Feeds

China rips Apple out of govt IT mail-order catalogue – report

So much for the Tim Cook love-in*

Choosing a cloud hosting partner with confidence

+Comment Apple's most popular products are set to vanish from Chinese officials' boardrooms after the People's Republic reportedly struck them off the official procurement list.

Ten gizmos including the iPad, iPad Mini, MacBook Air and MacBook Pro can no longer be purchased for use by the Chinese state bureaucracy, Bloomberg reported unnamed officials who'd "read the document" as saying.

Although its accuracy has not yet been officially confirmed, the list appeared to show that Chinese bureaucrats can still purchase products built by Dell, Hewlett-Packard and Lenovo.

This run-down of officially sanctioned suppliers is usually produced by the National Development and Reform Commission in partnership with the Ministry of Finance. It will not be updated until January 2015, meaning that Apple could miss out on a huge chunk of potential revenue.

This means that no iThings will be bought by any of China's government ministries or local outposts. Neither will a single member of the many departments of the Communist Party be allowed to worship at the altar of Apple (or the latest model of this altar, if you want to be accurate).

Currently, there has been no official admission of this policy from China and the list of companies deemed worthy of a place on the procurement list has not been made public.

The latest one-inch-punch aimed at Apple is the latest in a list of blows the firm has suffered in China. A recent report on state-sponsored TV alleged the iPhone's tracking system was a threat to national security. It's little wonder Beijing feels threatened, after leaks from rogue NSA sysadmin Edward Snowden revealed that the US was hellbent on spying on pretty much everyone, pretty much all of the time.

China: Microsoft raids are not over yet

The State Administration for Industry and Commerce also raided Microsoft and Accenture offices in Beijing, Liaoning, Fujian and Hubei as part of an antitrust investigation.

Although Chinese government has been reticent about Apple, it has published blow-by-blow accounts of the Microsoft anti-trust case on official websites, including this ominous warning from the State Administration for Industry and Commerce (SAIC):

"Microsoft should strictly abide by Chinese laws and may not interfere in any way hinder investigation of the case, to ensure an objective and impartial investigation of the case."

The Chinese do not seem to have made the same kind of public demands of Apple, at least not yet. Interestingly, State organs aren't particularly keen on telling the world about their plans anyway, judging by the fact some parts of its websites haven't been updated for more than five years.

The SAIC's English-language news section, which is helpfully translated as "Activities and Speeches", remains untouched since 2007, when Zhou Bohua, secretary of the Party Leadership Group, creepily told "units at all levels" to "follow the guidance of the Deng Xiaoping Theory and the important thought of the Three Represents to implement the scientific development concept and the strategy of building a harmonious socialist society".

What that means, he goes on to say, is that all businesses need to help ensure other firms stick to the letter of the law.

"Efforts should be made to... crack down on illegal acts to create a standardized, orderly, harmonious and civilized market and social environment, and accelerate the building of sound social morality by giving priority to launching a campaign to promote ideological progress among the public," he roared.

+Comment

If your correspondent can wade in here with his own opinion for a bit, Apple might help to create a "harmonious and civilised" world by making a solemn promise to never, ever change the size of its laptop plug sockets ever again or vowing to keep the iPhone dock the same shape for the rest of human history.

Better still, the fruity firm might want to stop charging SIXTY-FIVE BLOODY QUID for a Macbook power cable. ®

* China got its own "dazzling day" for the launch of the latest iPhone, as well as personal visits from CEO Tim Cook, who was keen to butter up local telcos.

Beginner's guide to SSL certificates

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Here's your chance to buy an ancient, working APPLE ONE
Warning: Likely to cost a lot even for a Mac
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.