Welcome!

News Feed Item

CCID Consulting: Characteristics of China's Computer Market in 2012

CCID Consulting (HK:08235):

(I) Size and Growth

In the shadow of the global economic downturn, the overall demand of China's computer market shrank in 2012. The performance of all kinds of products was below expectation, with the overall growth rate estimated at 25.3%. The annual sales volume of desktop computers is expected to be 25.574 million pieces, with an annual growth rate of 3.4%; the annual sales volume of laptops is expected to be 29.839 million pieces, up 10.6% year-on-year; the tablet market maintained a rather high growth rate in 2012 after experiencing an explosive growth in 2011, with the annual sales volume expected to reach 9.175 million pieces.

Table 1 Sales of China's Computer Market, 2011-2012

Year   2011   2012 (Forecast)   Growth Rate
Sales Volume of Laptops (Ten Thousand Pieces)   2697.9   2983.9   10.6%
Sales Volume of Desktops (Ten Thousand Pieces)   2473.3   2557.4   3.4%
Sales Volume of Tablets (Ten Thousand Pieces)   492.5   917.5   86.3%
Total Sales Volume

(Ten Thousand Pieces)

  5663.7   6458.8   25.3%

Source: CCID Consulting, October 2012

(II) Market Structure and Changes

1.  Product Mix

In China’s laptop market, 14-inch laptops maintained their leading position with a proportion of 55.7% in 2012; the launch of Ultrabooks drove a growth in the sales of 13-inch products, which accounted for 16.4% of the total (see Figure 1); the proportion of desktops with large display screens increased to some extent, and the proportion of 19-inch and 20-inch desktops reached 36.1% and 31.1% respectively.

Table 2 Product Mix of China's Laptop Market in 2012

Type of Display Screen   Sales Proportion
11-inch   4.1%
12-inch   4.3%
13-inch   16.4%
14-inch   55.7%
15-inch   15.7%
16-inch   0.2%
17-inch   0.8%
18-inch   0.3%
Others   2.5%

Source: CCID Consulting, October 2012

Figure 1 Sales Structure of China's Laptops in 2012

http://event.ccidconsulting.com/en/images/en-23-3.jpg

Source: CCID Consulting, October 2012

Table 3 Product Mix of China's Desktop Market in 2012

Type of Display Screen   Sales Proportion
17-inch LCD   1.9%
18.5-inch LCD   8.1%
19-inch LCD   36.1%
20-inch LCD   31.1%
21.5-inch LCD   14.3%
Others   8.5%
Total   100.00%

Source: CCID Consulting, October 2012

Figure 2 Sales Structure of China's Desktops in 2012

http://event.ccidconsulting.com/en/images/en-23-5.jpg

Source: CCID Consulting, October 2012

Table 4 Product Mix of China's Tablet Market in 2012

Type of Display Screen   Sales Proportion
5-inch   0.3%
7-inch   19.8%
8-inch   1.7%
9.7-inch   72.0%
10-inch   4.6%
Others   1.6%
Total   100.0%

Source: CCID Consulting, October 2012

Figure 3 Sales Structure of China's Tablets in 2012

http://event.ccidconsulting.com/en/images/en-23-6.jpg

Source: CCID Consulting, October 2012

2.  Geographic Structure

Well-developed regions such as Eastern China, Northern China and Southern China were the top three markets respectively, but their proportions decreased to some extent, while proportions of Southwestern, Northwestern and Central China saw increases compared with 2011. (See Figure 3)

Figure 4 Geographic Structure of China's Computer Market in 2012

http://event.ccidconsulting.com/en/images/en-23-7.jpg

Source: CCID Consulting, October 2012

 (III) Market Characteristics

1.  Intel's Ivy Bridge processor and Microsoft's Windows 8 operating system have enhanced user experience.

In 2012, the launch of Intel's Ivy Bridge processor and Microsoft's Windows 8 operating system revived the PC industry to some extent. Moreover, the introduction of "Tri-gate" 3D transistor technology in the 22nm technical process by Intel when launching the Ivy Bridge processor has clearly improved the multi-media display performance and reduced energy consumption, exiting the currently weak laptop market to some extent.

2.  Distribution channels have been diversified, with obvious penetration into lower tier cities.

The distribution channels of the current computer market are clearly more diversified, which can be seen in three aspects: firstly, the proportion of non-traditional channels of 3C stores has increased; secondly, Internet channels have developed rapidly; thirdly, the market demand in tier 4-6 cities has increased. The proportion of sales through non-traditional channels (3C stores, supermarkets and Internet channels) continued to increase.

3.  The computer market have continued be boosted after the ending of China’s Sending Home Appliances to the Countryside poliicy.

With the ending of the Sending Home Appliances to the Countryside policy, the sales in the rural and township markets did not see a dramatic decrease, where huge demand still exists. Besides, the tier 4-6 city channels and service systems built by Lenovo and other top brands during the policy period have matured and can serve as the foundation their future growth in the township markets.

4.  Diversified services have added value to the manufacturers' service brands

Diversification has become the emphasis of the manufacturers' service innovations. Considering the faster responding speed and lower construction cost of network services, many manufacturers have established their own network service centers. On the other hand, network consultation, due to its convenience and efficiency, has also helped busy users save time, thereby becoming increasingly popular among the users.

About CCID Consulting Co., Ltd.

CCID Consulting Co., Ltd., the first Chinese consulting firm listed in the Growth Enterprise Market (GEM) of the Stock Exchange of Hong Kong (HKSE: 08235) and the first consulting firm which gets ISO 9001 international and national quality management system standard certification, is directly affiliated to China Center for Information Industry Development (hereinafter known as CCID Group). Headquartered in Beijing, CCID Consulting has so far set up branch offices in Shanghai, Guangzhou, Shenzhen, Xi’an, Wuhan and Nanjing with over 300 professional consultants. The company’s business scope has covered over 200 large and medium-sized cities in China. CCID Consulting provides customers with public policy establishment, industry competitiveness upgrade, development strategy and planning, marketing strategy and research, HR management, IT programming and management services, investment and financing, and M&A. The company's customers range from government departments at all levels and diversified industrial parks, to industrial users in strategic emerging industries in new generation information technology, energy saving and environmental protection, biological science and technology, high-end equipment manufacturing, new materials, and new energy. CCID Consulting commits itself to become the No. 1 advisor for urban economy, the No.1 consultancy for enterprise management, and the No. 1 branch for informatization consulting in China.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
SYS-CON Events announced today that Hitrons Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Hitrons Solutions Inc. is distributor in the North American market for unique products and services of small and medium-size businesses, including cloud services and solutions, SEO marketing platforms, and mobile applications.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...