Xi Jinping At Seattle Tech Summit

xi-jinping-bill-gates.jpg

Microsoft co-founder Bill Gates is one of the many U.S. tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

There’s a saying in China that goes like this: Bill Gates is the richest man in the world and President Barack Obama is one of the most powerful men in the world, but in a few years, Obama will be gone and Gates will still be rich. The thought helps explain why before heading to Washington, DC, this week, Chinese President Xi Jinping is first stopping to meet with Gates and hold a China-US tech summit in Seattle.
The stakes are high for both sides. China’s burgeoning tech industry – only now beginning to compete on the world stage through brands like Xiaomi, Huawei and Lenovo -- needs access to Western technological and business knowhow, and to Western markets, if it’s to be the growth engine the country needs as it tries to emerge from a slump that has roiled financial markets around the world and shift to a more consumer-driven economy.
US tech giants like Facebook, Google, Apple and IBM, in turn, want access to China’s 700 million Internet users but are troubled by a range of issues – from state-sponsored hacking and online censorship to a new security law that many see as thinly veiled protectionism.
Already, China has many major players like Baidu, Tencent and Alibaba, but some of its biggest competitors are simply copies of Silicon Valley tech stars. To truly become global leaders, the Chinese must begin innovating on their own, many experts said.
Chinese “companies need to learn how American companies run, like the Apples, Googles and Microsofts, so they can run in a similar way,” said Tiger Feng, founder and president of the Seattle Technical Forum as well as a principal software engineer and tech lead at Microsoft. “They’re already leaders in the China market. They want to be world leaders.”
Ein News:http://http://bit.ly/1O3jFtU

 

« The U.S Is Losing the Cyber War
Insiders Responsible for 43% of Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.