Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.

The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.

On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.

Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.

Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.

Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.

It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.

Tip of the Week: Navigating the Taskbar in Windows...
Managing Millennials May Be Challenging, But Worth...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud IT Services Data Recovery Efficiency Software Internet Email Managed IT Services Malware Outsourced IT Business Innovation Tech Term Small Business Upgrade Cloud Computing Hackers Computer Collaboration Business Management Cybersecurity User Tips Windows 10 Microsoft Google Mobile Devices Hardware Phishing Business Continuity Communication VoIp Ransomware Workplace Tips Managed Service Smartphones Paperless Office Backup Android Managed Service Provider Quick Tips Encryption Server Office 365 Communications Disaster Recovery Managed IT Mobile Device Remote Monitoring Data Management Network Wi-Fi Healthcare Windows 7 Saving Money Browser BDR Internet of Things Passwords Holiday Artificial Intelligence Business Technology Vulnerability Laptops Government Document Management Save Money Compliance Social Media Applications Facebook Help Desk Managed IT services Smartphone Remote Work Miscellaneous Vendor Management Two-factor Authentication Scam Redundancy Bandwidth Health Avoiding Downtime Users Information Antivirus Automation Blockchain Microsoft Office Data Security Virtualization Employer-Employee Relationship Processor Tip of the week Project Management Analytics IT Management Maintenance VPN Machine Learning Customer Relationship Management RMM BYOD Website OneDrive Proactive Company Culture Meetings Access Control Virtual Private Network Infrastructure Windows Software as a Service IoT Mobility Chrome Router Data Loss Storage File Management Bring Your Own Device HIPAA Utility Computing Managed Services Provider Alert Apps Gadgets Remote Workers Assessment Payment Cards Mobile Security Co-Managed IT Flexibility Unified Communications Networking Network Management Consultation Search Recycling Managed Services Professional Services Training The Internet of Things Monitoring Gmail Files Risk Management Time Management Cooperation Remote Monitoring and Management Financial Regulations Net Neutrality Operating System Word Unified Threat Management Management Office Password File Sharing Employees Tablet Patch Management Hard Drive Electronic Health Records Internet Exlporer Social Network Consulting Downtime Dark Web Augmented Reality Employee-Employer Relationship Smart Technology Covid-19 Computing Server Management Social Networking Customer Service Travel Windows Server 2008 Techology Notes Mobile Device Management Virtual Reality Mobile Office Favorites Proactive Maintenance Solid State Drive Screen Reader Wireless Firewall Shadow IT User Management Identity Solid State Drives Modem High-Speed Internet Asset Tracking Backup and Disaster Recovery Comparison Websites Licensing Holidays Technology Laws Voice over Internet Protocol Projects Remote Computing Read Only Security Cameras Multi-Factor Security Value of Managed Services G Suite MSP Finance Technology Tips Outlook Disaster Resistance PowerPoint Display Tech Support Point of Sale Tech Terms Data Warehousing Outsource IT Emergency Mobile Conferencing Legislation Cybercrime Cyber security Smart Tech Distributed Denial of Service Outsourcing Printer Teamwork Information Technology Options Telephone Development Human Error Specifications SaaS IT Unified Threat Management Return on Investment Printing Operations Laptop Motherboard Chromebook Authentication Digital Payment Hotspot Optimization Shortcut Proactive IT IT Technicians Cost Management E-Commerce Theft Database Management Connectivity Electronic Medical Records Touchscreen Managed IT Service Hacking Video Conferencing Shared resources Going Green Lenovo 5G Mobile VoIP Cookies Cables OneNote Permission Black Friday Business Telephone Settings Personal Information Migration eWaste Remote Worker Money Remote Working Samsung Manufacturing Vendor Vulnerabilities Authorization Mouse Heating/Cooling Language Virtual Machines IT Consulting Virtual Assistant Bitcoin Features Batteries Managing Stress Politics GDPR Break Fix Trending Biometric SharePoint Permissions Superfish Wireless Internet Big Data Nanotechnology Wires How To Test Cyber Monday Statistics Staff IT Assessment Mail Merge User Error Transportation Active Directory Chatbots Private Cloud Microsoft Excel Budget Smart Devices Mobile Computing WPA3 Servers Computing Infrastructure Credit Cards Data Breach Wasting Time Current Events Mirgation Procurement CIO applications Spam Enterprise Content Management Instant Messaging Wearable Technology Star Wars Gamification Downloads ROI Google Calendar Recovery Fraud Employer/Employee Relationships Apple App Bluetooth Digitize Address WiFi Windows Server Identity Theft Enterprise Resource Planning Bookmarks Hard Disk Drives Sensors Geography Fleet Tracking Zero-Day Threat Alerts Computers Database Cache Cyberattacks Social CEO Marketing Students Daniel Stevens Printers Twitter Regulation Education

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...