Investment In Chinese Cloud Continues To Grow

Investment In Chinese Cloud Continues To Grow

Investment In Chinese Cloud Continues To Grow

chinese-cloud

With the Chinese government focused on enhancing the country’s capabilities in cloud computing, United States-based organizations including Intel have opted to invest in several promising cloud providers.

Intel’s venture capital arm this week announced plans to invest funds in Wuxi China Cloud Technology Service, a cloud infrastructure provider; Tianjin Zhongke BlueWhale Information Technology, a network storage provider; and Shanghai Yeapoo Information Technology, which provides such business tools as mobile-adapted website construction, online marketing tools, and customer data analysis solutions. The decision to devote resources to these organizations comes in the wake of increased demand for cloud services in China, where the chip maker’s server business continues to grow at double digit rates. Moreover, Chinese officials have stated their intent to move as much corporate and government data and functions as possible to the cloud in coming years. To optimize this progress, Intel also anticipates dedicating investment capital in Chinese companies that manufacture components for wearable devices.

BusinessWire recently reported that Chinese officials hope the cloud will allow them to garner significant advantages in the delivery of such services as education and health care. The government set aside $1 billion for cloud development, anticipating that the accessibility and scalability of cloud-based solutions will enable its employees to deliver improved services to a larger number of people. In addition, China designated Wuxi, Shenzhen, Shanghai, and Beijing as cloud computing cities, offering funding and infrastructure that will allow municipal governments to migrate many of their city services to the cloud.

The Chinese technology market offers investors numerous opportunities to realize strong financial returns. The nation’s large population, huge markets, and vast manufacturing operations benefit from utilization of cloud capabilities. Moreover, the cloud affords Chinese business and government agencies flexibility while limiting redundancy of effort and storage capacity. According to Gartner, the cloud industry in China will reach $163 billion over the next year.

By Glenn Blake

(Image Source: claudio zaccherini / Shutterstock.com)

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…