Africa: Cloud Computing’s Secret Weapon

Africa: Cloud Computing’s Secret Weapon

Cloud computing’s best opportunity for unparalleled progress and worldwide relevance lies in how deeply and effectively it penetrates the African information technology community. Point blank. Why is this so? Simply because the massive continent remains in the dark ages of technology of all sorts, a condition which has fostered as many difficulties in thwarting this lack of progress as it has defined Africa as a potential gold mine for the cloud computing set.

Reconnaissance of Africa’s technologically stunted growth provides vital context. As the African Studies Center at the University of Pennsylvania concludes, “Africa seems to be the ‘lost continent’ of the information technologies. The second largest continent is the least computerized, and its more than two score countries have an average telephone density that is an order of magnitude smaller than that of the European Community.”

The article continues to point out that technological advancement is a princess problem for a continent unfairly troubled by historic and continued exploitation of its resources, civil unrest, and arguably some of the worst problems of health, economy, and education that Earth has ever witnessed. Cloud computing can hardly remedy these centuries-long tribulations singlehandedly.

Yet this IT revolution does have the propensity to introduce widespread internet connectivity and serve as a litmus test and crucible for cloud’s potential effectiveness to renovate communities and instigate authentic social change. The lessons cloud could learn from boosting Africa’s IT power could ripple into impoverished localities elsewhere in the world, including in the States.

ArsTechnica’s recent article on the subject of cloud in Africa outlines the primary specific areas of challenge and improvement on which cloud computing can focus: access to adequate power for data centers; the lack of sufficient broadband and telecommunications heft; and the nonexistence of any infrastructure that could currently sustain a major technological overhaul. Yet the article also defines this “Wild Wild West” aesthetic as cloud’s advantage and opportunity to demonstrate its wonders.

In the place of a traditional IT infrastructure has emerged an impressive precedent of mobile applications that saturate the continent, from SafariCom’s Mobile M-PESA to the Kenyan phenomenon of iCow, an app designed to help farmers manage cow husbandry and veterinary care and recently hailed by Forbes as Africa’s best.

Indeed, Africa’s boom in mobile technology — “by 2015, 138 million mobile users in Africa will be customers with no electrical utility service” — has laid the groundwork for cloud to galvanize its countries in an exciting way. Such specific IT empowerment, however, can only take place best when cloud concentrates on deep respect for individual African communities first, rather than a blind blanketing of Africa as a whole.

By Jeff Norman

Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.
FacebookTwitterLinkedInGoogle+Share

2 Responses to Africa: Cloud Computing’s Secret Weapon

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving