Feeds

Russia, China could ban western tech if they want to live in the PAST

Top apps and hardware don't appear overnight

Intelligent flash storage arrays

Russia and China have both, of late, threatened western IT companies with difficult trading conditions or banishment if they can't prove their products are secure.

The reason for their ire is, of course, Edward Snowden's many revelations about US intelligence activities.

The response to his leaks have been widespread and fierce.

China has banished Windows 8, booted Symantec and Kaspersky from its approved vendor list, probed Microsoft, done nasty things to Qualcomm and pondered a ban on IBM.

It's also been suggested China's government is making it plain to local buyers that they shouldn't shop with the likes of EMC or Oracle, and instead prefer local vendors.

Russia's been belligerent too. Last week it asked Apple and SAP to drop their pants and reveal their source code. It's also taken a swipe at Google and social networks by passing a law insisting personal data about Russians user data be stored on Russian soil and threatened to create its own ARM CPUs and stop buying x86s.

Canalys Senior Analyst Nushin Vaiani says “This type of activity could have devastating impacts on the IT market in general and businesses may find themselves at the mercy of their local governments when making buying decisions.

But Gartner analyst Martin Reynolds told The Reg that if a nation eschewed a technology like x86 CPUs it would be shooting itself in the foot.

“When you go with an off-the-shelf ARM core it has a performance rating of one,” Gregory told The Register. The kind of customisation performed by a Qualcomm improves things to 1.5 and the likes of AMD or IBM get things to 2.5. Intel, he said, can get to a performance rating of six.

Russia, or another nation, could throw money and time at a chip design process, but would still end up behind commercial products. Whether Russia could tolerate operating inferior equipment is anyone's guess, but it is clearly not in its national interest to work with inferior computers.

Another Canalys analyst, Karissa Chua, says wholesale replacements aren't likely.

“It is highly unlikely that the Russian government will replace all IT products with Russian owned as they do not have the expertise to handle it on their own and it will take a long time to carry out a complete overhaul of their existing infrastructure,” she said.

Gartner's Reynolds says it may, however, make it easier for emerging software competitors, especially SaaS players, to win business behind the old Iron Curtain or the Great Firewall.

Canalys' Chua says Russia will try to make its mark in other ways.

“It is likely that there will be much stringent requirements when it comes to government procurement,” she says, and vendors aren't likely to enjoy the results.

“The impact tends to be greater in China and Russia as there are relatively more state owned enterprises which will be affected by the new regulations. Foreign vendors will have to work more closely than ever to ensure that they are complying with the individual governments’ regulations."

Those regulations won't just be about security. “One thing becoming clear is that countries are beginning to use technology as a political tool,” says Canalys' Vaiani.

China, in particular, has demonstrated that it is willing to pick winners. And by strongly encouraging local businesses to shop with local suppliers, it also gives Chinese businesses the chance to grow in a comfortable environment.

“China has a huge local market,” says Gartner's Reynolds. “That gives the likes of Lenovo a great platform to address the rest of the world.” ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.