Cloud computing services and the race between AWS, Microsoft, Google, and Huawei.


Outsourcing has become the norm when it comes to digital computational tasks. The number of businesses dependent on cloud services has accelerated in recent years.

As they look to offload processes reliant on information technology.

Almost two-thirds of global cloud computing is owned by three giants. Namely Microsoft Azure, Google Cloud and Amazon Web Services (AWS). Other honorable mentions include Dropbox, Huawei Cloud and DigitalOcean.


Recently huawei International has inked an agreement with Malaysian property developer, Hatten Land to jointly explore business opportunities.

Both parties will strive to provide environment-friendly. Data centers to cater to the growing demand for cloud services in the region.

Huawei will provide its research infrastructure designed for FinTech institutions to Hatten’s digital initiative by using cloud computing technologies such as automation, big data analytics and much more.

It is worth mentioning here that Huawei has already the largest cloud share in Latin America, with data centers in Brazil, Chile, Peru and Mexico, and Argentina.

Though it is still behind the likes of AWS, Microsoft and Google, Huawei is aggressively building new cloud data centers and content delivery networks (CDNs) with Paraguay and Uruguay in line. Barbados, Bolivia, Belize, Bahamas, Guyana, Jamaica, Nicaragua and Suriname slated for 2022

Cloud computing services
Cloud computing services

This is an example of big corporations working together on a larger scale to address a common problem. Similarly Amazon Web Services on the other hand has been a provider to big and small companies, businesses and individuals to host their applications and services.

Similarly, This poses a risk to the continuous availability of services as shown by the recent downtime of Amazon Web Services.

During December 2021 alone, AWS has suffered serious outage time resulting in disruption of services and downtime of e-commerce, online gaming, streaming video and connected household appliances for hundreds and thousands of users.

These cloud providers, just like any other IT equipment are not immune to software bugs, zero-day exploits, cyber-attacks or human error, and the disruption in services will pose a serious threat to the business if it is hosting its critical telecommunication and services on the cloud.

Cloud computing

In general provides the end-user with computer resources and data storage solutions. It also provides computational power to companies in addition which can provide services to its own user database.

This outsourcing of data storage and computational power ultimately results in minimizing the running cost of business and increasing profits.

Similiarly Cloud services also provide a scalable model in which you can purchase storage on per need basis. There are public, private, and hybrid clouds; a firm might build its own “private” cloud or data center.

Alternatively, it can access a public cloud. The differences are like the pros and cons of owning or renting a house or an apartment.


Subscribe to our newsletter

Your emaill address should be use only for updating you on our articles, in the respect of the privacy law

Share post:

More like this

Cybercriminals in the Metaverse: Interpol’s Response to Fraudsters Targeting Users

The use of the metaverse by Interpol is a step forward in combating virtual crimes, and developing a legal framework for accountability

How AI is Revolutionizing Cyberattacks

Learn how artificial intelligence (AI) is being used in cyberattacks and how to protect yourself

Robotics in the Workforce: Navigating the Challenges and Opportunities

Discover the impact of robotics on the workplace and employment, including efficiency, safety, and economic consequences.

New European Initiative Provides Safe Space for Blockchain Experimentation

Learn about the European Blockchain Regulatory Sandbox and how it aims to promote secure and transparent transactions while enabling innovation with blockchain technology.