How will Microsoft, Yahoo respond to Google's China challenge?
Analysts say Google rivals may face user criticism if they don't fight Chinese censorship
Computerworld - Google's move to challenge Chinese censorship demands and threaten to pull its business from the country could pressure search rivals like Microsoft and Yahoo to follow suit.
Analysts said Google should generate positive reviews from its challenge to the Chinese government, which could prove a problem for rivals that still censor search results for users in the country.
"It depends on what ultimately happens," said Dan Olds, an analyst at Gabriel Consulting Group. "If Google pulls out of China, I would like to think it would give other companies the guts to stand up to it and any other country that wants to censor content and use them to settle scores with critics."
Google announced late last night that a major attack launched against its network from within China had forced it to consider pulling its business out of the country. After the attack, which was aimed at exposing the Google Gmail accounts of Chinese human rights activists, the search vendor said it was in the process of reconsidering earlier agreements with the government to censor search results of users in China.
In an e-mail to Computerworld, a Microsoft spokesman said the company has found no evidence that its network was hacked in China. "We have no indication that any of our mail properties have been compromised," he wrote. The spokesman, however, would not respond to questions about whether Google's move will prompt it to also consider pulling out of China.
Yahoo did not respond to a request for comment.
After noting that Google's image should benefit from its challenge to the Chinese government, industry observers said they were closely watching for subsequent moves by Microsoft and Yahoo, which run the second and third most popular search engines worldwide.
Rob Enderle, an analyst at the Enderle Group, said it will now be harder for other companies to go along with China's high-handed tactics.
"I think we would all appreciate it if companies more often drew lines in the sand protecting their customers even against large hostile governments," said Enderle. "This is the way that the Obama administration would like all companies to behave -- put doing what is right ahead of what is financially expedient. It would be nice if this was a trend but with executives focused on quarterly results and the bottom line that is doubtful."
And while Google's rivals will likely face increasing pressure to deal more harshly with the Chinese government, they may also find themselves in a position to pick up some of Google's market share -- and advertising revenues -- in the country.
"This gives Google's rivals a big business opportunity," said Olds. "With Google out of the market, it gives them a clearer path to win a big chunk of the market -- but at what cost?" The cost could be measured in good will and reputation, he added.
"This may prevent further investment and transfer of other technology to China," said Jim McGregor, an analyst with In-Stat. "This is likely going to cause others to proceed cautiously, if at all."
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, send e-mail to email@example.com or subscribe to Sharon's RSS feed .
Read more about Government IT in Computerworld's Government IT Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses
- IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center
- IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results
- Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data... All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts