Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Google in China | Varun Daahal


Published on

The Presentation is about :

- Google Inc

- China Inc

What happened to Google in China story?

This Presentation is done as a part of MBA class assessment in 2010.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Google in China | Varun Daahal

  1. 1. Google in CHINA By VARUN DAAHAL K * All the data is collected from Internet. I don't hold any ownership. Analysis is purely based on my understanding and perception
  2. 2. GOOGLE Inc., <ul><li>Incorporated in 1998 </li></ul><ul><li>by </li></ul><ul><li>Sergey Brin & Larry Page </li></ul><ul><li>Google hosts & develops </li></ul><ul><li>A number of internet </li></ul><ul><li>-based services & </li></ul><ul><li>products </li></ul><ul><li>“ a global technology leader focused on improving the ways people connect with information.” </li></ul>
  3. 3. CHINA Inc., <ul><li>Population > 1.6 Billion </li></ul><ul><li>Joined WTO in 2001 </li></ul><ul><li>Committed to Economic Reform </li></ul><ul><ul><li>abolished market Impediments </li></ul></ul><ul><ul><li>Lower tariffs </li></ul></ul><ul><ul><li>became an attractive market </li></ul></ul>
  4. 4. Journey….. into CHINA <ul><li>Yahoo! First entered China in 1999 </li></ul><ul><li>Baidu incorporated on January 18, 2000, is a Chinese web services company in Bejing </li></ul><ul><li> is a search engine company incorporated on August 2000 in Bejing </li></ul><ul><li>Google entered china in 2001 </li></ul>
  5. 5. 301, 302 Redirects 404, 503 Error
  6. 6. GOOGLE BACKEND <ul><ul><ul><ul><ul><li>Google Fundamentals </li></ul></ul></ul></ul></ul><ul><li>Google's corporate culture </li></ul><ul><li>&quot;you can make money without doing evil,” </li></ul><ul><li>&quot;you can be serious without a suit,&quot; and </li></ul><ul><li>&quot;work should be challenging and the challenge should be fun.” </li></ul><ul><li>Mission : </li></ul><ul><ul><li>“ to organize the world’s information and make it universally accessible and useful ” </li></ul></ul><ul><li>Informal Corporate Motto: “ Don’t be Evil ” </li></ul><ul><li>Principles before Profit </li></ul>
  7. 7. CHINA BACKEND <ul><li>China maintains diplomatic relations with most major countries in the world </li></ul><ul><li>Politics : Communist Party - totalitarian regime </li></ul><ul><li>( with heavy restrictions remaining in many areas like: </li></ul><ul><li>the Internet , the press, freedom of assembly, freedom of religion ) </li></ul><ul><li>Ongoing challenge: </li></ul><ul><ul><li>How to maintain its tight control of all major institutions , while allowing the free flow of money and information required in a market economy. </li></ul></ul>
  8. 8. Name of the Game China took a two-pronged approach to censoring the Internet 1) First, authorities restricted the production, development, and dissemination of improper content. 2) Then, authorities monitored the perusal of content or receipt of information. “ Harmful ” content included material concerning democracy (e.g., freedom), religious cults (e.g., Falun Gong), or antigovernment protests (e.g., Tiananmen Square)
  9. 9. Google Move <ul><li> that was housed in the United States but that could handle search requests originating within China. </li></ul>China’s Move <ul><li>“ Great Fire wall of CHINA ”, with help of CISCO </li></ul>
  10. 10. The Fork move : “Chinese Google.” <ul><li>Baidu, (mentioned in the beginning) </li></ul><ul><li>meaning “100 times,” </li></ul>
  11. 11. Google & Other moves <ul><li>Google involved outside experts on china </li></ul><ul><li>Called upon talented in-house engineers </li></ul><ul><li>Gathered mindful of Potential pitfalls they could face </li></ul><ul><li>Launched, Chinese version locatted in china </li></ul><ul><li>“ hackivists,” in China </li></ul><ul><li>Many used proxy servers </li></ul><ul><li>“ Psiphon” software to send & receive encrypted messages to a trusted computer in another countries </li></ul><ul><li>DynaPass, UltraSurf, Freegate, and Garden Networks softwares—by word of mouth, radio, or underground newspaper. </li></ul>
  12. 12. CHINA’S Counter moves <ul><li>Imposed Various yet Vague Rules </li></ul><ul><li>Cisco helped develop PoliceNet </li></ul><ul><li>35,000 Internet Police </li></ul><ul><li>JingJing, Chacha Police officers ( On Computer screen) </li></ul><ul><li>Public pledge of Self Regulation & Professional Ethics </li></ul><ul><li>Installing software in all cyber cafe's & submitting ID proof’s for browsing </li></ul><ul><li>$800 million “Golden shield” for Surveillance </li></ul>
  13. 13. In the End <ul><li>Google had agreed to Chinese censorship demands only after authorities successfully blocked access to </li></ul><ul><li>Finally In January 2006,, which was located in China was actively subjected to Chinese filtering </li></ul><ul><li>Now, </li></ul><ul><li>Users visiting are now being redirected to, </li></ul>
  14. 14. BOTTOM LINE
  15. 15. Moral of the Story <ul><li>Understand the Landscape </li></ul><ul><li>Laws of the Land </li></ul><ul><li>Plan Exit Strategy </li></ul>
  16. 16. Any Queries?
  17. 17. Information SOURCES <ul><li>Business Round Table Case study on Google Inc., </li></ul><ul><li>Green leaf Publications: Google on how to deal with China </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  18. 18. Pro-Democracy Movement <ul><li>A mass protest in Tiananmen Square, a large plaza in the center of Beijing. On the night of June 3 and the morning of June 4, the Chinese government responded with a massive display of military force </li></ul><ul><li>Tanks over-ran the square and the streets leading to it, and soldiers opened fire on protesters, killing as many as 3,000 and injuring thousands more. The crackdown—known as the June 4th incident or sometimes simply as “ Six-Four ”—effectively suppressed the pro-democracy movement. </li></ul>
  19. 19. China Ruling party
  20. 20. Goole Moves, Other Moves <ul><li>“ hackivists,” these groups and individuals had developed a number of increasingly sophisticated techniques for defeating the firewall </li></ul><ul><li>Many used proxy servers as intermediaries between Chinese users and blocked websites. </li></ul><ul><li>University of Toronto developed software called “Psiphon” to allow users to send encrypted messages to a trusted computer in another country and receive encrypted infor- mation in return </li></ul><ul><li>DynaPass, UltraSurf, Freegate, and Garden Networks softwares & News of these technologies traveled the old-fashioned way—by word of mouth, radio, or underground newspaper. </li></ul>