Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.

The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.

On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.

Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.

Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.

Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.

It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.

Tip of the Week: Navigating the Taskbar in Windows...
Managing Millennials May Be Challenging, But Worth...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Network Security Privacy IT Support Cloud Data Recovery Data Software IT Services Email Malware Tech Term Outsourced IT Business Computer User Tips Internet Managed IT Services Windows 10 Innovation Hackers Cloud Computing Business Management Ransomware Efficiency Microsoft Small Business Collaboration Upgrade Google Mobile Devices Paperless Office Android Hardware Phishing VoIp Encryption Server Remote Monitoring Business Continuity Managed Service Provider Smartphones Workplace Tips Communication Communications Artificial Intelligence Office 365 Vulnerability Managed IT Save Money Quick Tips Backup Cybersecurity Browser Applications Internet of Things Managed IT services Passwords Data Management Laptops Business Technology Holiday Managed Service Wi-Fi Help Desk Document Management Government Antivirus Bandwidth Healthcare Saving Money Automation Microsoft Office Compliance Blockchain Mobile Device BDR Processor Smartphone Tip of the week Project Management Employer-Employee Relationship Information Disaster Recovery Scam Avoiding Downtime VPN Analytics Customer Relationship Management Windows 7 Website Access Control BYOD Social Media Windows Data Security Infrastructure RMM Vendor Management Chrome Two-factor Authentication IT Management Router Bring Your Own Device Assessment HIPAA Financial Remote Monitoring and Management Networking Operating System Network Management Users Machine Learning Mobile Security Training Consultation Employees Unified Communications Downtime Files Facebook Virtual Private Network Company Culture Gmail The Internet of Things Cooperation Network Risk Management Remote Workers Unified Threat Management Word Regulations Patch Management IoT Software as a Service Net Neutrality Management Tablet File Sharing Server Management Data Loss Internet Exlporer Smart Technology Alert Proactive Monitoring Redundancy Maintenance Storage Travel Websites Social Networking Technology Laws Remote Worker Virtual Reality PowerPoint Display Utility Computing OneNote Permission Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Comparison Licensing Options Modem High-Speed Internet Printer Politics Return on Investment Remote Computing Technology Tips OneDrive SaaS G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Professional Services Tech Support Search How To Test Shared resources Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech WPA3 Legislation Consulting Specifications 5G Touchscreen Hacking Development Instant Messaging Settings Personal Information Recycling Employee-Employer Relationship Digital Payment Hotspot Manufacturing Time Management Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Virtualization Heating/Cooling IT Consulting Cyberattacks Social Managed IT Service GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Managed Services Provider Mobile Device Management Black Friday Wireless Internet Trending Cookies Cables SharePoint Customer Service Transportation Active Directory Migration eWaste Wireless Mouse Language Password Statistics Vulnerabilities Mail Merge User Error Favorites Apps Money Wasting Time Current Events Superfish CIO applications Servers Managing Stress Data Breach Read Only Security Cameras Break Fix Asset Tracking Backup and Disaster Recovery Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Mobility Nanotechnology Wires Downloads MSP Finance Permissions Windows Server Computing Infrastructure Hard Disk Drives Bluetooth Mobile Computing Address WiFi Conferencing Microsoft Excel Database Miscellaneous Recovery Mirgation Hard Drive Spam Enterprise Content Management Printing Dark Web Augmented Reality Notes Wearable Technology Star Wars Human Error Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance App Authentication Google Calendar Fraud User Management Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings Voice over Internet Protocol Gadgets Projects Cache Daniel Stevens Regulation Twitter Education CEO Printers Students Marketing

Latest Blog

Downtime is a major problem for businesses, and it’s largely a result of technology taking over the workplace. Since many jobs rely on technology to be done properly, it stands to reason that broken-down technology can pose a considerable issue for businesses--not to mention...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...