Africa: Cloud Computing’s Secret Weapon

Africa: Cloud Computing’s Secret Weapon

Cloud Computing’s Secret Weapon

Cloud computing’s best opportunity for unparalleled progress and worldwide relevance lies in how deeply and effectively it penetrates the African information technology community. Point blank. Why is this so? Simply because the massive continent remains in the dark ages of technology of all sorts, a condition which has fostered as many difficulties in thwarting this lack of progress as it has defined Africa as a potential gold mine for the cloud computing set.

Reconnaissance of Africa’s technologically stunted growth provides vital context. As the African Studies Center at the University of Pennsylvania concludes, “Africa seems to be the ‘lost continent’ of the information technologies. The second largest continent is the least computerized, and its more than two score countries have an average telephone density that is an order of magnitude smaller than that of the European Community.”

The article continues to point out that technological advancement is a princess problem for a continent unfairly troubled by historic and continued exploitation of its resources, civil unrest, and arguably some of the worst problems of health, economy, and education that Earth has ever witnessed. Cloud computing can hardly remedy these centuries-long tribulations singlehandedly.

Yet this IT revolution does have the propensity to introduce widespread internet connectivity and serve as a litmus test and crucible for cloud’s potential effectiveness to renovate communities and instigate authentic social change. The lessons cloud could learn from boosting Africa’s IT power could ripple into impoverished localities elsewhere in the world, including in the States.

ArsTechnica’s recent article on the subject of cloud in Africa outlines the primary specific areas of challenge and improvement on which cloud computing can focus: access to adequate power for data centers; the lack of sufficient broadband and telecommunications heft; and the nonexistence of any infrastructure that could currently sustain a major technological overhaul. Yet the article also defines this “Wild Wild West” aesthetic as cloud’s advantage and opportunity to demonstrate its wonders.

In the place of a traditional IT infrastructure has emerged an impressive precedent of mobile applications that saturate the continent, from SafariCom’s Mobile M-PESA to the Kenyan phenomenon of iCow, an app designed to help farmers manage cow husbandry and veterinary care and recently hailed by Forbes as Africa’s best.

Indeed, Africa’s boom in mobile technology — “by 2015, 138 million mobile users in Africa will be customers with no electrical utility service” — has laid the groundwork for cloud to galvanize its countries in an exciting way. Such specific IT empowerment, however, can only take place best when cloud concentrates on deep respect for individual African communities first, rather than a blind blanketing of Africa as a whole.

By Jeff Norman

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…