Xi Jinping At Seattle Tech Summit

xi-jinping-bill-gates.jpg

Microsoft co-founder Bill Gates is one of the many U.S. tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

There’s a saying in China that goes like this: Bill Gates is the richest man in the world and President Barack Obama is one of the most powerful men in the world, but in a few years, Obama will be gone and Gates will still be rich. The thought helps explain why before heading to Washington, DC, this week, Chinese President Xi Jinping is first stopping to meet with Gates and hold a China-US tech summit in Seattle.
The stakes are high for both sides. China’s burgeoning tech industry – only now beginning to compete on the world stage through brands like Xiaomi, Huawei and Lenovo -- needs access to Western technological and business knowhow, and to Western markets, if it’s to be the growth engine the country needs as it tries to emerge from a slump that has roiled financial markets around the world and shift to a more consumer-driven economy.
US tech giants like Facebook, Google, Apple and IBM, in turn, want access to China’s 700 million Internet users but are troubled by a range of issues – from state-sponsored hacking and online censorship to a new security law that many see as thinly veiled protectionism.
Already, China has many major players like Baidu, Tencent and Alibaba, but some of its biggest competitors are simply copies of Silicon Valley tech stars. To truly become global leaders, the Chinese must begin innovating on their own, many experts said.
Chinese “companies need to learn how American companies run, like the Apples, Googles and Microsofts, so they can run in a similar way,” said Tiger Feng, founder and president of the Seattle Technical Forum as well as a principal software engineer and tech lead at Microsoft. “They’re already leaders in the China market. They want to be world leaders.”
Ein News:http://http://bit.ly/1O3jFtU

 

« The U.S Is Losing the Cyber War
Insiders Responsible for 43% of Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Barracuda Networks

Barracuda Networks

Barracuda provides a range of solutions covering network security, data storage, protection and disaster recovery.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.