312-253-4321    Get SUPPORT

Alchetec Blog

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that outside the U.S., Huawei is a major player.

The reason the tech giant has been shut out of the hungry U.S. tech market has been because there are very legitimate fears of collusion with the Chinese government. This is something that U.S. leaders clearly understand. The U.S., who has been at the forefront of digital surveillance, understands that the more data that is tracked, catalogued and analyzed, the more information is learned. For lawmakers in the U.S., providing the communist Chinese government in Beijing an in to collect information about American industry, U.S. citizens, and the like is looked on as oversharing.

On May 16, the United States doubled down. They added Huawei to their U.S. Commerce Department’s Bureau of Industry and Security’s “entity list”, effectively barring U.S. companies from doing business with Huawei unless they get explicit permission from Washington. The official reasoning? Huawei “is engaged in activities that are contrary to U.S. national security or foreign policy interest.” Most people in the know have made mention to the ongoing trade war with China being the actual impetus behind the move.

Whatever the reasoning, this act set off a firestorm for the Chinese manufacturer. Huawei’s smartphones run on Android, their computers run Windows 10, these are obviously products of U.S.-owned properties Google and Microsoft, respectively. This means that after August 19, the tech giant will no longer have access to the operating systems their devices run on; and, if you consider all the other U.S. companies they have agreements with (such as NVIDIA and Qualcomm), the decision to put Huawei on the entity list puts a lot of pressure on the company.

Huawei has announced that they have been developing their own OS for a while now, but by having to pivot that abruptly, it will be extraordinarily costly for the company. Since Android is an open-sourced software, they could still use a custom version of that, but they wouldn’t be supported by Google’s terms of service, meaning those customers wouldn’t have access to Google products, including the Google Play store which fuels Android mobile devices. More than any other issue, not having access to apps can sink a mobile platform, just ask Blackberry. In fact, some of the largest companies in the world have tried to create App stores, and only Apple and Google have done it proficiently.

Moreover, even if they were somehow going to figure out the App store situation, not having access to American-developed applications will leave an undeniable hole in the offering, at least in the short term. Apps like Google Chrome, Gmail, Facebook, Twitter, YouTube, and others of the like wouldn’t be available on the environment. While individual users could still use these services through their web browser, apps help mobile function.

It will be interesting to see what Huawei’s strategy will be over the upcoming months to try and mitigate a massive revenue loss; or, if it can convince the U.S. lawmakers that have taken this measure that the company isn’t in Beijing’s pocket. Only time will tell. Have you ever used any Huawei devices? What do you think of the U.S.’s plan? Leave your thoughts on these questions and more in the comments below.

Tip of the Week: Navigating the Taskbar in Windows...
Managing Millennials May Be Challenging, But Worth...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity IT Services Network Security Malware Hosted Solutions Hackers Privacy Email Data Data Backup Software Outsourced IT Internet Productivity Managed IT Services Innovation Business Data Recovery Microsoft Tech Term IT Support Ransomware Cloud Computing Hardware Computer Small Business IT Support User Tips Backup Business Continuity Mobile Devices Collaboration Google Efficiency Business Management Communication Paperless Office Managed IT Services Android Windows 10 Remote Monitoring VoIP Server Internet of Things Data Management Managed Service Provider Smartphone Upgrade Smartphones Workplace Tips Phishing Disaster Recovery Passwords Managed IT Browser Encryption Office 365 Cybersecurity Mobile Device Artificial Intelligence Save Money Holiday BYOD Social Media Communications Windows 10 Quick Tips Document Management Managed Service Applications Business Technology Facebook Risk Management Saving Money Employer-Employee Relationship Government Compliance Wi-Fi SaaS Blockchain Telephone Systems Chrome Bandwidth Information Windows File Sharing Microsoft Office Automation Password Infrastructure Recovery Tip of the week Help Desk Unified Threat Management BDR Healthcare Antivirus Vulnerability Virtualization IT Management Scam Network Analytics Project Management Vendor Management Data Storage VPN Training Regulations Apps Data Security Firewall Bring Your Own Device Customer Relationship Management Office Files Hosted Solution Data loss Robot Tablet Website Money Storage Gmail App Politics Wireless Mobile Device Management Router Virtual Reality Maintenance Two-factor Authentication Work/Life Balance Going Green Word IT Service Remote Workers Internet Exlporer Networking IoT Computing Flexibility Access Control Alert Virtual Private Network Downtime Cooperation The Internet of Things Gadgets Digital Payment Mobile Security Printing Identity Theft Samsung Licensing Company Culture Outlook Big Data Computers Software as a Service Users Upgrades Customer Service Assessment Miscellaneous Chromebook Twitter Patch Management Proactive Mobility How To Health Unified Communications How To Consultation Uninterrupted Power Supply Social Redundancy Machine Learning Employees Smart Technology Remote Computing Monitors Management Network Management Remote Monitoring and Management RMM Electronic Medical Records Net Neutrality Settings HIPAA Server Management IT Solutions Distributed Denial of Service Processors Modem Comparison Security Cameras Alerts Enterprise Resource Planning Touchscreen IT Consulting Augmented Reality Instant Messaging Manufacturing Corporate Profile Employer/Employee Relationships Trending Legislation Tech Support WPA3 Operating System IT Budget Legal Law Enforcement Hard Drive Wireless Technology 5G Transportation Solid State Drive USB Network Congestion Digital Personal Information Safety E-Commerce Virtual Assistant G Suite Cabling IT Technicians Private Cloud Geography Humor Websites IBM Backup and Disaster Recovery Proactive Maintenance Managed IT Service Cookies End of Support Specifications Hacker Remote Worker Update Mobile Cortana Data Breach Finance Hard Disk Drives Computer Care WannaCry Education Fleet Tracking Tech Terms Gadget Cache Google Drive Bookmarks Taxes Hard Disk Drive Social Networking Human Error Spyware Permissions Virus Star Wars Firefox Features Wasting Time Mirgation High-Speed Internet Office Tips Statistics SharePoint Break Fix Nanotechnology Mail Merge Monitoring ROI Staff Technology Laws Authentication Shortcut Asset Tracking Theft Hotspot Recycling Avoiding Downtime Techology Favorites Teamwork Solid State Drives Black Friday Black Market Motherboard MSP Permission Computer Repair Fraud Crowdsourcing Utility Computing Lenovo Electronic Health Records Database Disaster Migration Development Bluetooth Downloads Dark Web Notifications Screen Reader Address Consulting Notes Software Tips Operations Botnet Managing Stress Unsupported Software Heating/Cooling Unified Threat Management Authorization WiFi VoIP Mobile Computing Display Technology Tips OneNote Financial Apple Sports Language eWaste 3D Printing Time Management Disaster Resistance Conferencing Shared resources Options Physical Security Cyber Monday Spam Test Superfish Cyberattacks Voice over Internet Protocol Cybercrime Business Growth Chatbots Cables Dark Data Multi-Factor Security YouTube Data Warehousing Smart Tech Social Engineering Managed Services Provider PowerPoint Wearable Technology Enterprise Content Management Mobile Data Servers User Error GPS Mouse Employee-Employer Relationship Procurement Google Maps Computing Infrastructure Telephony Proactive IT Meetings OneDrive Wireless Internet Supercomputer Cost Management Read Only Windows 7 Travel Identity Automobile Hacking Google Calendar Tracking Microsoft Excel Connectivity Search Point of Sale Professional Services Content Filtering History Emoji Vulnerabilities Printer Wires Zero-Day Threat Cleaning Printers Motion Sickness Emergency Marketing Budget Students Competition Error Regulation Database Management IP Address Sync Staffing Hiring/Firing IT Consultant CrashOverride Public Cloud GDPR Fun Mobile Office Mobile Device Managment Administrator Domains Hacks Public Speaking Information Technology Hard Drives Presentation Lithium-ion battery Relocation