China and the Cloud: Revising Culture to Reap New Business

China and the Cloud: Revising Culture to Reap New Business

Access your information from anywhere.” This is one of the primary tenets of marketing for cloud computing — entice consumers with the freedom to work, or play, wherever they roam. Selling such expansiveness should hit a snag in a nation that underscores authoritarian control, like — as if you couldn’t guess — China.

New-fangled ideas about liberating people, inherent to the cloud’s nature, wouldn’t appear likely to score a home run in the People’s Republic. Yet in fact, cloud computing has ignited China’s never-ending need to be number-one. Last time, it was the Olympic Games; this round sees them aiming to make their IT community the envy of the world. Pity that China’s IT budget pales in comparison to that of America. We outspend the aspiring superpower by a ratio of roughly 6 billion to 1. Yet China compensates for what it lacks in financing with sheer resourcefulness.

Plans are afoot to construct an entire city powered by cloud computing, to be unimpressively christened “Cloud Valley.” IBM has partnered with Chinese firm Range Technology to mount the project by the year 2016. China apparently sees the cloud’s worth in reducing energy costs and maximizing efficiency. Yet this seems hypocritical when one considers how large the city will sprawl — more than 6 million square feet, rivaling the Pentagon’s sweep.
How to uphold China’s primary ethos: build big yet spend little? Realizing that penny-pinching won’t fit the bill for excellence, the nation has decided to shell out the necessary dough, in truth, because cloud computing cushions several of China’s core values.

Stateside cloud centers stand on transparency. They involve public servers that are independently operated. Yet China values intellectual sequestration above all. Its endeavors into the cloud will remain decidedly insular, cloaked in the country’s now-trademark protectionist tendencies: it will employ a private network, and the government will likely monitor the cloud’s data centers.

But you can’t bottle sunshine, and battening down the hatchets around the cloud is fairly impossible too — even for China. The cloud is actually challenging the country to rethink its moral boundaries, in the spirit of business.
China will partly dismantle its infamous Internet censorship scheme, nicknamed “The Great Firewall,” for certain companies in its cloud that it deems worthy.

China has also undernourished its technological community, yet the cloud might provide the shot in the arm it needs. To jump-start “Cloud Valley,” Beijing company heads will outsource their services to IT organizations throughout Southeast China.

China will heavily rely on talent educated and experienced abroad to staff its cloud city. This might be the most noteworthy move China is making out of its comfort zone, by the hand of the cloud. Cloud computing is an American revolution; China’s primary partner in this, IBM, is Yankee all the way. Bringing in cloud-ready professionals groomed in American universities and companies is a white-flag-raising gesture. It essentially admits that the West is superior in education and technology, no matter how China begrudges that fact.

If you can’t beat ’em, they say, join ’em. Such a phrase can’t hold entirely true for China, however. Though the nation might skip hand in hand with American resources to build its own cloud, we anticipate that the People’s Republic will eventually attempt to dominate the global IT community.

China will have to surmount cultural arrogance and learn from the cloud’s inclusiveness in order to do so. Stay tuned.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…