China and the Cloud: Revising Culture to Reap New Business

China and the Cloud: Revising Culture to Reap New Business

Access your information from anywhere.” This is one of the primary tenets of marketing for cloud computing — entice consumers with the freedom to work, or play, wherever they roam. Selling such expansiveness should hit a snag in a nation that underscores authoritarian control, like — as if you couldn’t guess — China.

New-fangled ideas about liberating people, inherent to the cloud’s nature, wouldn’t appear likely to score a home run in the People’s Republic. Yet in fact, cloud computing has ignited China’s never-ending need to be number-one. Last time, it was the Olympic Games; this round sees them aiming to make their IT community the envy of the world. Pity that China’s IT budget pales in comparison to that of America. We outspend the aspiring superpower by a ratio of roughly 6 billion to 1. Yet China compensates for what it lacks in financing with sheer resourcefulness.

Plans are afoot to construct an entire city powered by cloud computing, to be unimpressively christened “Cloud Valley.” IBM has partnered with Chinese firm Range Technology to mount the project by the year 2016. China apparently sees the cloud’s worth in reducing energy costs and maximizing efficiency. Yet this seems hypocritical when one considers how large the city will sprawl — more than 6 million square feet, rivaling the Pentagon’s sweep.
How to uphold China’s primary ethos: build big yet spend little? Realizing that penny-pinching won’t fit the bill for excellence, the nation has decided to shell out the necessary dough, in truth, because cloud computing cushions several of China’s core values.

Stateside cloud centers stand on transparency. They involve public servers that are independently operated. Yet China values intellectual sequestration above all. Its endeavors into the cloud will remain decidedly insular, cloaked in the country’s now-trademark protectionist tendencies: it will employ a private network, and the government will likely monitor the cloud’s data centers.

But you can’t bottle sunshine, and battening down the hatchets around the cloud is fairly impossible too — even for China. The cloud is actually challenging the country to rethink its moral boundaries, in the spirit of business.
China will partly dismantle its infamous Internet censorship scheme, nicknamed “The Great Firewall,” for certain companies in its cloud that it deems worthy.

China has also undernourished its technological community, yet the cloud might provide the shot in the arm it needs. To jump-start “Cloud Valley,” Beijing company heads will outsource their services to IT organizations throughout Southeast China.

China will heavily rely on talent educated and experienced abroad to staff its cloud city. This might be the most noteworthy move China is making out of its comfort zone, by the hand of the cloud. Cloud computing is an American revolution; China’s primary partner in this, IBM, is Yankee all the way. Bringing in cloud-ready professionals groomed in American universities and companies is a white-flag-raising gesture. It essentially admits that the West is superior in education and technology, no matter how China begrudges that fact.

If you can’t beat ’em, they say, join ’em. Such a phrase can’t hold entirely true for China, however. Though the nation might skip hand in hand with American resources to build its own cloud, we anticipate that the People’s Republic will eventually attempt to dominate the global IT community.

China will have to surmount cultural arrogance and learn from the cloud’s inclusiveness in order to do so. Stay tuned.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comic
Cloud Computing – The Good and the Bad

Cloud Computing – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be a big part of our future in both business and personal spheres. The current and future possibilities of global access to files and data, remote working opportunities, improved storage structures, and greater solution distribution have…

The FTC, Data Privacy and Facebook

The FTC, Data Privacy and Facebook

Data Protection Facebook is in deep water over their recent decision to start harvesting phone numbers from one of the apps they own, called WhatsApp. WhatsApp is a mobile phone app that allows people to place long distance phone calls and send SMS messages for free. A complaint was filed with the Federal Trade Commission…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…