After Congress' report, what next for China's tech firms?
House intelligence report on China tech is sure to impact relations, analysts say
Computerworld - WASHINGTON -- There's a new television show, "Revolution," which looks at what happens to society after every piece of complex technology, including power generation, stops working. The reasons for this outage aren't explained.
Maybe it's China's fault. After years of allegedly building backdoors into equipment, something implanted by China went awry and accidentally turned off everything everywhere.
The prelude for this plotline was written by the U.S. House intelligence committee in its report Monday about Chinese telecommunications vendors Huawei Technologies and ZTE. The committee is telling private sector firms -- in a big headline on its website -- to "use another vendor" as it warns of "long-term security risks."
At the minimum, analysts believe the House intelligence report will bring more scrutiny to joint efforts and agreements by U.S. and China technology companies, but trade problems can't be ruled out either.
What is certain is that China is embedded in U.S. technology supply chains as it works to build its own competitive capacity. Huawei illustrates this, with more than $32 billion in revenue last year, with about 70% of its revenue coming from outside China, it said in testimony delivered last month to the House intelligence committee.
Lenovo, which bought IBM's PC division in 2005, may have just surpassed Hewlett-Packard as the world's top PC maker, Gartner says.
There are many firms in China that provide code development through its offshore outsourcing services, assemble and manufacturer everything from components to complete systems, including printers, PCs and servers for multinational firms.
U.S. firms, including Huawei rival Cisco, all have major R&D facilities in China.
To avoid serious problems, Gartner analyst Neil McDonald said tech firms will have to do more to ensure trust. Companies will have to offer more transparency about their operations, management, and source code and allow a full evaluation. Without it, "the lack of trust continues to grow and it continues to fragment," he said.
The House committee accused Huawei of not fully cooperating with its probe, particularly its relationship with the Chinese government, something the company disputes.
The trust issue isn't new and is something McDonald examined in a recent report on supply chains. Supply chains are easy targets and increasingly complex. "Hardware vendors are increasingly outsourcing not just manufacturing, but also design to OEM suppliers and contractors located in Asia and India. In some cases, established Asian suppliers are outsourcing to emerging economies, such as Brazil, Vietnam and Indonesia," the report said.
While this House intelligence report is ostensibly about two telecommunication firms, it includes broad assertions about the increasing sophistication and intensity of China's intelligence gathering efforts. It describes an "ongoing onslaught" of network intrusions originating in China.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!