Brexit jitters fingered as UK consumer PC sales collapse

Sales into retail sink 25% during Jan and Feb... just breathe everyone, stay calm

Brits may have caught the pre-Brexit jitters in the first two months of this year, as the amount of PCs sold to retailers crashed, according to shipment figures compiled by channel number-cruncher Context.

UK PC volumes via distributors fell 7 per cent to 538,000 for January and February: business machines went up 4.5 per cent to 361,000 but those to consumers declined 25 per cent to 176,000.

"Consumer PC sales have been weak across Western Europe (down 9 per cent) due to little innovation and the move to smartphones," said Marie-Christine Pygott, senior analyst at Context.

"But in the UK we are hearing [from distributors that supply retailers] of the additional impact of low consumer confidence, which is partly driven by Brexit uncertainty," she told The Reg.

UK PC revenues edged up 1.9 per cent to £282m in the two months with a higher mix of business and gaming machines shipped. As such, average sales prices (ASPs) went up 8 per cent to £531.


'BMW, Airbus and Siemens' get the Brexit spending shakes


Enterprises migrating from Windows 7 ahead of Microsoft ending extended support was one of the drivers, Pygott claimed.

PC sales stacked up favourably in Western Europe when compared to the UK – revenues were up 6 per cent to €2bn, and ASPs climbed 7 per cent to €622. Nearly every country across the region reported gains aside from Spain, the Netherlands and Switzerland. Unit volumes in the region declined by 1 per cent.

According to Forrester and Gartner, companies will spend less on tech in the UK during 2019 due to Brexit. Companies including BMW, Airbus and Siemens have already planned for shrinking budgets.

The type of Brexit the British public faces has yet to be determined by politicians, but if the UK leaves without a withdrawal agreement in place, a so-called hard Brexit, a raft of challenges including product shortages and falling valuation of Sterling may well materialise. ®

Similar topics

Other stories you might like

  • If you're using the ctx Python package, bad news: Vandal added info-stealing code
    Domain associated with maintainer email expired, taken over in supply-chain attack

    The Python Package Index (PyPI), a repository for Python software libraries, has advised Python developers that the ctx package has been compromised.

    Any installation of the software in the past ten days should be investigated to determine whether sensitive account identifiers stored in environment variables, such as cloud access keys, have been stolen.

    The PyPI administrators estimate that about 27,000 malicious copies of ctx were downloaded from the registry since the rogue versions of ctx first appeared, starting around 19:18 UTC on May 14, 2022.

    Continue reading
  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading

Biting the hand that feeds IT © 1998–2022