Xi Jinping At Seattle Tech Summit

xi-jinping-bill-gates.jpg

Microsoft co-founder Bill Gates is one of the many U.S. tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

There’s a saying in China that goes like this: Bill Gates is the richest man in the world and President Barack Obama is one of the most powerful men in the world, but in a few years, Obama will be gone and Gates will still be rich. The thought helps explain why before heading to Washington, DC, this week, Chinese President Xi Jinping is first stopping to meet with Gates and hold a China-US tech summit in Seattle.
The stakes are high for both sides. China’s burgeoning tech industry – only now beginning to compete on the world stage through brands like Xiaomi, Huawei and Lenovo -- needs access to Western technological and business knowhow, and to Western markets, if it’s to be the growth engine the country needs as it tries to emerge from a slump that has roiled financial markets around the world and shift to a more consumer-driven economy.
US tech giants like Facebook, Google, Apple and IBM, in turn, want access to China’s 700 million Internet users but are troubled by a range of issues – from state-sponsored hacking and online censorship to a new security law that many see as thinly veiled protectionism.
Already, China has many major players like Baidu, Tencent and Alibaba, but some of its biggest competitors are simply copies of Silicon Valley tech stars. To truly become global leaders, the Chinese must begin innovating on their own, many experts said.
Chinese “companies need to learn how American companies run, like the Apples, Googles and Microsofts, so they can run in a similar way,” said Tiger Feng, founder and president of the Seattle Technical Forum as well as a principal software engineer and tech lead at Microsoft. “They’re already leaders in the China market. They want to be world leaders.”
Ein News:http://http://bit.ly/1O3jFtU

 

« The U.S Is Losing the Cyber War
Insiders Responsible for 43% of Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.