ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

China Defeats the United States with the Tianhe-3 Supercomputer

Updated on February 23, 2017

China has a collective mind regarding mathematics, science, and technology. Europe and North America are more apt to give their prizes to their own kind rather than recognizing what China is accomplishing today. China’s breakthroughs are based on a collective mind open to expansion while paving the road for innovative engineering. They progress as a unit rather than individually and bring together the best minds as a whole.

China is building a new generation of supercomputers that are expected to outpace the leading competitor tenfold. Using breakthrough high-performance processors, China is expected to complete the world’s first prototype exascale supercomputer by early 2018. The name of this next generation machine is the Tianhe-3.

The benefits of this supercomputer are not only the projected economic benefits of 10 billion Chinese Yuan ($1.49 billion), but also the decoding of human genes, its breakneck speed, and the identification of biological and chemical sequences to find medicines faster than any previous method known to mankind.

However, under the veil of secrecy lies a more disturbing trend. The speed at which this computer operates makes it easier to penetrate firewalls and decode classified information, all while staying underneath the radar to avoid detection from foreign counterparts. The speed of the computer will rely on normalcy that caters to everyone’s belief that intelligence information was never compromised.

Barack Obama did sign an executive order for the US to expedite its own supercomputer for the purpose of gaining an edge against the rising power of China. Computers benefit the world in terms of information, but the brain does act on self-preservation and utilizing information that raises the expectation of a nation to be first in technology and science. However, China refuses to be overwhelmed by the most powerful nation on Earth.

We need to enlighten ourselves as to how the 21st century will unfold. Macroeconomists need to challenge themselves. Using theories and certain paradigms, we can look into the future. We all know that economic perfection is unattainable. We also know that economies are a symbolic life-form and have become predatory for their growth. It is daunting to come up with a macroeconomic theory. It may force economists to change their perception of how we think of the changing economic world. However, with recent developments, we can offer a glimpse into the changing economic conditions in our world.

Xi Jinping's disposition is based on silence, whereas the U.S., Russia, and other nations are preoccupied by territorial disputes and regional wars. The media is flooded with these nations struggling to demonstrate dominance by positioning their interests against one another. In the background, Jinping is engineering and advocating projects that provide massive worldwide economic benefits, all while China expands its global market share. Jinping possesses a stealth quality that seems to put China under the radar. He seems to solidify agreements with national leaders through respect of their national interests and the mutual benefits that agreeing nations can aspire to. This also quantifies emerging nations' aspirations to grow with them.

Xi Jinping is advocating assimilation without the loss of a country's national identity. This economic thinking goes against the predatory dominance, superiority, and exceptionalism of the almighty American dollar.

One of the leading firewall companies and defense organizations for the United States is Palo Alto Networks Inc. The House of Representatives recently passed The Protecting Cyber Networks Act, allowing for increased sharing of cyber-security threat data between government agencies and corporations. Many nations are eyeing this, particularly China and Russia. It will mean that corporate espionage won’t take a back seat and the scale of attacks will increase at an unprecedented level. When you’re dealing with corporate and government information, you’re only as good as every other individual with access to it. With the Protecting Cyber Networks Act, hackers are eager to write new viruses that complement corporate and government involvement in protecting their data. The US government can not ensure corporate liability to software piracy.

Unbeknownst to the rest of the world, China and Russia have a national program of hackers. These hackers believe in the intellectual exploration to tap into computer networks that are virtually unbreakable. Hackers believe that it is their given right to possess the capability to attack any network and stretch their resources to make the computer do what they want it to do. They have the virtuosity of penetrating computer systems for national recognition and reward.

Cyber attacks are part of a geopolitical game in maneuvering to place the blame on one country against another. Israel and the US are good at playing this game. Any type of large scale cyber attack would be perceived as an act of war, a retaliatory response would most likely be issued. The attack of infrastructure grids is a real imminent threat to the economic wellbeing of all nations.

So far the line has not been crossed, but a supercomputer that can decode intelligence rapidly while under the veil of secrecy hidden from the eyes of every nation will elevate China’s hand to succeed in dominating their agenda. Geopolitical power rests on who is the strongest in alleviating any potential threat in the economic expansion that fosters China’s assimilation and vortex in drawing nations into their sphere of influence.


    0 of 8192 characters used
    Post Comment

    • Fiorenzo Arcadi profile imageAUTHOR

      Fiorenzo Arcadi 

      21 months ago from 1592 Bloor Street West

      This is true HSchneider, for example the Shamoon virus set the international tone by attacking the computer network of Saudi Aramco. The virus attacked over 30,000 workstations, resulting in a two-week recovery effort to restore their networks. Saudi Aramco is considered among one of the most valuable companies worldwide with an estimated worth of $7 trillion. The unique thing about the attack was the automatic finger-pointing directed towards Iran. With this international perception, it elevated Iran in the context of cyber warfare. My educated guess suggests that the one who discovered it and announced it to the world was Kaspersky Lab, even though Israel was the first to detect it. ‘Cutting Sword of Justice’, the organization claiming to be behind the virus, was too obvious because they put the blame on Iran instead of Russia. The unique thing about cyber war is the blame game that is constantly being played out. In economic terms, it means that the country accused of attacking another could possibly lose business and favor the other country that moves in

    • profile image

      Howard Schneider 

      21 months ago from Parsippany, New Jersey

      Excellent Hub, Fiorenzo. It is all very troubling to me because of the damage countries can do to one another without actual military fighting. It should also be a wake up call to my country, the United States, and all others to invest in your brightest minds via education to combat these threats.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)