Xi Jinping At Seattle Tech Summit

xi-jinping-bill-gates.jpg

Microsoft co-founder Bill Gates is one of the many U.S. tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

There’s a saying in China that goes like this: Bill Gates is the richest man in the world and President Barack Obama is one of the most powerful men in the world, but in a few years, Obama will be gone and Gates will still be rich. The thought helps explain why before heading to Washington, DC, this week, Chinese President Xi Jinping is first stopping to meet with Gates and hold a China-US tech summit in Seattle.
The stakes are high for both sides. China’s burgeoning tech industry – only now beginning to compete on the world stage through brands like Xiaomi, Huawei and Lenovo -- needs access to Western technological and business knowhow, and to Western markets, if it’s to be the growth engine the country needs as it tries to emerge from a slump that has roiled financial markets around the world and shift to a more consumer-driven economy.
US tech giants like Facebook, Google, Apple and IBM, in turn, want access to China’s 700 million Internet users but are troubled by a range of issues – from state-sponsored hacking and online censorship to a new security law that many see as thinly veiled protectionism.
Already, China has many major players like Baidu, Tencent and Alibaba, but some of its biggest competitors are simply copies of Silicon Valley tech stars. To truly become global leaders, the Chinese must begin innovating on their own, many experts said.
Chinese “companies need to learn how American companies run, like the Apples, Googles and Microsofts, so they can run in a similar way,” said Tiger Feng, founder and president of the Seattle Technical Forum as well as a principal software engineer and tech lead at Microsoft. “They’re already leaders in the China market. They want to be world leaders.”
Ein News:http://http://bit.ly/1O3jFtU

 

« The U.S Is Losing the Cyber War
Insiders Responsible for 43% of Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Corix Partners

Corix Partners

Corix Partners is a Boutique Management Consultancy Firm focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation and Governance challenges.

Cyber Security Certification Australia (CSCAU)

Cyber Security Certification Australia (CSCAU)

CSCAU is the world’s first 'for mission' industry council set up to address small and medium-sized business (SMB) cyber resilience through annually updated certifiable standards.