China Operating System
China has always tried to support its homegrown tech industry and even the security concerns over U.S. secret surveillance which gives Chinese Government another reasons to trust domestic vendors.Many other countries are also in favor to develop their own technology industries to reduce their dependence on U.S.

The Government of China is not too fond of foreign mobile operating systems and therefore are trying to break the monopoly of Microsoft, Apple and Google in the country.

This week at an event in Beijing, China has unveiled its own Linux-based mobile platform, dubbed China Operating System (COS), developed as a joint effort between a company 'Shanghai Liantong', ISCAS (Institute of Software at the Chinese Academy of Sciences) and the Chinese Government.

According to COS website, it is designed for PCs, Smartphones, tablets, TVs, set-top boxes and other smart appliances. It runs Java applications, supports HTML5 and can run over 100,000 apps.

At the launch event, the head of the ISCAS criticized Apple's iOS for being a closed ecosystem, Android for its fragmentation issues, and Windows Phone for its poor security.

According to the promo video, the China Operating System (COS) interface and functions are much like Android, specifically very similar to HTC's Sense 5.

However, many Chinese users are criticizing this operating system on social media sites, "What does COS stand for? COPY OTHER SYSTEM?… But it really does look like a fusion of the Apple, Android, Symbian, and Blackberry operating system,"
Another user commented, "It's not open source because they're terrified that others will see that the source code is the same as Android, and accuse them of cheating the government out of money,"

Four years back, China once tried to create its own Linux-based, open mobile operating system called "OPhone or OMS (Open Mobile System)", but it was failed to gain popularity and discontinued after 2011.

Well, do you think, China is competing with the NSA over spying ability with a motto to leave room for backdoors or to defend themselves from NSA surveillance programs.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.