Tencent Cloud adds second data centre in Germany, Thailand, and Japan, plus a third in Hong Kong

Plans to grow capacity in all 27 regions by 30 percent in 2021


Chinese web giant Tencent has announced its cloud service has expanded its presence in Germany, Thailand, Hong Kong, and Japan.

The company already operates its cloud in each territory but has now added a second “internet data centre” (IDC) in Bangkok, Frankfurt, and Tokyo. Hong Kong has been given a third IDC. Tencent uses the terms “IDC” and “availability zone” interchangeably.

The company says all the new bit barns are “tier-3 design facilities and are located in prime network hub locations, providing highly-reliable and high-quality BGP integrated with major local and international network operators.” Details of the new facilities’ scale, and whether they are Tencent-owned or co-located, were not revealed.

Senior vice president Poshu Yeung said Tencent Cloud plans further expansion in 2021.

“We are also planning to have over 30 percent growth in terms of our IDCs all over the world by end of this year,” he said. Tencent Cloud’s operation already covers 27 regions and 66 availability zones, and the company has already announced plans for new facilities in Bahrain and Indonesia.

Most of Tencent Cloud’s operations can be found in Asia, with just five regions in the Americas and four in Europe. Local rival Alibaba Cloud has also preferred to target Asian customers.

Tencent Cloud recently revealed it plans to emphasise PaaS and SaaS, because big buyers treat IaaS as a commodity and have made price their main purchasing consideration. Pursuing SaaS and PaaS is seen as a strategy that will secure stickier and more lucrative customers.

Cloud remains a very small part of Tencent's business, which is dominated by gaming and social media concerns. However the company is a player in the wider cloud world as it has championed use of OpenStack, and uses it to power its consumer-facing services for over a billion users. ®

Similar topics

Broader topics


Other stories you might like

  • Former chip research professor jailed for not disclosing Chinese patents
    This is how Beijing illegally accesses US tech, say Feds

    The former director of the University of Arkansas’ High Density Electronics Center, a research facility that specialises in electronic packaging and multichip technology, has been jailed for a year for failing to disclose Chinese patents for his inventions.

    Professor Simon Saw-Teong Ang was in 2020 indicted for wire fraud and passport fraud, with the charges arising from what the US Department of Justice described as a failure to disclose “ties to companies and institutions in China” to the University of Arkansas or to the US government agencies for which the High Density Electronics Center conducted research under contract.

    At the time of the indictment, then assistant attorney general for national security John C. Demers described Ang’s actions as “a hallmark of the China’s targeting of research and academic collaborations within the United States in order to obtain U.S. technology illegally.” The DoJ statement about the indictment said Ang’s actions had negatively impacted NASA and the US Air Force.

    Continue reading
  • TikTok US traffic defaults to Oracle Cloud, Beijing can (allegedly) still have a look
    Alibaba hinted the gig was worth millions each year

    The US arm of Chinese social video app TikTok has revealed that it has changed the default location used to store users' creations to Oracle Cloud's stateside operations – a day after being accused of allowing its Chinese parent company to access American users' personal data.

    "Today, 100 percent of US user traffic is being routed to Oracle Cloud Infrastructure," the company stated in a post dated June 18.

    "For more than a year, we've been working with Oracle on several measures as part of our commercial relationship to better safeguard our app, systems, and the security of US user data," the post continues. "We still use our US and Singapore datacenters for backup, but as we continue our work we expect to delete US users' private data from our own datacenters and fully pivot to Oracle cloud servers located in the US."

    Continue reading
  • Beijing-backed attackers use ransomware as a decoy while they conduct espionage
    They're not lying when they say 'We stole your data' – the lie is about which data they lifted

    A state-sponsored Chinese threat actor has used ransomware as a distraction to help it conduct electronic espionage, according to security software vendor Secureworks.

    The China-backed group, which Secureworks labels Bronze Starlight, has been active since mid-2021. It uses an HUI loader to install ransomware, such as LockFile, AtomSilo, Rook, Night Sky and Pandora. But cybersecurity firm Secureworks asserts that ransomware is probably just a distraction from the true intent: cyber espionage.

    "The ransomware could distract incident responders from identifying the threat actors' true intent and reduce the likelihood of attributing the malicious activity to a government-sponsored Chinese threat group," the company argues.

    Continue reading
  • FCC: Applications for funds to replace Chinese comms kit lack evidence
    Well you told us to rip and ... hang on, we're not getting any money?

    The saga of the US government's plan to rip and replace China-made communications kit from the country's networks has a new twist: following reports that applications for funding far outstripped the cash set aside, it appears two-thirds of such applications lack adequate cost estimates or sufficient supporting evidence.

    The US Federal Communications Commission (FCC) informed Congress that it had found deficiencies in 122 of the 181 of the applications filed with it by US carriers for funding to reimburse them for replacing telecoms equipment sourced from Chinese companies.

    The FCC voted nearly a year ago to reimburse medium and small carriers in the US for removing and replacing all network equipment provided by companies such as Huawei and ZTE. The telecoms operators were required to do this in the interests of national security under the terms of the Secure and Trusted Communications Networks Act.

    Continue reading

Biting the hand that feeds IT © 1998–2022