Cloud Computing In China Looks Set To Soar

Cloud Computing In China Looks Set To Soar

China is notorious for being a closed market, however, as the largest single market in Asia it could prove to be the game changer necessary to tip the scales of Cloud Computing adoption (at least in Asia). While we all know that a single grain of rice can tip the scales, China’s expanding Cloud Computing market is rapidly growing out of the boundaries set by the country’s Great Firewall of China. Everything looks set to be in place enough that China may be the game changer for your cloud enterprise or startup as well.

Late last year IDC predicted a number of things in relation to Cloud Computing in China.

This included:

  • Emerging markets (which includes China) will continue to have an oversized impact on global IT growth. While these markets will account for 28% of worldwide IT spending in 2012 – up from 21% five years ago – they will actually drive 53% of all IT spending growth worldwide.
  • China will pass Japan as the #2 IT market. China will continue to have the largest share (28%) of emerging markets spending and will see that spending grow almost 20% in 2012, reaching $145 billion. IDC predicts that China will pass Japan as the second-largest IT market sometime in the second half of 2012.

While some may still point to China’s still very visible Great Firewall, pockets of Clouds are rapidly appearing directly through it. In a bid to broach Cloud Computing the Chinese Government has implemented Cloud Computing centers and startup incubators such as the Cloud Valley. The Aldridge Company’s recent MOU with the Shanghai Lingang Economic Development group to bring Chinese companies into the cloud is indicative that more private clouds may soon crop up in China, creating a more Cloud-ready market receptive to similar Cloud-based technologies and startups. Cloud Valley officials have also indicated their readiness to provide IT outsourcing on a more global scale as well, at rock-bottom prices.

Companies such as CloudFlare are already making their mark in China. According to Chunghwa Telecom Vice President, Wen-Show Yang, “You can apply to the Beijing government for permission to set up a direct internet connection. But you need to pay a bit extra.” So if you’re looking to set up shop in China, you won’t have to go through the Great Firewall either. If all goes according to IDC’s predictions, another 6 to 8 months or so may be all the difference it needs to be a part of 2012’s Chinese Water Dragon’s ascent to the Cloud.

By Muz Ismial

Sorry, comments are closed for this post.

Comics
Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring revenue, here are four essentials to guide your way: All Revenue Will Become Recurring Revenue. Perhaps not this week or…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a Cloud IaaS or SaaS provider with that of a Cloud-Enabled Hosting Provider. These types of providers are very different and…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past several years that have fallen victim to data breaches and lived to survive: Premera Blue Cross had 11 million member’s…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars years after their intended lifespan is because the correctness of their software was mathematically verified before deployment. Similar trusted 24/7/365…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported that 87 percent of respondents had faced a disruptive incident with third parties in the last two to three years.…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They are so easy to start using that consumers rarely think twice about setting up an account or downloading a new…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth taking a moment to assess both options to determine what is best for you. There are a lot of considerations…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how safely the cars are driving, not how safe they are from cyber-attack – the McAfee Threat Predictions 2016 Report warned…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that 64 percent of medium and large businesses believe cloud infrastructure is more secure than legacy systems. What factors contribute to…