive requests from manufacturers, particularly lesser-known brands, to approve handsets, and most networks will run tech gear though trials in exchange for some cash.

Despite its wobbling finances, RIM is still a big enough player to get its handsets tested for free. And even if the BlackBerry 10 fails to be a commercial success, networks will still flog them albeit in small numbers, so RIM's engineers want to iron out any technical glitches at launch. Operators not selling the BlackBerrys will want to be sure that RIM customers can switch to their networks without any problems.

The only limit on lab testing for operators is actually getting hold of the devices, which are always in short supply as marketing, development and senior management all want to get their hands on the latest bling. RIM, no doubt aware of this, is showing off devices to all and sundry, and clearly has enough prototypes to go around so it's no surprise that testing is so widespread.

Only the most fundamental of lab failures would delay next year's launch of BlackBerry 10, so RIM's challenge is to ensure the company isn't forgotten before then, which is why it's harping on about what most would consider routine testing. ®

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.