Xi Jinping At Seattle Tech Summit

xi-jinping-bill-gates.jpg

Microsoft co-founder Bill Gates is one of the many U.S. tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

There’s a saying in China that goes like this: Bill Gates is the richest man in the world and President Barack Obama is one of the most powerful men in the world, but in a few years, Obama will be gone and Gates will still be rich. The thought helps explain why before heading to Washington, DC, this week, Chinese President Xi Jinping is first stopping to meet with Gates and hold a China-US tech summit in Seattle.
The stakes are high for both sides. China’s burgeoning tech industry – only now beginning to compete on the world stage through brands like Xiaomi, Huawei and Lenovo -- needs access to Western technological and business knowhow, and to Western markets, if it’s to be the growth engine the country needs as it tries to emerge from a slump that has roiled financial markets around the world and shift to a more consumer-driven economy.
US tech giants like Facebook, Google, Apple and IBM, in turn, want access to China’s 700 million Internet users but are troubled by a range of issues – from state-sponsored hacking and online censorship to a new security law that many see as thinly veiled protectionism.
Already, China has many major players like Baidu, Tencent and Alibaba, but some of its biggest competitors are simply copies of Silicon Valley tech stars. To truly become global leaders, the Chinese must begin innovating on their own, many experts said.
Chinese “companies need to learn how American companies run, like the Apples, Googles and Microsofts, so they can run in a similar way,” said Tiger Feng, founder and president of the Seattle Technical Forum as well as a principal software engineer and tech lead at Microsoft. “They’re already leaders in the China market. They want to be world leaders.”
Ein News:http://http://bit.ly/1O3jFtU

 

« The U.S Is Losing the Cyber War
Insiders Responsible for 43% of Data Breaches »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.