Recent Posts

Pages: [1] 2 3 ... 10
1
As more PC owners avoid Windows 11 than ever before

Quote
Despite the serious disadvantages, people are still flocking to Windows 10

   ► The number of people using Windows 10 increased in April 2024

   ► Some 14,000,000 PC users turned to the 9-year-old operating system

   ► The increase came at the expense of its successor, Windows 11

   ► PC users flocked to Windows 10 despite the incoming end of support

   ► It will cost as much as $427 (£337.29) to continue using Windows 10

Microsoft cannot kill Windows 10.

The US company has already confirmed that it will end support for Windows 10 in October 2025 — cutting off millions of PCs from essential security updates and bug fixes. Without these critical software patches, Windows 10 users will be vulnerable to attacks from hackers and other data breaches.

Due to the popularity of Windows 10, Microsoft has confirmed plans to extend its Extended Security Updates (ESU) subscription to everyday users for the first time. Previously reserved for enterprise customers, the annual plan could cost as much as £330 to unlock an extra three years of important security updates.

Many assumed the fast-approaching deadline — not to mention, the threat of having to spend hundreds on software updates — would spur millions of PC users still relying on Windows 10 to finally make the switch to its successor, Windows 11.

But the number of people using Windows 10 every day is increasing, according to the latest figures from Statcounter. The popular website, which monitors and analyses global web traffic to calculate the popularity of devices, web browsers, and operating system, has recorded a rise in the number of people using Windows 10.

PCs powered by this almost decade-old operating system topped 70% for the first time since late 2023.

The increase recorded in April 2024 was roughly 1%, Statcounter shows. During the same time frame, Windows 11's market share dipped slightly to 25.69%, suggesting the increase in people using Windows 10 came at the expense of its successor. That's a serious blow for Microsoft.

Microsoft has previously confirmed there are roughly 1.4 billion Windows PCs worldwide. At that scale, a 1% increase in people flocking to Windows 10 equates to an astonishing 14,000,000 PC users.

With the launch of a new operating system, we'd typically expect to see the number of devices powered by its predecessor declining over time. This happens as users voluntarily switch to the latest software to get their hands on exciting new features or a stylish new appearance and as more devices with the latest operating system preinstalled are sold.

It's rare to see an older operating system regain traction in its twilight years — especially with the threat of the end of support and a new fee looming less than 18 months away.

Those who want to keep using Windows 10 until 2028 will need to spend as much as $427, roughly £337.29 converted, to continue to receive critical patches for security flaws and compatibility issues in Windows 10, Microsoft has confirmed.

If you missed the memo, Microsoft will end support for Windows 10, which was released worldwide in July 2015 and was widely marketed at the time as the “final” iteration of Windows, on October 14, 2025.

Known as Extended Security Updates (ESU), this subscription unlocks up to three years of additional support for ageing operating systems, extending the lifecycle of Windows 10 until the end of 2028. ESU was previously reserved for businesses to offer 36 months of additional time to update their entire fleet of PCs and ready proprietary software to work with the latest operating system from Microsoft.

Windows 10 marks the first time Microsoft will offer Extended Security Updates to anyone.

Microsoft has published the cost of Windows 10 ESU for enterprise users, with the first year setting you back $61 (£48.19). To incentivise Windows 10 users to upgrade to the next iteration of the desktop operating system, Microsoft will double the cost every year. The full breakdown of costs is as follows:

   • Windows 10 ESU — $61 (£48.19) for first year

   • Windows 10 ESU — $122 (£96.39) for second year

   • Windows 10 ESU — $244 (£192.78) for third and final year

This is not the cost for consumers, with Microsoft promising that pricing for the average Windows 10 user “will be shared at a later date.” However, we're likely to see the same pricing structure, with costs doubling each year to try to push people to finally switch away from Windows 11.


Windows 11 reworks the design of the operating system and brings the iconic Start Menu to the center
of the screen for the first time MICROSOFT PRESS OFFICE
Microsoft describes the optional Extended Security Updates subscription as “a last resort option for customers who need to run certain legacy Microsoft products past the end of support.” It offers a maximum of 36 months of additional security updates and emergency bug fixes.

“Extended Security Updates are not intended to be a long-term solution but rather a temporary bridge,” the Redmond-based company explains in a blog post. “You can purchase ESU licenses for Windows 10 devices that you don’t plan to upgrade to Windows 11 starting in October 2024, one year before the end of support date.”

Businesses who are subscribed to a cloud-based solution like Intune or Windows Autopatch will enjoy a 25% discount on Extended Security Updates. Microsoft is offering an even more generous discount to schools, with the first year of ESU dropping to just $1 (79p), this doubles to $2 for year two and $4 for the final year.

Prices have risen sharply for Windows users looking to put off the upgrade to the next major operating system release from Microsoft. When it introduced the ESU plan was introduced for Windows 7, Microsoft charged £9.57 for the first year, rising to £19.15 in the second year.

That cost was per device, so things can become pretty pricey if you have a few devices, like a laptop, desktop PC, or tablet.

Some industry watchers had speculated that Microsoft would be forced to offer extended support for Windows 10 at no extra cost due to the vast number of PCs still powered by the operating system.

However, despite the widespread usage, Microsoft is seemingly set on charging for the privilege.

This has allowed rival Google to take advantage of the situation to bolster its own market share of desktop PCs by offering a free upgrade for all Windows 10 users to its ChromeOS system, which is based on the world's most popular web browser and boasts years of security updates and support.

There’s no guarantee that your current PC will be able to upgrade to Windows 11. With this rebooted operating system, Microsoft introduced several strict system requirements.

Windows 11 only officially supportsIntel’s 8th Generation (known as Coffee Lake) or Zen 2 CPUs and newer, leaving millions of devices sold with Windows 10 preinstalled unable to upgrade.

Following a public backlash, Microsoft did add a number of exceptions to its list of supported chipsets, including the 7th Generation Intel Core i7-7820HQ – a processor that was used in the Surface Studio 2, an all-in-one desktop machine that cost £3,549 at launch back in 2018.

Nevertheless, this marks the first time that Microsoft has enforced such specific processor requirements with its operating system upgrade.

In comparison, Windows 8 and Windows 10 only stipulated a 1GHz processor, at least 1GB of RAM, and 16GB of available storage. Windows 11 requires an Intel processor first launched in October 2017 as well as 4GB of RAM and 64GB of storage.

According to Microsoft, the stricter silicon requirements enable a better experience for those running Windows 11, with a 60% reduction in malware thanks to the requirements that “enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI) and Secure Boot.” It also claims a “99.8% crash-free experience” on machines with components from its list of supported hardware.

source
2
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine -- in depth -- every component of DevSecOps.

In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology and how it impacts every part of our cybersecurity systems.

You'll explore the shared responsibility model at the core of DevSecOps, as well as the people, processes, and technology at the heart of the framework. You'll also find:

   • An insightful overview of DevOps and DevSecOps principles and practices

   • Strategies for shifting security considerations to the front end of the development cycle

   • Ways that the standard security model has evolved over the years and how it has impacted our approach to cybersecurity

A need-to-read resource for security leaders, security engineers, and privacy practitioners across all industries, The DevSecOps Playbook will also benefit governance, risk, and compliance specialists who seek to better understand how a transformed approach to cybersecurity can impact their business for the better.

Follow this link to get your copy of 'The DevSecOps Playbook: Deliver Continuous Security at Speed' for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
3


Microsoft has been saying for a while now that it has been working on a mobile game store to compete with the Google Play Store and Apple's iOS App Store. Today, we got a time frame for when that store will actually become available.

Bloomberg reports that Microsoft Xbox President Sarah Bond revealed that its mobile game store will launch sometime in July. Bond made that announcement as part of an interview during the Bloomberg Technology Summit. A video of her remarks was also posted on the Bloomberg Live X (formerly Twitter) account.





Bond said that the store will be released on the web first, rather than as an actual mobile app store. Bond stated the web-based store would be able to reach a bigger audience and more devices.

At first, the mobile game store will offer games that are currently owned like Microsoft. That would include games like the popular Candy Crush titles from King, which Microsoft acquired when it bought Activision Blizzard in October 2023. It would also likely include games like Minecraft and Call of Duty Mobile.

Bon said there is a plan to release third-party mobile games via the new store at some point but details of how that will work have yet to be revealed. Bond also suggested that Microsoft would like to sometime in the future extend the store beyond the web, which may mean it could launch an actual third-party gaming app store for Android and iOS.

Bond didn't offer an actual name for the web-based store, She also didn't state if there will be any testing of the store for Xbox Insiders before it officially goes live.

source
4
Huawei / US further restricts chip sales to Huawei by revoking export licenses
« Last post by javajolt on May 08, 2024, 05:53:57 PM »


The US government has revoked some licenses that allowed American chip companies to export semiconductors to Huawei. This reflects an ongoing effort by the Biden administration to limit the Chinese tech company's access to key technologies.

The Commerce Department (via CNBC) said that it is continually assessing how export controls can protect national security and how the geopolitical landscape and the technology industry are evolving. As part of that review, the US has revoked certain licenses for the sale of chips and related technologies to Huawei.

While the Commerce Department did not specify which licenses or companies were affected, this is the latest move by the Biden administration to crack down on Huawei.

Quote
As part of this process, as we have done in the past, we sometimes revoke export licenses. But we can confirm that we have revoked certain licenses for exports to Huawei

It also comes after former President Trump placed Huawei on a trade blacklist in 2019, citing security concerns. That blacklist prohibited US companies from selling technology, such as 5G network equipment, to Huawei without proper authorization.

In 2020, the US tightened those restrictions by requiring foreign firms using American manufacturing equipment to obtain a license before exporting semiconductors to Huawei. Now, by revoking some previous licenses, the administration is signaling that it does not want Huawei to have access to even limited supplies of US-made or US-connected chips. This will put further pressure on the Chinese technology company, which has developed its own chips in response to sanctions but still relies on foreign suppliers for some components.

The license revocation will also affect chipmakers that supply Huawei. Companies like Intel and Qualcomm, which still sell some chips to Huawei under license, have warned that their revenues could take a bigger hit as Huawei ramps up internal production and captures more of the domestic Chinese market with self-sufficient devices.

On the other hand, Apple is witnessing a substantial decrease in iPhone shipments in China, with a 33% reduction in February from the previous year. The company's struggle began with Huawei's resurgence in the premium smartphones like Mate 60 Pro.

source
5


Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address. The researchers believe it affects all VPN applications when connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

Reading, dropping, or modifying VPN traffic

The effect of TunnelVision is “the victim's traffic is now decloaked and being routed through the attacker directly,” a video demonstration explained. “The attacker can read, drop or modify the leaked traffic and the victim maintains their connection to both the VPN and the Internet.”



The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network. A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel. By using option 121 to route VPN traffic through the DHCP server, the attack diverts the data to the DHCP server itself. Researchers from Leviathan Security explained:

Quote
Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway. When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it.

We use DHCP option 121 to set a route on the VPN user’s routing table. The route we set is arbitrary and we can also set multiple routes if needed. By pushing routes that are more specific than a /0 CIDR range that most VPNs use, we can make routing rules that have a higher priority than the routes for the virtual interface the VPN creates. We can set multiple /1 routes to recreate the 0.0.0.0/0 all traffic rule set by most VPNs.

Pushing a route also means that the network traffic will be sent over the same interface as the DHCP server instead of the virtual network interface. This is intended functionality that isn’t clearly stated in the RFC. Therefore, for the routes we push, it is never encrypted by the VPN’s virtual interface but instead transmitted by the network interface that is talking to the DHCP server. As an attacker, we can select which IP addresses go over the tunnel and which addresses go over the network interface talking to our DHCP server.


A malicious DHCP option 121 route that causes traffic to never be encrypted by the VPN process.

We now have traffic being transmitted outside the VPN’s encrypted tunnel. This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server. We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.

The attack can most effectively be carried out by a person who has administrative control over the network the target is connecting to. In that scenario, the attacker configures the DHCP server to use option 121. It’s also possible for people who can connect to the network as an unprivileged user to perform the attack by setting up their own rogue DHCP server.

The attack allows some or all traffic to be routed through the unencrypted tunnel. In either case, the VPN application will report that all data is being sent through the protected connection. Any traffic that’s diverted away from this tunnel will not be encrypted by the VPN and the Internet IP address viewable by the remote user will belong to the network the VPN user is connected to, rather than one designated by the VPN app.

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. Network firewalls can also be configured to deny inbound and outbound traffic to and from the physical interface. This remedy is problematic for two reasons: (1) a VPN user connecting to an untrusted network has no ability to control the firewall and (2) it opens the same side channel present with the Linux mitigation.

The most effective fixes are to run the VPN inside of a virtual machine whose network adapter isn’t in bridged mode or to connect the VPN to the Internet through the Wi-Fi network of a cellular device. The research, from Leviathan Security researchers Lizzie Moratti and Dani Cronce, is available here.

source
6

Credit: A. Strode/Shutterstock

Now that so many of us are signed up to cloud storage services, USB drives aren't as ubiquitous as they once were, but they still have their uses. One of those uses is running an entire computer system entirely on the USB stick, which you can then bring anywhere. Your files and apps are always with you rather than being left at home or at the office, and if you're at a new desk you don't have to spend time getting everything set up the way you want—just plug in the drive, and you're up and running.

How it works

Of course you can't take an entire PC around with you on a USB stick—you need a monitor, a keyboard, a motherboard, and everything else. That said, all of the software and storage can be handled on a portable USB drive: As long as you have access to a computer with a spare USB slot, you can run your portable PC.

There's no interference with the existing setup on the computer you're using either, so you can borrow one from a colleague or a friend without causing them any hassle. You reboot the PC, tell it to load up your USB stick rather than what's on the internal drive, and your operating system appears. When you're done, shut down the computer, unplug your USB drive, and you've left no trace behind.


All you need to set this up is a USB drive. Credit: Lifehacker

It's great if you're always moving between locations, and want to have access to the same desktop interface wherever you go. It can also be useful if you're trying to troubleshoot problems with your hardware setup, or if you want to try out different operating systems without installing anything permanently on your computer.

You do need to bear in mind some caveats, though. A USB drive isn't as fast or as capable as a full desktop or laptop system, so you're limited to basic computing tasks. This doesn't work on Macs either, because of their different architecture—if you need to run a separate system on macOS, the best approach is setting up a virtual machine.

Choosing an OS

When it comes to picking an operating system for your USB PC, you can use Windows if you'd like to—via a third-party tool such as WinToUSB — though you will need a paid license for it, and the user experience isn't the best. A better idea is to go for a flavor of Linux: Not only is the software free to use, it's also more lightweight, which means you're not putting as much stress on the USB drive and everything should run more smoothly.

If you're new to Linux, it's an open source desktop OS that comes in a wide variety of flavors known as distros. It doesn't offer the same kind of broad software selection or hardware support as Windows or macOS, but all the core computing apps are covered: You can browse the web, check your email, do some work, edit images, and plenty more on Linux.


Puppy Linux is one of your options here. Credit: Puppy Linux

When it comes to choosing the distro you want to use, it's really up to you: Just about any version of Linux can be run fairly easily from a USB stick. Make sure you look for a feature called "persistence" in the distro documentation, though—this means you're going to be able to save settings and files to the USB drive, rather than starting up fresh with a clean slate every time you boot it up.

Ideally, you want to choose a distro that's lightweight and basic, to give you the smoothest operation possible. Puppy Linux and Linux Lite are often recommended for this particular purpose, while Tails is great if security is a priority—it automatically connects to the Tor network when you go online. Ubuntu is an excellent choice too, offering a polished interface and plenty of help documentation.

Getting started

Head to the official website for your Linux distro of choice, then look for an ISO download—this is essentially the operating system in its entirety. Downloads like this can often run to several gigabytes in size, so you might have to wait a while. It's also worth checking in the distro's documentation to see if there are any notes or recommendations regarding USB installation.

Next, you need a program to put the ISO on the USB drive for you—not just to copy over the file, but to make the drive bootable. There are a few options here, including Rufus, but we've gone for Etcher for this guide: It's really simple to use, and you can run it on both Windows and macOS (and, indeed, Linux).


Etcher can flash a drive for you in minutes. Credit: Lifehacker

Fire up Etcher, and you'll see there are three stages: Pick Flash from file to pick the ISO from disk, then Select target to choose a USB drive connected to your computer, and then click Flash to complete the operation. As far as USB drives go, a capacity of at least 8GB is recommended, plus the fastest read/write speeds you can find—you might find more requirements listed on the pages of the distro you've chosen.

With all that taken care of, you can use your USB drive by putting it in a spare USB port on any computer, then restarting the computer and choosing to boot from the USB stick. How this is done varies, but it usually involves pressing a key to choose a boot device while the computer's starting up—look for a message on screen or check the documentation that came with the computer, if you're not sure.

source
7
Return to the Windows of yesterday or a month ago


(Image credit: xM4ddy)
Many Windows 11 users are up in arms after Microsoft added unremovable ads to its start menu in its latest update. Thankfully, a solution has arrived in "Oh F*ck Go Back" (OFGB), a program that allows users to disable every flavor of ad on the operating system with the click of the mouse.

OFGB comes from Maddy (@xM4ddy), a programmer who drives Arch Linux daily rather than Windows and was inspired to build the novelty tool for Windows anyway. The program presents a simple-to-use GUI that itemizes the ads you can remove, highlighting how many ads we enjoy on Windows now. Each checkbox clicked safely edits the registry for you, saving users undue confusion and the risk of breaking their OS with a typo. The program has found moderate levels of virality through Reddit and Twitter reposts and has even attracted a few thousand users. We could reach her for comment, asking about her reasons for leaving Windows behind, the tool's existence, and what life is like on the Linux side of the fence. Some responses have been minimally edited for clarity.

"I think the most important thing the tool has done is getting people to talk about ads and their place in paid software like Windows," said Maddy about OFGB. She continued, saying the program "is getting people to consider taking a look at alternative software like Linux. Remember, competition is good for consumers." Running Linux would make removing ads from your operating system a breeze; a brief trip to the console might solve the problem. "I only made this after Windows gave me an error when I ran 'sudo pacman -R ads.'"

We asked Maddy why, as a Linux user, she felt the need to build this tool for Windows. She responded, "I was getting more and more annoyed by ads in random places and decided to try to find an easy fix. After coming across a .reg file by Shawn Brink, I found my answer. After thinking more about it, I figured it may be accessible to more people if there was a GUI so that less tech-savvy people could easily set the registry keys without needing any knowledge of the registry."

Our next question for Maddy was about Windows and Linux and what prompted her to leave. "I switched over to Linux when I started programming and getting into tech when I was younger. What drew me to it was the customization it provided and the open-source nature. I was also enamored with other people's beautiful Linux setups," said Maddy. When asked if Windows could win her back, Maddy laughed, "Windows lost me a long time ago by adding more and more telemetry, ads, and the lack of easily configurable options. As soon as the last few programs that I just can't get away from are running right under Wine or Proton I plan to ditch it completely."

Our huge thanks to Maddy for her comments on her project. If you want to clean up the ads on your Windows 11 computer, you can find OFGB version 0.2 on GitHub. Windows' most recent update is undoubtedly less than popular as it brought ads and bugs that break your VPNs - a problem that has yet to be solved. If you want to follow Maddy into the wondrous world of Arch Linux, it recently beat Windows 11 in gaming performance testing, along with a few other more user-friendly Linux distros.

source
8
Multi-million dollar Cheyenne supercomputer auction ends with $480,085 bid — buyer walked away with 8,064 Intel Xeon Broadwell CPUs, 313TB DDR4-2400 ECC RAM, and some water leaks.

One lucky buyer had their day yesterday as the U.S. government's online auction for selling its Cheyenne supercomputer ended at $480,085. The auction, first covered by Tom's Hardware on Wednesday, has closed after 27 bidders contended for a piece of supercomputing history.

The Cheyenne supercomputer's 6-figure sale price comes with 8,064 Intel Xeon E5-2697 v4 processors with 18 cores / 36 threads at 2.3 GHz, which hover around $50 (£40) a piece on eBay. Paired with this armada of processors is 313 TB of RAM split between 4,890 64GB ECC-compliant modules, which command around $65 (£50) per stick online. For a deeper dive into Cheyenne's components and prime performance, check out our initial sale coverage. Unfortunately for buyers, none of the Cheyenne supercomputer's 32 petabytes of high-speed storage are being sold with the lot. Still, a savvy eBay seller could flip the processors and RAM across the machines for around $700,000 (£550,000), making a hefty profit.

This estimate assumes all of the CPUs and RAM sticks work, which is invalid. The auction site disclaims that "approximately 1% of nodes experienced failure [over the last six months], primarily attributed to DIMMs with ECC errors, which will remain unrepaired." This high failure rate is the reason for the sale, with upkeep made challenging by the fact that Cheyenne "is currently experiencing maintenance limitations due to faulty quick disconnects causing water spray." These two compounding issues have cost the Cheyenne team undue downtime and repair costs, leading them to look for a replacement.

The Cheyenne supercomputer array had a rigorous workflow over seven years of operation to earn its wear and tear. The array's services were used by scientists across the state of Wyoming and the rest of the country when needed. The 5.34 petaflops system was mainly used for weather and climate studies, helping the National Science Foundation better study climate change and other Earth-related sciences.

It isn't easy to provide an analysis of how much the government stands to lose with the sale of Cheyenne. We could not find data for the price of Cheyenne at construction, but its predecessor, Yellowstone, was quoted at $25-35 million before its construction. Some of this cost may be attributed to buildings and infrastructure surrounding the supercomputer. Still, with Cheyenne's replacement, the Derecho, costing $35-40 million from HP, Cheyenne likely initially cost around this 8-figure range as well. At a conservative estimate of $25 million for the array to be constructed, the auction sale is only 2% of the sticker price of Cheyenne. Good luck finding a 98% off sale at the following government surplus sale.

The buyer will have the joy of moving Cheyenne's 30 server racks (28 processing racks, two air-cooled management racks) out of the facility themselves; the government is not providing transport or including any Ethernet or optical cabling needed to get the machine up and running. What use a buyer might have for a malfunctioning and outdated supercomputer array is known only to them, but if you see a flood of Xeon chips hitting the market, you'll have a pretty good idea why.

source
9
Huawei / Huawei steals market share from Apple despite Western sanctions
« Last post by javajolt on May 05, 2024, 05:53:17 PM »

Huawei released a new high-end smartphone in August made largely with home-grown microchips
- STR/AFP via Getty Images
Huawei’s profits have surged more than six-fold after the Chinese technology champion overcame Western sanctions to steal market share from Apple.

The Shenzhen-based company reported a 19.6bn yuan (£2.1bn) profit in the three months to March, up 564pc on the same period a year ago.

This comes despite facing US export controls and bans on overseas sales of its networking equipment in the last year, including in the UK.

The company released a new high-end smartphone in August that was made largely with home-grown microchips.

This proved to be a surprise hit among Chinese consumers and helped Huawei squeeze sales of Apple’s iPhone in the Far East.

It has also been developing advanced artificial intelligence chips in an attempt to compete with Silicon Valley giant Nvidia, which has seen its sales to China curbed by the Biden administration.

China has invested heavily in catching up to the US and Taiwan in advanced semiconductor production, reaping rewards for companies like Huawei that have struggled to get hold of foreign-made chips.

Huawei said revenues had risen by 37pc in the quarter to 178.5bn yuan. The sales came in the critical Chinese New Year period when shoppers typically spend heavily on electronics.

This marks a stark reversal in Huawei’s fortunes after chief executive Guo Ping said in 2020 that the company’s goal was “survival” after “nonstop aggression from the US government”.

In December, the company said it was “back on track”, claiming it had weathered the storm after reporting an increase in annual revenues.

According to research firm Counterpoint, Huawei’s smartphone sales in China rose by 70pc in the first quarter of the year, putting it almost level with Apple.

By comparison, Apple’s sales are believed to have fallen sharply. The US tech giant is expected to reveal the scale of its China sales fall on Thursday when it reports results for the first three months of the year.

China has discouraged government employees from bringing foreign-made devices to work.

Huawei is investing heavily in smart car technology, seeking deals with major carmakers.

source
Pages: [1] 2 3 ... 10