Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.

The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.

On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.

Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.

Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.

Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.

It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.

Tip of the Week: Navigating the Taskbar in Windows...
Managing Millennials May Be Challenging, But Worth...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Hosted Solutions Data IT Services Network Security Data Backup Email Malware Internet Hackers Software IT Support Efficiency Outsourced IT Microsoft Business Innovation Productivity Data Recovery Computer Mobile Devices Managed IT Services Hardware Small Business Upgrade Business Continuity Google IT Support Cloud Computing Cybersecurity Backup Ransomware Phishing User Tips Communication Tech Term Collaboration Managed IT Services Managed Service Provider Windows 10 Disaster Recovery Business Management Workplace Tips Smartphones VoIP Internet of Things Smartphone Android Remote Monitoring Mobile Device Social Media Data Management Paperless Office Managed IT Managed Service communications Facebook Encryption Windows 10 Server Windows Save Money Network Office 365 Browser Artificial Intelligence Quick Tips Virtualization BDR Miscellaneous Saving Money Passwords Help Desk Wi-Fi Holiday BYOD Risk Management Apps Business Technology Automation Vendor Management Password Windows 7 App Mobile Device Management Compliance Health Government Document Management Healthcare Recovery Gmail Training Avoiding Downtime Analytics Big Data Applications Laptops Robot Firewall Chrome Users Employer-Employee Relationship Bandwidth Remote Work Unified Threat Management Microsoft Office Bring Your Own Device Going Green Blockchain Wireless Content Filtering Processor Information Mobility IT Management File Sharing Redundancy Tip of the week Apple Scam Antivirus Telephone Systems Project Management SaaS Two-factor Authentication Office Money Infrastructure Hosted Solution Data storage Computers Website Computing Data loss Vulnerability Storage Data Security Budget Information Technology Operating System Access Control Printing Flexibility OneDrive Customer Service Remote Computing IoT Settings Machine Learning Gadgets Virtual Reality Tablet Meetings Unified Communications Files Social Company Culture Software as a Service Regulations Router VPN RMM Maintenance Downtime IT Service Customer Relationship Management Politics Virtual Private Network Proactive Work/Life Balance Employee-Employer Relationship Internet Exlporer Websites File Management Identity Theft Assessment Server Management How To Samsung IT solutions Bitcoin Management How To HIPAA Licensing Remote Monitoring and Management Cooperation Payment Cards Mouse Remote Workers Uninterrupted Power Supply Mobile Security Outlook Consultation Chromebook Sports Co-Managed IT Hard Drive Google Drive Word Search Professional Services Managed Services Business Growth Upgrades Twitter Dark Web Electronic Health Records Augmented Reality Monitoring Mobile Computing Employees Hacker The Internet of Things Remote Worker Spam Display WiFi Solid State Drive Recycling Covid-19 End of Support YouTube Wireless Technology Utility Computing Legal Consulting Patch Management Private Cloud Current Events Time Management Networking Smart Technology Net Neutrality Tech Support Monitors Alert Administration Electronic Medical Records Social Network Education Mobile Office Managed Services Provider Digital Payment LiFi Network Management Typing Disaster Trending Mobile Data Notes Hacks Enterprise Content Management Finance Comparison Identity Options Cybercrime Virtual Desktop Holidays Theft Technology Laws Cookies Telephony Active Directory Mail Merge Google Calendar Shared resources Sync Windows Server 2008 Best Practice Law Enforcement GDPR Outsourcing Cost Management Outsource IT E-Commerce VoIP Sponsor Dark Data Personal Information Voice over Internet Protocol Public Cloud Wires Human Error Touchscreen Techology Safety Managed IT Service San Diego Connectivity PowerPoint Botnet Value of Managed Services Vulnerabilities Authentication Lenovo Specifications 5G Travel IT WPA3 Financial Statistics Notifications Permissions Nanotechnology Windows Server Windows 8 Enterprise Resource Planning Save Time Bookmarks Address Legislation IT Technicians Mobile Device Managment Software Tips Break Fix Social Networking Gadget Marketing Video Conferencing Identities Laptop Features Digital Obstacle SharePoint Staff Automobile Telephone Computer Care Permission Disaster Resistance Black Market Unified Threat Management Hotspot Buisness Geography Authorization Superfish Writing Emoji Black Friday Roanoke — Central Technology Solutions Wireless Internet Business Telephone Google Wallet Fleet Tracking Procurement Bluetooth Fraud Screen Reader Security Cameras User Management GPS Mobile Favorites Network Congestion Mirgation Manufacturing Optimization Motherboard Biometric Hard Drives Cache Remote Working Google Docs Spyware Course Computer Repair Downloads Transportation Mobile VoIP Test Proactive IT Employer/Employee Relationships IT Assessment Star Wars Shortcut Physical Security User Error Language Virtual Assistant Vendor Supercomputer High-Speed Internet Humor Retail Cortana Cyber Monday technology services provider Crowdsourcing Drones Asset Tracking 3D Printing Smart Tech Batteries Tracking Backups Conferencing Firefox Migration Hard Disk Drives G Suite Virtual Machines History Processors Data Warehousing Projects Taxes Gamification Cyberattacks Operations Cyber security Google Maps Deep Learning MSP Heating/Cooling IT Consulting Proactive Maintenance Digitize WannaCry Office Tips Computing Infrastructure Wasting Time Smart Devices IT Budget Development Zero-Day Threat Technology Assurance Group ’s 18 Alt Codes OneNote Hacking Unsupported Software Virus ROI Managing Stress Instant Messaging Update Technology Tips Chatbots Solid State Drives Credit Cards Cabling Data Breach Microsoft Excel Modem Return on Investment Cryptocurrency eWaste Read Only Multi-Factor Security Wearable Technology Teamwork Tech Terms Servers Database Management Point of Sale Shadow IT Printer Alerts Database Sensors Cables Backup and Disaster Recovery Social Engineering USB Distributed Denial of Service Annual Convention Printers Web Server Cameras Motion Sickness CCTV Administrator Regulation Hard Disk Drive Relocation Students Webcam Emergency IT Consultant Peripheral CrashOverride Error