IDG News Service - A cloud development zone being constructed in the Chinese city of Chongqing has drawn scrutiny for an alleged plan to offer uncensored Internet access, but only for foreign businesses.
The city's Cloud Computing Special Zone will be home to a handful of state-of-the-art data centers and is designed to attract investment from multinational companies and boost China's status as a center for cloud computing.
To attract business, the Chongqing municipal government will provide the site with unrestricted access to the Internet, meaning companies located there won't be restricted by China's pervasive Web filtering system, according to Chinese media reports.
That has sparked an uproar among some Chinese Internet users, because the unfiltered Web access will be available only to foreign companies, according to the reports. People commenting on social-networking sites have slammed the zone as a throwback to the days of "No dogs and no Chinese allowed,"a reference to how local Chinese were prohibited in the early 20th century from entering certain foreigner communities.
China is infamous for its Web censorship, which is used to block politically sensitive or anti-government content. Foreign websites including Twitter, Facebook and YouTube all have been routinely blocked. Government censors block users from posting or searching for certain keywords on social-networking sites.
The Chongqing Economic and Information Technology Commission, which is overseeing development of the cloud zone, declined to comment on whether the media reports about Web access were accurate. A spokeswoman said the commission continues to "push forward" with the project.
Pacnet, an Asian telco provider, signed an agreement with the local government in March to build one of the first data centers in the cloud zone. It too declined to comment on the reports.
"We will leverage Pacnet's global capabilities to attract multinational companies to Chongqing to achieve our goal to become China's major information technology hub, to further accelerate the economic growth in Chongqing," Chongqing Mayor Huang Qifan said in a statement at the time.
News of the special zone was first reported earlier this month by the Chinese publication "Southern Weekly." Some online news reports on the topic have since been taken down, likely by censors.
One Chinese reporter who covered the story said in an interview that his government sources came under pressure after his article appeared and would no longer discuss it.
If China has granted the zone unfettered Web access, it will provide foreign companies, and possibly some domestic firms, greater rights and freedoms than China's 1.3 billion citizens, said Phelim Kine, an Asia researcher with New York-based Human Rights Watch.
"It goes beyond ironic," he said. "The Chinese government is marketing an uncensored, unfiltered Internet connection as a selling point, while they so blatantly and purposely deny that right to the vast majority of their citizens."
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Gartner Magic Quadrant for Client Management Tools
- The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
- In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility
- Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Gartner Magic Quadrant for Application Security
- The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing... All Government IT White Papers
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts