Netbooks and MIDs ‘secondary’ mobile computing devices

Ultra portable devices gaining popularity if not yet credibility from businesses

This Article Covers


A survey of more than 1000 mobile computing users aimed at identifying attitudes to netbooks and Mobile Internet Devices (MIDs) has revealed that netbooks are regarded as secondary mobile computing platforms and MIDs as essentially mobile phone replacements.

Such platforms are increasingly popular and have been packaged by mobile operators keen to boost their mobile broadband portfolios but these findings add to received wisdom that such technology is not yet business ready.

ABI found that only 11% of mobile computing users in the US would use a netbook as aprimary computer, whilst 79% view such devices as a secondary device to be used in addition to a laptop or desktop computer.

For MIDs, almost half of the survey regarded them as mobile phone replacements even though 34% said they would continue to use a mobile handset even if they had a MID. Yet the research firm expects some people to value a separate device with a bigger screen for the web browsing, that they can choose when to carry

Commented ABI principal analyst Philip Solis, “[Even though] their low price does cause some consumers to view netbooks as a replacement for a laptop given the current economic conditions, the majority view a netbook as being a secondary device. When considering another laptop as an additional device mostly for browsing the web and using other Internet-based communications applications, consumers will find netbooks to be an appropriate alternative.”



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Mobile hardware



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...