Recently, a friend of mine went to repair a table and was told that his watch looked very valuable as a fake. But it didn't surprise him too much. After all, he bought the table for just a few pounds, and if you look at it carefully, you can also find that the brand on the dial is "roox ".
Now, we are more or less surprised at Brand counterfeiting. However, this phenomenon not only occurs in watches, bags, or other consumer goods, IT hardware products have also become the target of counterfeits.
KPMG, an audit firm, recently said that at least 10 counterfeits of IT products on the UK market are prevalent, resulting in an annual loss of $100 billion to the industry. For consumer products, the bigger the brand, the more likely it is to become a counterfeit target. Cisco's counterfeit products are like a bull's hair.
Counterfeit network products have occurred in the last two or three years. Although Cisco and other vendors have been blaming retailers for being not responsible enough and severely tracing fake sources, this phenomenon is still a common phenomenon. Large network vendors, such as Cisco, migrate product production to areas with low HR costs to reduce costs. A lower price means that more products are sold, which is a win-win situation for manufacturers and consumers. Manufacturing plants also make profits, but they must sell these products to network product vendors at the lowest price.
In contrast to developed regions, regions with low human resource costs do not have sufficient protection for knowledge products. Different languages and cultural backgrounds make it difficult for network product vendors to better manage local partners. Therefore, these manufacturers may produce Cisco-branded network products legally during the day, and at night, they will use the same accessories and use the same design to produce some products that exclusively flow to the black market.
Although the same accessories are used and produced by the same factory, the difference between genuine and fake products is by no means as simple as a sign. Generally, these two products adopt different quality control systems during production. Defective products that have been eliminated on the genuine assembly line may become qualified products in fake products, and consumers will not benefit from them. Because there is no difference between the sales prices of fake products and genuine products, there is no such thing as fake products at the time of purchase. It may not be found that you have purchased a fake product until your device fails and you need to perform the warranty service.
Some reputable retailers provide quality assurance services for any products they sell, but not every retailer has a good reputation. In addition, do not trust the brand because you have never purchased a fake product from a manufacturer. for users, the most practical defense method is not to buy any products you are not sure about.
It seems that some people think that the time has elapsed for the CPU to become obsolete and should have withdrawn from the stage of history. Unix is also the same fate. However, according to Gartner's data, there is still a large share of the IT procurement market that has not yet been mined, and the UNIX System on the old server is still dominant in today's enterprises.
Related Articles]
- Be cautious when buying online fraud for users with thousands of machine changes
- Network product-the "New World" of counterfeits"
- Cisco attaches great importance to old product renovation to prevent gray city from becoming black