Huawei reportedly set to salvage honor with sale of server x86 business

US sanctions mean the Intel chip well has run dry, so China's champion has little alternative but to offload

Huawei is reportedly poised to offload its x86 server business after US sanctions left it unable to buy the silicon it needs to build boxes, according to Bloomberg.

Negotiations with possible buyers continue, with the newswire reporting that the purchaser is a consortium including a government-backed buyer who has asked not to be identified – at least not yet. The value is unknown but thought to be multiple billions of yuan – a billion yuan is around US$156M.

The rumors have been swirling for a while. In July Chinese media reported the company was considering selling a portion of its x86 server business once Chipzilla's export license to Huawei expires and the flow of components comes to a grinding halt.

The Trump-era sanctions – upheld by the Biden Administration – not only prohibited American use of Chinese telecom gear, but also blocked both AMD and Intel chips from reaching Huawei.

Huawei reported a 29.5 per cent year-on-year revenue plunge in Q2 this year, which Huawei's chairman Eric Xu attributed to "a decline in revenue from our consumer business caused by external factors". The company then saw a 38 per cent year-on-year slide in Q3 revenue, although it maintained overall profitability.

This isn't the first time Huawei has sacrificed a business unit. In November 2020 it let go of its midrange smartphone brand Honor. The move was described by Huawei as an action to ensure the sub-brand's survival.

Cutting the x86 server line doesn't mean the mega-corp is out of the datacentre business, given it also has the Arm-based Kunpeng technology up its sleeve. In September 2021, the firm announced it would invest US$100M over three years for small- and medium-sized businesses to develop on Huawei cloud, signalling a commitment to that market segment.

But losing x86 servers would bite for two reasons.

One is that a lot of Huawei's server and storage sales were fries-with-that deals that came with network sales – which is why it quit UK server, storage, and networking sales once government bans saw its prospects of big carrier deals all but vanish.

While the Chinese colossus is struggling to sell much kit in the West, it's still doing well elsewhere. If it can't bundle servers, those deals will shrink and Huawei's wallet share of carrier customers will shrink.

The other is the architectural trends in telco-land – especially 5G – towards software-defined networks running on commodity servers rather than on proprietary boxes. If Huawei can't sell its own x86 servers and has to rely on third-party hardware, its software-defined networks will become a little less elegantly integrated.

The Register expects that whoever acquires Huawei's servers will remain close to the Chinese giant in the kind of partnership that works well in the carrier market. But such relationships need to be tight, as shown by the VMware/Dell tie-up to take VMware's edge and telco stack to market on Dell and Lenovo hardware designed specifically for the job.

Buying Huawei's server business would therefore be risky – there's no guarantee that the USA will allow x86 silicon to reach any other Chinese company if it might bolster Huawei's prospects. ®

Similar topics

Broader topics

Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021