The Chinese Dragon And Cloud Computing

The Chinese Dragon

In an earlier article, I speculated on the possible emergence of India as a cloud computing superpower on the strength of its millions of IT professionals. Now, it is unlikely that China, the other half, and dare I say, the stronger half, of the two nations many say will dominate this century, would sit still and let India take the lead.

China may not have India’s expertise in software, but it does have expertise in the other half of the cloud computing equation – hardware. With a state-controlled economy that determines whether the nation’s resources are to be directed, it is not surprising that China will dedicate itself towards its area of expertise – manufacturing – and proceed towards building a “city-sized” cloud computing complex in the Hebei province in northern China.

This center is planned to cover 6.2 million square feet when completed, inclusive of a 640,000 square feet data center space. In spite of its impressive size, this data center area will be a distant second behind the Lakeside Technology Center in Chicago that spans a massive 1.1 million square feet. This unique project, which will bring developers and technology under the same roof (or roofs, as per early designs), will rival the Pentagon in size.

IBM and China-based Range Technology are collaborating on this multibillion dollar project that is expected to be completed in 2016. While government departments are supposed to be the primary consumers for its services, it will also be open to banks and private enterprises. will also be open to banks and private enterprises. “This initiative plays a critical role in the economic development of China in light of the pressing demand for managed hosting in the areas of cloud computing and mobile devices,” said Range Technology chairman Zhou Chaonan. According to IBM, the complex is expected to employ between 60,000 and 80,000 people.

Now, China is a country that believes in state control over every aspect of human activity, including the Internet. In the past, it has imprisoned several of its citizens on charges of treason for criticizing the Communist Party and the state of affairs in China. In this light, cloud computing, with its distributed nature, presents a threat to China’s desire for control. Then why is it investing in the technology?

I believe it’s an outcome of the “If you can’t beat ‘em, join ‘em” syndrome. By centralizing cloud computing development in the country, the government can exert greater control than by allowing its development in isolated areas or through foreign technologies. In other words, the Chinese dragon will continue to maintain strict vigilance over its citizens’ use of technology, cloud computing and otherwise.

Also, everything considered, there’s no denying the efficiencies in time and money that cloud computing can provide a growing economy like China. In this light, this development is not unexpected.

To add to this, there is the Cloud Computing China Congress 2011 scheduled next month that is expected to promote cloud computing in the country. As per its website, the event is “specially designed for senior IT and line of business executives evaluating and making purchasing decisions in the areas of on-demand infrastructure and software services.” Several delegates from across the world are expected to attend this event starting 24 March in Beijing.

As is clearly evident, China is on the fast track to cloud computing. This decade will decide which of the three countries – India, China or the US – end up the dominant player in this field.

By Sourya Biswas

Sorry, comments are closed for this post.

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…