Feeds

Huawei could reorganize to win Sprint deal

Must compromise to appease US and Indian security

5 things you didn’t know about cloud backup

Huawei is looking increasingly ready to make compromises to allay the security concerns of various governments. The Chinese supplier denies all allegations that it is closely connected to its country's intelligence services, but is nevertheless running into clearance obstacles in several key markets. The Indian government has vetoed some large deals that would have gone to Huawei, and now it may need to restructure in order to win its first significant foothold in the US.

Huawei is reported to be bidding for its biggest deal yet in the US, where it has a few smaller contracts, such as part of Clearwire's network, but no footprint in tier one cellcos. The London Financial Times said Sprint was close to signing the Chinese supplier for unspecified mobile equipment, but this would require clearance from US security authorities.

In contrast to Europe, where Huawei has gained market share recently with few government obstacles, the US has treated the supplier with suspicion. As in India, a desire to protect native businesses from the onslaught of the Chinese giants may be a factor, but the official reason is security concerns. In 2008, Huawei was blocked from acquiring 3Com on these grounds, but the stakes are far higher now. Not only could the vendor's cost efficiencies and LTE technology get it new operator business, but it is rumored to be interested in gaining US firms of its own. These could include Motorola's wireless infrastructure activities and a stake in the planned LTE network being planned by Harbinger Capital.

Huawei has already reportedly offered the Indian governments unprecedented access to information about its structure and ownership, to prove it is not in the hands of military or intelligence agencies. It may have to go further for the north Americans - perhaps, as the FT suggests, listing its shares on a US or Hong Kong exchange, changing its structure, or setting up a separate US subsidiary. Huawei already has one US unit in Texas, which produces public financial report filings.

In the US, an inter-agency Committee on Foreign Investment can block takeovers of sensitive US assets by foreigners on national security grounds. It rarely vetoes large contracts, but technology and telecoms can be exceptions, especially in the climate of suspicion about online espionage or terrorism.

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE accused of silencing customer gripes on social media pages
Hello. HELLO. Can EVERYTHING EVERYWHERE HEAR ME?!
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?