Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.

The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.

On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.

Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.

Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.

Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.

It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.

Tip of the Week: Navigating the Taskbar in Windows...
Managing Millennials May Be Challenging, But Worth...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 18 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Cloud Network Security Privacy Data IT Support Data Recovery Email Software Tech Term Outsourced IT Malware IT Services Business Internet Managed IT Services Innovation Hackers Cloud Computing Business Management Small Business User Tips Windows 10 Collaboration Ransomware Hardware Mobile Devices Paperless Office Android Microsoft Efficiency Google Managed Service Provider Computer Upgrade Encryption Server Smartphones VoIp Communication Phishing Remote Monitoring Vulnerability Business Continuity Workplace Tips Internet of Things Communications Managed IT services Passwords Browser Applications Data Management Managed IT Artificial Intelligence Managed Service Office 365 Business Technology Holiday Backup Scam Saving Money Quick Tips Wi-Fi Healthcare Document Management Government Bandwidth Mobile Device Cybersecurity Compliance Tip of the week Blockchain Information Smartphone Project Management Employer-Employee Relationship Antivirus Disaster Recovery Save Money Social Media VPN Analytics Website BYOD Automation Microsoft Office BDR Data Security Vendor Management Infrastructure IT Management Customer Relationship Management Router Chrome Two-factor Authentication Remote Monitoring and Management Redundancy Maintenance Facebook Machine Learning Networking Employees Mobile Security Downtime Unified Threat Management Unified Communications Company Culture Files Access Control Network Virtual Private Network Windows Remote Workers Gmail The Internet of Things IoT Cooperation Server Management Regulations Risk Management Management Word Patch Management RMM File Sharing Software as a Service Net Neutrality Assessment Proactive Tablet Internet Exlporer Users Storage Data Loss Network Management HIPAA Smart Technology Bring Your Own Device Alert Help Desk Consultation Authorization Computing Alerts Teamwork Identity Features Financial Cybercrime Screen Reader Travel Windows 7 Remote Computing Technology Laws Operating System Virtual Reality Touchscreen Hacking Options Modem High-Speed Internet Politics Professional Services Tech Support Outlook Disaster Resistance How To Test Firewall Time Management OneDrive G Suite Emergency Multi-Factor Security Office Private Cloud WPA3 Comparison Licensing Heating/Cooling Shared resources Mobile Printer Electronic Health Records Procurement Database Management Smart Tech Instant Messaging Technology Tips Settings Recycling Unified Threat Management Consulting Data Warehousing Flexibility Trending 5G Development Search Virtual Assistant IT Technicians Cost Management Shortcut Proactive IT Employee-Employer Relationship Distributed Denial of Service Statistics Manufacturing Motherboard Chromebook Bookmarks ROI Legislation Fleet Tracking Zero-Day Threat Specifications Servers Virtualization Cyberattacks Social Connectivity Customer Service Digital Payment Hotspot Transportation Migration eWaste Managed Services Provider Mobile Device Management Operations Mobility Wireless Internet Cookies Cables Lenovo Recovery Wasting Time IT Consulting Wireless Managed IT Service Bluetooth Password Vulnerabilities Samsung Favorites Apps Asset Tracking Backup and Disaster Recovery Black Friday CIO applications Managing Stress SharePoint Read Only Security Cameras MSP Finance Mouse Language Chatbots Mail Merge User Error Point of Sale Tech Terms Money Employer/Employee Relationships Nanotechnology Wires Superfish Gadgets Database Mirgation Hard Drive Data Breach Break Fix Hard Disk Drives Mobile Computing Conferencing Wearable Technology Star Wars Human Error Cyber Monday Staff Avoiding Downtime Websites Spam Enterprise Content Management Downloads Printing Permissions Notes Authentication Computing Infrastructure Identity Theft Enterprise Resource Planning Address WiFi E-Commerce Theft Microsoft Excel Proactive Maintenance App Voice over Internet Protocol Cache Monitoring Electronic Medical Records Dark Web Augmented Reality Solid State Drives Geography Meetings Utility Computing Techology OneNote Permission SaaS Social Networking Remote Worker Google Calendar Fraud PowerPoint Regulation GDPR Twitter Marketing Education CEO Printers Students Daniel Stevens

Latest Blog

Technology doesn’t last forever, and this is especially true for software solutions. Granted, software is a little easier to upgrade than hardware, as they can be administered patches and updates remotely, but what happens after that support ends? Well, it turns out that the...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...