Africa: Cloud Computing’s Secret Weapon

Africa: Cloud Computing’s Secret Weapon

Cloud Computing’s Secret Weapon

Cloud computing’s best opportunity for unparalleled progress and worldwide relevance lies in how deeply and effectively it penetrates the African information technology community. Point blank. Why is this so? Simply because the massive continent remains in the dark ages of technology of all sorts, a condition which has fostered as many difficulties in thwarting this lack of progress as it has defined Africa as a potential gold mine for the cloud computing set.

Reconnaissance of Africa’s technologically stunted growth provides vital context. As the African Studies Center at the University of Pennsylvania concludes, “Africa seems to be the ‘lost continent’ of the information technologies. The second largest continent is the least computerized, and its more than two score countries have an average telephone density that is an order of magnitude smaller than that of the European Community.”

The article continues to point out that technological advancement is a princess problem for a continent unfairly troubled by historic and continued exploitation of its resources, civil unrest, and arguably some of the worst problems of health, economy, and education that Earth has ever witnessed. Cloud computing can hardly remedy these centuries-long tribulations singlehandedly.

Yet this IT revolution does have the propensity to introduce widespread internet connectivity and serve as a litmus test and crucible for cloud’s potential effectiveness to renovate communities and instigate authentic social change. The lessons cloud could learn from boosting Africa’s IT power could ripple into impoverished localities elsewhere in the world, including in the States.

ArsTechnica’s recent article on the subject of cloud in Africa outlines the primary specific areas of challenge and improvement on which cloud computing can focus: access to adequate power for data centers; the lack of sufficient broadband and telecommunications heft; and the nonexistence of any infrastructure that could currently sustain a major technological overhaul. Yet the article also defines this “Wild Wild West” aesthetic as cloud’s advantage and opportunity to demonstrate its wonders.

In the place of a traditional IT infrastructure has emerged an impressive precedent of mobile applications that saturate the continent, from SafariCom’s Mobile M-PESA to the Kenyan phenomenon of iCow, an app designed to help farmers manage cow husbandry and veterinary care and recently hailed by Forbes as Africa’s best.

Indeed, Africa’s boom in mobile technology — “by 2015, 138 million mobile users in Africa will be customers with no electrical utility service” — has laid the groundwork for cloud to galvanize its countries in an exciting way. Such specific IT empowerment, however, can only take place best when cloud concentrates on deep respect for individual African communities first, rather than a blind blanketing of Africa as a whole.

By Jeff Norman

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…