<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Asia Tech Lens]]></title><description><![CDATA[Asia Tech Lens is an independent platform exploring how technology is built, funded, and governed across Asia.

→ Full mission: asiatechlens.com/about]]></description><link>https://www.asiatechlens.com</link><image><url>https://substackcdn.com/image/fetch/$s_!lTJs!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2aba0868-bdd8-4145-b680-d66a8cbfd578_999x999.png</url><title>Asia Tech Lens</title><link>https://www.asiatechlens.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 18 May 2026 04:04:15 GMT</lastBuildDate><atom:link href="https://www.asiatechlens.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Asia Tech Lens]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[admin@perspectivemedia.asia]]></webMaster><itunes:owner><itunes:email><![CDATA[admin@perspectivemedia.asia]]></itunes:email><itunes:name><![CDATA[Asia Tech Lens]]></itunes:name></itunes:owner><itunes:author><![CDATA[Asia Tech Lens]]></itunes:author><googleplay:owner><![CDATA[admin@perspectivemedia.asia]]></googleplay:owner><googleplay:email><![CDATA[admin@perspectivemedia.asia]]></googleplay:email><googleplay:author><![CDATA[Asia Tech Lens]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Before AI Can Work, Southeast Asia’s Enterprises Need To Fix Their Data]]></title><description><![CDATA[Companies across the region are rushing to deploy AI, but messy documents, fragmented workflows, and weak data foundations are making automation harder to scale, says Sansan's Kazunori Fukuda]]></description><link>https://www.asiatechlens.com/p/southeast-asia-enterprise-ai-data-foundations</link><guid isPermaLink="false">https://www.asiatechlens.com/p/southeast-asia-enterprise-ai-data-foundations</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 14 May 2026 01:14:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3IXf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3IXf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3IXf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3IXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1220092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/197453634?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3IXf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!3IXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ab8ab2d-2876-4774-9b43-d9460166be3e_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Companies across Southeast Asia are approving AI pilots before answering a more basic question: can the underlying workflow actually support automation at scale?</p><p>For operators, that question matters more than the model being tested. If invoices, contracts, procurement records, and customer data are still scattered across paper, PDFs, spreadsheets, emails, and legacy systems, AI can quickly become another layer on top of an already fragmented process.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;They also want AI to make their workflows smarter, so they can act faster and with greater insight. In the process, of course, they reduce overhead and positively impact the bottom line,&#8221; </strong></em></p><p><a href="https://www.linkedin.com/in/kazu-fukuda-56445114/">Kazunori Fukuda</a>, managing director at enterprise software company <a href="https://www.sansan.com/en/">Sansan</a>.</p></div><p>Fukuda pointed to one Sansan client, a construction company in Thailand that was processing more than 2,000 invoices every month, with over 90% still exchanged on paper. Each invoice took about 20 minutes to process manually, delaying the monthly closing and making it difficult for headquarters to monitor activity across construction sites.</p><p>After digitizing the workflow, the company was able to consolidate invoices from different offices and sites into a single system. The shift cut processing time to eight minutes per invoice and saved around 4,800 work hours a year.</p><p>The case is a success story, but its starting point is the more important lesson. Before the company could automate invoice processing, it first had to make a messy paper-heavy workflow visible, structured, and usable.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;AI can only deliver value when it is built on well-structured, high-quality data,&#8221; </strong></em>Fukuda told Asia Tech Lens.</p></div><p>The issue is not necessarily that companies lack AI tools. Many are trying to layer AI onto workflows that were never properly standardized, governed, or prepared for automation in the first place.</p><h2>The Real Bottleneck: Fragmented Data</h2><p>For many enterprises, the biggest obstacle to AI adoption is not model capability, but the condition of the underlying data itself.</p><p>Fukuda frames data readiness as a precondition for scaling AI, not a problem to fix after deployment.</p><p>Invoices, contracts, business cards, procurement records, and customer information are often stored across disconnected systems, handled manually by different departments, or exchanged in inconsistent formats. Even companies that have digitized parts of their operations may still rely heavily on scanned PDFs, spreadsheets, emails, and legacy approval processes.</p><p>According to Fukuda, organizations often assume that having large amounts of data automatically makes them ready for AI deployment. In practice, fragmented and poorly structured data can make AI outputs unreliable from the beginning.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;One of the most common failure points is large volumes of data that are unstructured or not usable for AI,&#8221;</strong></em> he said.</p></div><p>The problem becomes more visible in Southeast Asia&#8217;s emerging markets, where digitization maturity varies widely across industries and the supply chain. External vendors, suppliers, and contractors may still submit documents manually or use incompatible systems, making it difficult to create standardized workflows that AI systems can process consistently.</p><p>Even Sansan ran into this problem while developing AI-driven document management tools. Fukuda said the company found that general-purpose AI models struggled with the variety and complexity of real business documents, leading to delays and inaccurate outputs.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;The AI struggled with the variety of document formats and complex data extraction requirements,&#8221; </strong></em>he said.</p></div><p>Sansan&#8217;s response was to move away from relying on general-purpose AI alone and toward models trained for business-document structures. The broader lesson for operators is not product-specific: generic AI will struggle when the workflow depends on messy documents, inconsistent formats, and business-specific exceptions.</p><p>The experience highlights a broader challenge for enterprises adopting AI. Vendor demos and pilot environments are often cleaner than production reality. Once AI systems encounter fragmented workflows, inconsistent formats, incomplete data, and edge cases at scale, performance can deteriorate quickly.</p><p>For operators, that is the lesson to take into vendor selection. A successful demo does not prove that a system can handle real document variety, messy supplier inputs, or the exceptions that appear in day-to-day operations.</p><h2>The Human and Workflow Problem</h2><p>Fukuda adds that AI failures are not only caused by technical limitations, but also by how new systems fit into existing workflows.</p><p>If AI tools disrupt how teams already work, employees may see them as additional friction rather than productivity tools. In some cases, teams revert to manual processes when AI outputs become inconsistent or difficult to trust.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;The early warning signs usually appear quickly,&#8221;</strong></em> Fukuda said. <em><strong>&#8220;Teams may notice inconsistent results from the AI, employees may stop using the system, or the organization may struggle to define clear performance indicators.&#8221;</strong></em></p></div><p>In most cases, these problems stem from the same root issue: AI initiatives were launched before the underlying data and workflows were properly prepared. Without proper training and integration into day-to-day workflows, AI initiatives can struggle to move beyond experimentation.</p><p>That makes adoption a pre-scaling test, not a post-launch training issue. Before expanding AI across departments, operators need to know who owns the workflow, who monitors the output, who investigates errors, and how teams will use the system when results are imperfect.</p><p>The same applies to governance. In regulated sectors, the question is not only whether policies exist, but whether companies can prove that controls are working inside AI-supported workflows day-to-day. That includes access controls, activity logs, monitoring, auditability, and audit trails that show how information is processed and who has accessed it. They also expect incident response procedures and regular security assessments to be in place before AI-assisted workflow changes are approved. What is often missing is operational evidence that these controls are consistently applied in daily workflow, not just written into policy.</p><h2>Before the Next AI Budget Gets Approved</h2><p>For Fukuda, the bigger risk for Southeast Asian enterprises is not moving too slowly on AI, but moving too quickly without fixing the operational foundations underneath.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;Avoid rushing to implement AI-first programs without a solid foundation,&#8221; </strong></em>he said. <em><strong>&#8220;Without these fundamentals, AI can quickly become a costly distraction rather than a value-driving tool.&#8221;</strong></em></p></div><p>The safer path is to start with narrow operational problems where the business pain is clear, the data can be prepared, and the outcome can be measured. Only then should companies expand AI across more complex workflows.</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;Start by identifying specific, high-impact use cases where AI can add measurable value,&#8221;</strong></em> he said. <em><strong>&#8220;Ensure that the data infrastructure is prepared to support AI applications, and integrate AI tools gradually into existing workflows.&#8221;</strong></em></p></div><p>That approach is especially relevant in Southeast Asia&#8217;s asset-heavy industries, where many operational systems remain fragmented across sites, suppliers, and legacy processes. In these environments, the companies that benefit most from AI may not be the ones deploying the most tools, but the ones that spend more time preparing their operational foundations before scaling them.</p><p>Before the next AI line item lands in the budget, operators should ask a narrower set of questions. What workflow is this supposed to fix? Is the data usable? Who owns the output? How will employees use the tool? What happens when the system gets it wrong and how will success be measured?</p><p>The companies that get this right will not be the ones that moved fastest on AI. They will be the ones that were honest enough to fix their operations first.</p><div><hr></div><h2>More From Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/ai-agents-southeast-asia-enterprise-trust-hierarchy">Why AI Agents Still Struggle Inside Southeast Asia&#8217;s Enterprises</a></strong></p><p>Why enterprise AI adoption in Southeast Asia runs into hierarchy, trust, workflow ownership, and accountability.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china">Agentic AI Can Act. Singapore&#8217;s New Rulebook Says: Prove You Can Stop It</a></strong></p><p>Once AI moves from assistance to action, operators need bounded autonomy, audit trails, oversight, and rollback plans before deployment can be trusted.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/budget-2026-puts-ai-into-execution-singapore-sea">Budget 2026 Puts AI Into Execution Mode. Operators Need To Sequence It Carefully</a></strong></p><p>Singapore&#8217;s AI push shows why enterprises need to sequence deployment around sector readiness, operational capacity, and measurable use cases rather than treating AI adoption as a broad transformation mandate.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/indias-ai-push-is-real-production-sarvam">India&#8217;s AI Push Is Real. Production Access Is the Constraint</a></strong></p><p>Why AI ambition does not equal deployment readiness: regulated operators need reservable capacity, auditable controls, and portability before pilots become usable production infrastructure.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/quantum-pilots-fail-enterprise-asia-beckstein">Why Quantum Pilots Fail Before They Start And What To Do About It</a></strong></p><p>Different technology, same operator lesson: pilots fail when teams start with what the technology can do instead of defining the costly decision, measurable baseline, owner, and procurement path upfront.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Why Quantum Pilots Fail Before They Start—And What To Do About It]]></title><description><![CDATA[Getting a quantum pilot to production requires asking a specific question at the start. Most enterprise teams are asking the wrong one]]></description><link>https://www.asiatechlens.com/p/quantum-pilots-fail-enterprise-asia-beckstein</link><guid isPermaLink="false">https://www.asiatechlens.com/p/quantum-pilots-fail-enterprise-asia-beckstein</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 06 May 2026 01:00:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ntT3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ntT3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ntT3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ntT3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2164234,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/196499976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ntT3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ntT3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1dc5bc6-ec20-46bc-9a17-fddc06664bd3_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://thequantuminsider.com/2022/05/16/quantum-research/">Quantum Insider</a></figcaption></figure></div><p>When enterprises across Asia start a quantum pilot, they often begin by asking what the technology can do for them. The entry point can produce interesting pilots but they will likely go nowhere&#8212;no procurement decision, no budget owner, no path to deployment, no business impact.</p><p><a href="https://www.linkedin.com/in/alexandra-beckstein/">Alexandra Beckstein</a>, CEO of QAI Ventures, has spent enough time inside these programs to know exactly where that happens. <em><strong>&#8220;Teams ask where they can use quantum, rather than asking which decision is costly, complex, and worth improving. That usually leads to a pilot that sounds exciting but is too vague to succeed,&#8221; </strong></em>she says.</p><p>Beckstein runs QAI Ventures, a Switzerland-founded firm with its Asia-Pacific headquarters in Singapore. In February, the firm <a href="https://www.dealstreetasia.com/stories/softbank-qai-ventures-473888">announced</a> an industry cluster program backed by SoftBank Corp. and HorizonX. Beckstein has built quantum startup ecosystems across Europe, North America, and Asia Pacific. She has seen where the pipeline breaks for many enterprise quantum programs. She shares her insights in a written interview with <em>Asia Tech Lens.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CTzw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CTzw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CTzw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1754480,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/196499976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CTzw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CTzw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2e3c4dd-5c2b-4fe3-8982-5dc51b021fe6_1536x1024.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.youtube.com/watch?v=pZ4sKxJQu6k">QAI Ventures at its 2025 hackathon in Singapore</a></figcaption></figure></div><h2>The Wrong Question Is Being Asked First</h2><p>What she keeps finding is that the decision that determines a pilot&#8217;s fate is made at the very beginning. Teams enter quantum programs by asking where the technology can be applied rather than which specific, costly business decision needs to be improved. That produces pilots that are technically interesting but commercially vague.</p><p>The most reliable early signal that a pilot is incorrectly structured is the absence of a P&amp;L owner. <em><strong>&#8220;A pilot needs a defined P&amp;L owner who is accountable for outcomes,&#8221;</strong></em> Beckstein says, <em><strong>&#8220;not just an innovation or IT team exploring new tools.&#8221;</strong></em> If the initiative lives inside an innovation function without a business unit accountable for the result, it is not a business pilot. It is an experiment with a business-shaped label. In regulated industries&#8212;banking, insurance, or telecommunications&#8212;a pilot without a business owner rarely makes it past procurement, regardless of how technically promising the results are.</p><p>The failure pattern has a structural cause. On the supply side, researchers with strong IP often lack business scaffolding. They don&#8217;t have the capacity to translate technical capability into a deployable system. On the demand side, enterprises are aware of quantum as a category but have no capacity to structure a pilot that produces evidence procurement can act on. QAI Ventures is positioned around both sides of that gap. Most of what is deployable today is quantum-inspired or hybrid, not full quantum computing, which remains dependent on hardware breakthroughs that have not yet arrived. While quantum research is maturing, enterprise deployability is a separate endeavor.</p><p>Beckstein recalls a case where a company attempted to tackle a very large planning problem too early: the data was inconsistent, the business team had not agreed on a success metric, and the project became too broad to produce a clean result.<em><strong> &#8220;The lesson was simple,&#8221;</strong></em> she says. <em><strong>&#8220;Start with a smaller problem, cleaner data, and a tighter commercial goal.&#8221;</strong></em></p><h2>What A Correctly Framed Pilot Looks Like</h2><p>Three cases Beckstein points to illustrate what problem-first framing produces in practice; the figures that follow are drawn from her account. The following cases are not arguments for quantum broadly. They are examples of when a specific problem is matched to the right method.</p><p>Multiverse Computing applied its Singularity framework to compress AI models for a customer service network. <a href="https://multiversecomputing.com/resources/telefonica-and-multiverse-computing-develop-an-ai-based-model-to-support-customer-service-agents">The outcome</a> was an 80% reduction in model size and up to 75% lower energy consumption, with no degradation in response quality. The business case&#8212;cost reduction and sustainability&#8212;was defined before the quantum-inspired approach was selected, not after.</p><p>Fujitsu&#8217;s Digital Annealer, <a href="https://info.archives.global.fujitsu/emeia/about/resources/news/press-releases/2021/emeia-08122021-fujitsu-quantum-inspired-optimization-services-cut-traffic-jams-and-co2-emissions-at-hamburg-port.html">deployed at the Port of Hamburg</a>, optimized vehicle traffic flows and increased average travel speed by 20% while cutting CO&#8322; emissions by 10%. More operationally significant: a calculation that previously took days now runs in seconds. The framing was a logistics bottleneck the port already owned. The quantum-inspired approach was chosen because classical methods had hit a scaling ceiling.</p><p>QTFT, a quantum software startup founded in Thailand, built a routing solution for supermarket goods deliveries that generates several strong, viable alternatives rather than a single theoretically optimal route. For a logistics operator, that distinction matters at the moment a route fails and a decision needs to be made in minutes, not hours.</p><p>As Beckstein puts it, these cases share something fundamental: <em><strong>&#8220;A focus on solving genuine operational constraints and producing results that procurement and operations leaders can directly compare against their existing benchmarks. That is ultimately what separates promising pilots from deployments that stick.&#8221;</strong></em></p><p>Her point is that success criteria need to be quantified before a pilot begins. For example, a 3% or greater improvement over a well-understood classical baseline. Without that number agreed in advance, the pilot has no natural endpoint, and no moment at which anyone is obligated to act on the result.</p><h2>How To Run It, And When To Stop</h2><p>The second failure mode Beckstein flags is less about framing and more about discipline. Pilots run too long because nobody agreed on exit criteria before they started. By the time results are inconclusive, the budget has been spent and the business owner has moved on.</p><p>Her stop rules are unambiguous: <em><strong>&#8220;A pilot should stop if the data is not good enough, if the business owner is not engaged, or if the result is not clearly better than the current approach. It should also stop if costs keep rising without stronger evidence.&#8221;</strong></em></p><p>In regulated industries, the governance layer deserves particular attention&#8212;it is a condition of deployment. In banks, insurers, telcos, and critical infrastructure, the demo is not the hard part. Auditability, reproducibility, vendor risk, security, compliance, and long-term support are what procurement will flag. Pilot teams that do not document these early should not be surprised when a technically promising project stalls at the procurement stage.</p><p>Not every category is ready for enterprise piloting. The categories Beckstein sees as decision-relevant in the next 12 to 24 months are specific: quantum-safe security planning in regulated sectors, financial services workflows including pricing, risk, and fraud detection, and operational planning in logistics, energy, and supply chains. What she is explicitly not backing are categories that still depend on hardware breakthroughs before they can deliver enterprise value. For operators choosing between vendors, that boundary is a useful screen: if a vendor&#8217;s pitch depends on technology that does not yet work at enterprise scale, no amount of careful pilot design will produce a deployable result.</p><p>To move from exploration to a budget line-item, Beckstein is clear about what needs to be in place: <em><strong>&#8220;A clear owner, clear business value, usable data, and a realistic path to implementation.&#8221;</strong></em> If any of those four are absent, the pilot is not ready.</p><p>Before funding a quantum pilot, operators should be able to answer the following: which expensive decision is worth improving, why current methods are no longer sufficient, and whether a quantum-inspired or hybrid approach can beat a defined baseline under real conditions. If that cannot be answered upfront, the pilot should wait.</p><div><hr></div><h3>More From Asia Tech Lens</h3><ul><li><p><strong><a href="https://www.asiatechlens.com/p/india-quantum-computing-global-race">Can India Build Quantum Computers That Matter Globally?</a></strong><br>India&#8217;s quantum push shows why national ambition is only the first step; the harder test is turning research capacity into commercially relevant systems.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/japan-quantum-strategy-software-over-hardware">Why Japan&#8217;s Quantum Strategy Starts With Algorithms, Not Qubits</a></strong><br>Japan&#8217;s approach underlines the same near-term lesson: quantum value may arrive first through applied software and workflow improvements, not hardware breakthroughs.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/singapore-quantum-ai-strategy">Singapore&#8217;s Quantum Bet: Where AI Meets the Next Compute Revolution</a></strong><br>Singapore&#8217;s quantum ecosystem helps explain why the region is trying to close the gap between research investment and enterprise deployment.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china">Agentic AI Can Act. Singapore&#8217;s New Rulebook Says: Prove You Can Stop It.</a></strong><br>Like quantum pilots, agentic AI deployments show that advanced technology only earns enterprise trust when governance, control, and accountability are built in early.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/indias-ai-push-is-real-production-sarvam">India&#8217;s AI Push Is Real. Production Access Is the Constraint</a></strong><br>This piece echoes the same deployment problem: emerging technology only matters when it can move from promise to production infrastructure.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[AI Is Shrinking The Time To Compromise. Most Firms Still Can’t Recover Control]]></title><description><![CDATA[As AI shortens the path from vulnerability to attack, most organizations are still unprepared to regain control once systems are compromised]]></description><link>https://www.asiatechlens.com/p/ai-cyber-risk-recovery-control</link><guid isPermaLink="false">https://www.asiatechlens.com/p/ai-cyber-risk-recovery-control</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 30 Apr 2026 01:06:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UPec!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UPec!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UPec!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UPec!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UPec!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UPec!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UPec!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:946161,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/195851865?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UPec!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!UPec!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!UPec!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!UPec!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a311-9eb3-43c3-b323-d36b0179274c_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://commercial.allianz.com/news-and-insights/reports/a-guide-to-cyber-risk.html">Allianz</a></figcaption></figure></div><p><em><strong>Editor&#8217;s Note:</strong> Asia Tech Lens turns one this week. The goal when we started was straightforward: track Asia&#8217;s technology rise with perspective, without the hype, and free from rhetoric. A year in, readers from nearly 60 countries have found their way here&#8212;many in the U.S., the U.K., and across Europe, alongside strong communities in Singapore and India. Different geographies, one shared question: how technology actually gets built and scaled in this part of the world.</em></p><p><em>That readership has clarified what this publication is.</em></p><p><em>Asia Tech Lens is defined less by where the stories come from than by how we approach them. We look at Asia the way a builder would&#8212;execution, trade-offs, and the systems beneath the headlines and explain what we find in a way that travels across markets.</em></p><p><em>The direction is set. The next year is about going deeper.</em></p><p><em>Thank you for being part of our journey. Here&#8217;s to the next chapter. </em></p><div><hr></div><p>Much of the discussion around AI in cybersecurity has focused on faster, more scalable attacks. But that framing is incomplete. As AI shortens the gap between a weakness being found and being exploited, the bigger question for operators is what happens next. Once core systems are hit, can they regain control and keep the business running?</p><p>There is a gap in recovery. Veeam&#8217;s 2025 <a href="https://www.veeam.com/company/press-release/veeam-report-finds-close-to-70-percent-of-organizations-still-under-cyber-attack-despite-improved-defenses.html">ransomware research</a> found that nearly 7 in 10 organizations experienced at least one cyberattack in the previous year, but only 10% recovered more than 90% of their data, while 57% recovered less than half.</p><p>Many organizations believe they are ready because they rely on plans, backups, and recovery targets. In practice, those do not guarantee that a critical system can be restored under real conditions.</p><p>As the window to respond shrinks, the problem shifts. Restoring systems alone is not enough when identity, access, backups, and dependencies are uncertain. Operators also have to rebuild trust in what comes back online.</p><h2>AI Is Shrinking The Time Between Vulnerability and Compromise</h2><p>AI is making it easier to surface vulnerabilities across systems and applications. In Singapore, cybersecurity awareness is relatively mature. Still, AI is already changing how enterprises think about exposure, according to <a href="https://www.linkedin.com/in/joeylimszesze/">Joey Lim, Country Manager at Exclusive Networks Singapore</a>, a global cybersecurity specialist.</p><p><em><strong>&#8220;On the ground, we see a shift from periodic security assessments toward a more continuous posture,&#8221; </strong></em>Lim told Asia Tech Lens. <em><strong>&#8220;Organizations are asking harder questions about their attack surface, not just what they know about, but what they don&#8217;t. And that&#8217;s the right instinct.&#8221;</strong></em></p><p>That compression changes which capability matters most. When the window between vulnerability and exploitation was measured in weeks, detection and patching kept most incidents from reaching the recovery phase. As that window shrinks, more incidents will get through. Recovery stops being the fallback&#8212;it becomes the front line.</p><p>That leaves operators with a harder question. When something gets through, can they respond quickly, regain control, and recover before the damage spreads?</p><h2>The Real Bottleneck Is Recovery</h2><p>Backups can make organizations feel safer than they are. A completed backup job shows that data exists somewhere, but it does not prove the business can recover.</p><p>For <a href="https://www.linkedin.com/in/garethr/">Gareth Russell, Field CTO, APAC, at Commvault</a>, the starting point is no longer how fast an organization can restore systems.<em><strong> &#8220;In a cyber incident, speed without trust is a huge risk,&#8221;</strong></em> he told Asia Tech Lens.</p><p>The more important question is how quickly a company can identify a known clean state, reestablish trusted control, and bring back a service it can rely on. That is the difference between trusted recovery and simply powering systems back on.</p><p>Traditional metrics such as recovery time objective (RTO) and recovery point objective (RPO) still matter, but Russell said they often reflect intent rather than reality. What matters most is whether organizations can recover a clean, usable service end-to-end without reintroducing the threat.</p><p><em><strong>&#8220;When I talk to CIOs and CISOs about recovery readiness today, we look at things like time to clean recovery, coverage of immutable and verified data, the ability to regain control of identity systems, and whether recovery has been tested under realistic conditions,&#8221;</strong></em> Russell said.</p><p>Across Asia, Commvault has found that 85% of organizations have incident response plans, but only 30% test all mission-critical workloads. When a real incident hits, those plans often do not hold, and recovery takes longer than expected.</p><p>The gap shows up in execution. Restoring a database or application is one thing. Getting the business running again during a real incident is another.</p><p>Recovery, in this sense, means testing the full process before a real incident leaves no room to guess.</p><h2>Identity Is Where Recovery Often Breaks</h2><p>If identity is compromised, recovery can&#8217;t start with simply restoring workloads. The organization first has to decide who and what can still be trusted. Otherwise, bringing systems back may also bring back the attacker&#8217;s access. Russell said identity failure changes the nature of recovery.</p><p><em><strong>&#8220;In most incidents, it is not just that access is lost, it is that you cannot trust who or what is accessing anything,&#8221;</strong></em> he said. Federation fails, tokens may still be valid, service accounts may keep running, and organizations can lose control of the control plane.</p><p><em><strong>&#8220;Teams often try to recover workloads before identity is stable. That is where things fall apart. If identity is not clean, nothing you bring back can be trusted,&#8221;</strong></em> Russell added.</p><p>Lim described how this failure unfolds in real time. A threat is detected, but the scope is unclear, so escalation is delayed. By the time leadership is engaged, critical hours have passed. The response team then realizes the incident response plan no longer matches the current environment. Systems have changed, contacts are outdated, and dependencies are unclear.</p><p>At the same time, attackers move laterally and target credentials. The team now faces a more dangerous problem. They no longer know which accounts, systems, or access paths can be trusted. Recovery slows as every action needs to be verified.</p><p>This is where the incident turns. Shut down too broadly and disrupt operations, or move too carefully, and the attackers may still be active. <em><strong>&#8220;This is often where a serious incident becomes a catastrophic one,&#8221;</strong></em> said Lim.</p><p>When identity is uncertain, recovery becomes a series of high-risk decisions made without clear visibility of what is safe.</p><h2>Operators&#8217; Takeaways</h2><h3>Do Now</h3><ul><li><p>Prove recovery. Test one critical service end-to-end, with clean data, trusted access, and dependencies restored in the right order. Russell said the minimum proof is a full recovery under real conditions, where users can log in, and the service works.</p></li><li><p>Map your exposure. Understand not just known assets, but shadow IT, cloud workloads, and third-party integrations. Lim said the assets that organizations do not track are often the ones that get exploited first.</p></li><li><p>Harden identity. Reduce over-privileged accounts, clean up service accounts, and enforce consistent multi-factor authentication. Lim warned that many teams are still <em><strong>&#8220;working blind&#8221;</strong></em> when identity is compromised.</p></li><li><p>Run real drills. Test recovery under realistic conditions, not just tabletop exercises. Recovery needs to be proven in execution, not assumed because plans exist.</p></li></ul><h3>Wait</h3><ul><li><p>Hold off on more AI-security tools until recovery basics are proven. Lim said the bigger issue is not adding AI features, but whether the response is built for machine-speed attacks.</p></li><li><p>Be realistic about in-house response. A full 24/7 detection-and-response capability is <em><strong>&#8220;not realistic for most&#8221;</strong></em> organizations.</p></li><li><p>Delay framework rewrites if plans have not been tested. According to Russell, recovery readiness comes from repeatable execution, not documentation.</p></li></ul><h3>Avoid</h3><ul><li><p>Do not assume backups guarantee recovery. Russell said untested and compromised backups are common failure points.</p></li><li><p>Do not restore systems before identity is trusted. If identity is still compromised, restored systems cannot be trusted. <em><strong>&#8220;Break glass only works if it is genuinely separate, operationally ready, and trusted when everything else is not,&#8221;</strong></em> said Russell.</p></li><li><p>Do not treat compliance as resilience. Compliance sets a baseline but <em><strong>&#8220;doesn&#8217;t give you resilience,&#8221;</strong></em> said Lim.</p></li><li><p>Do not treat cybersecurity as only a technology problem. Communication and decision-making often fail first.</p></li></ul><div><hr></div><h2>Related Reads On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/ai-cybercrime-southeast-asia">AI Is Accelerating Cybercrime&#8212;and Southeast Asia Feels It First</a></strong></p><p>AI is making cybercrime faster, cheaper, and easier to scale across Southeast Asia. This piece explains why organizations have less time to detect, contain, and recover from attacks.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china">Agentic AI Can Act. Singapore&#8217;s New Rulebook Says It Needs Guardrails</a></strong></p><p>As AI systems gain more autonomy, the risks shift from what they can generate to what they can do. We look at why permissions, oversight, and recovery planning matter before AI agents are allowed into real workflows.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/two-ai-phones-two-access-models-one-samsung-ai-agent-bytedance-doubao-galaxy-google-access-privacy">Two AI Phones. Two Access Models. One Critical Difference.</a></strong></p><p>AI access is becoming an operational risk, not just a product feature. This piece compares two approaches to AI control and shows why permissions, identity, and trust layers matter as systems become more automated.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall</a></strong></p><p>When AI agents start acting across apps and services, security and accountability become the real constraints. The piece looks at why uncontrolled access can quickly turn AI capability into operational risk.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/indias-ai-push-is-real-production-sarvam">India&#8217;s AI Push Is Real. Production Access Is the Constraint</a></strong></p><p>AI ambition only matters if systems can work under real operating conditions. This piece examines why production access, auditability, and incident ownership are becoming the true tests of AI readiness.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Hormuz Problem Asia's Battery Makers Haven't Mapped]]></title><description><![CDATA[For battery and EV manufacturers across Asia, Hormuz isn't just an energy story. It's a materials problem with a closing decision window]]></description><link>https://www.asiatechlens.com/p/hormuz-battery-petrochemical-supply-chain</link><guid isPermaLink="false">https://www.asiatechlens.com/p/hormuz-battery-petrochemical-supply-chain</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 22 Apr 2026 01:01:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Q4ak!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q4ak!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q4ak!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q4ak!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1998407,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/194882818?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q4ak!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Q4ak!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbbe3196-a314-43e0-bc2c-9c77d40608fa_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image credit: <a href="https://unsplash.com/photos/strait-of-hormuz-between-iran-and-oman-8koWngCqqzM">Planet Volumes</a></figcaption></figure></div><p>Nearly eight weeks after <a href="https://edition.cnn.com/world/live-news/israel-iran-attack-02-28-26-hnk-intl">US-Israeli strikes on Iran</a> effectively closed the Strait of Hormuz, most coverage has focused on oil prices, stranded tankers, and ceasefire negotiations. That is the visible story. There is a quieter one running underneath it.</p><p>The chemicals used to build battery cells trace back to petrochemicals that flow from Gulf refineries through the Strait of Hormuz. That supply is now effectively cut off. Prices have already moved sharply. But the more consequential impact arrives later, with a lag of several weeks between a feedstock disruption and a factory-floor shortage.</p><p>That lag is where the danger sits. Most battery and EV manufacturers across Asia are still running on inventory built before the crisis. The disruption feels distant, but it isn&#8217;t. And for procurement and operations leads at battery cell manufacturers and EV companies across the region, the window to act before that lag resolves is open now&#8212;and closing. If availability tightens, no amount of money resolves the problem quickly. The bottleneck becomes time.</p><h2>The Chemicals Inside Every Battery Cell</h2><p>The key components of a battery cell&#8212;the separator, the electrolyte solvent, and the binder&#8212;are all derived from petrochemicals. Most of these petrochemicals trace back to a raw material called naphtha. Asia&#8217;s petrochemical producers rely on the Middle East for <a href="https://cen.acs.org/business/petrochemicals/Hormuz-Strait-pinch-worsens-Asian/104/web/2026/03">60 to 70%</a> of their naphtha imports, most of which transits the Strait of Hormuz. When the strait effectively closed in early March, Gulf naphtha exports to Asia came to a halt.</p><p>The price signal arrived immediately. Naphtha was trading at around US$776 per metric ton before the disruption. It surged past <a href="https://markets.financialcontent.com/wral/article/marketminute-2026-3-30-naphtha-surges-to-1000-the-petrochemical-crisis-of-2026-explained">US$1,000</a> at its peak and remains above <a href="https://tradingeconomics.com/commodity/naphtha">US$870</a> today. But the more consequential number is the lag. When a feedstock like naphtha becomes difficult to source, the effect moves through the supply chain in stages&#8212;from refinery to petrochemical plant, from petrochemical plant to component manufacturer, from component manufacturer to battery cell maker. Asian petrochemical producers typically carry only <a href="https://tankterminals.com/news/naphtha-shortage-forces-japanese-petrochemical-producers-to-curb-output/">a few weeks</a> of naphtha inventory. The disruption began in late February. Factory-floor shortages were already visible by mid-March, and continue to deepen.</p><p>The problem is compounded by substitutability, or the lack of it. Switching to a different supplier or material isn&#8217;t just a procurement decision. It&#8217;s an engineering call as well. As <a href="https://chargedevs.com/features/battery-cell-qualification-for-evs-lucids-cell-specialist-discusses-the-complicated-process/">Maithri Venkat, Battery Cell Technical Specialist</a> at Lucid Motors, puts it, every single change to a cell must be scrutinized, because even a minor process change from a supplier can have unintended and severe impacts downstream. That scrutiny takes time that procurement teams don&#8217;t control. For operators who haven&#8217;t started that process, the window is already narrowing.</p><h2>How Exposed You Are Depends on Where You Sit</h2><p>South Korea is the most directly exposed manufacturing base in Asia to the current disruption. The country imports <a href="https://carnegieendowment.org/emissary/2026/03/iran-korea-semiconductor-chips-energy-oil-hormuz">roughly 70%</a> of its crude from the Middle East, with most of that transiting Hormuz. The impact is already <a href="https://en.sedaily.com/finance/2026/04/16/naphtha-shortage-ripples-through-supply-chain-from-clothing">visible on the ground</a>: Yeochun NCC declared force majeure on naphtha supply in early April, with Lotte Chemical, LG Chem, and Hanwha Solutions all subsequently notifying customers of potential supply disruptions. For South Korean battery cell manufacturers sourcing petrochemical inputs from these suppliers, this is no longer a future risk. It is a current one.</p><p>China&#8217;s exposure is different in character but no less serious. Analysts estimate <a href="https://alhurra.com/en/15490">around 45%</a> of China&#8217;s oil imports transit Hormuz&#8212;lower than South Korea&#8217;s share, but compounded by a geopolitical dimension that makes it harder to manage. In late March, <a href="https://time.com/article/2026/04/07/strait-of-hormuz-countries-pass-deals-iran-us-war-trump/">Iran granted</a> selective passage to vessels from a handful of nations including China, framing it as a diplomatic gesture toward non-hostile states. That arrangement has since collapsed. That brief window of selective passage was never a durable solution, and no operator should plan around it now. For Chinese manufacturers, the risk is not just cost inflation. It is that a deeply optimized supply chain is less flexible than it looks when upstream access turns unstable.</p><p>Japan <a href="https://cen.acs.org/business/petrochemicals/Hormuz-Strait-pinch-worsens-Asian/104/web/2026/03">moved earliest</a>. Mitsubishi Chemical began cutting output within days, and Mitsui confirmed it was actively sourcing naphtha from non-Middle Eastern suppliers. That process costs more. Alternative naphtha from US Gulf Coast or Southeast Asian refiners carries a meaningful premium. But Japan&#8217;s early action bought optionality. If the disruption extends, Japanese manufacturers are already positioned. If it resolves sooner, they wind down the alternative contracts.</p><p>Across all three markets, the dividing line is simple: the manufacturers who know where their supply chain touches the Gulf are managing a problem. Those who don&#8217;t are walking into one.</p><h2>The Decision Window</h2><p>For procurement and operations leads across the region, one decision remains open, but not for long.</p><p>The choice is this: lock in alternative petrochemical supply now, at a visible premium, or hold and wait for Hormuz to normalize. The case for waiting has largely fallen away. Daily transits have collapsed back to near zero, against <a href="https://www.insurancejournal.com/news/international/2026/04/09/865095.htm">a pre-war average of 135</a>. The ceasefire announced on April 8 collapsed within days, with Iran re-closing the strait on April 18 after the US refused to lift its blockade of Iranian ports. QatarEnergy <a href="https://www.lngindustry.com/liquid-natural-gas/30032026/qatarenergy-extends-force-majeure-until-mid-june-2026/">has extended</a> force majeure through at least mid-June 2026. Commercial normalization is not expected before July at the earliest, and only if US-Iran peace talks produce a concrete agreement.</p><p>The asymmetry is worth stating plainly. If you lock in alternative supply and the strait normalizes next month, you absorb a premium you can recover from. If you wait and the disruption extends through the second quarter, you face a shortage that money cannot solve quickly&#8212;because the constraint is not price, it is time. Production stoppages caused by input unavailability are not fixed with a larger purchase order. They require months of requalification work that should have started earlier.</p><p>The signal to act is simple: talks have stalled, the strait is shut, and your suppliers are starting to tell you they can&#8217;t guarantee delivery&#8212;not just that prices are up.</p><p>The Hormuz strait will reopen. When it does, the vulnerability it exposed will still be there. Asia&#8217;s battery and EV supply chains were built on Gulf petrochemicals long before this crisis. The manufacturers who use this window to map that exposure and build alternative sourcing relationships are fixing an assumption that was always fragile.</p><div><hr></div><h2>More from Asia Tech Lens</h2><p><strong>When Battery Economics Shift: What Gets Stress-Tested in China&#8217;s EV Strategy?</strong><br>A look at what breaks when battery assumptions stop holding. </p><p><strong><a href="https://www.asiatechlens.com/p/not-just-evs-china-leads-the-world">Not Just EVs: China Leads the World in Battery Production </a></strong><br>A battery-first read on how chemistry, materials, and manufacturing scale shape competitiveness.</p><p><strong><a href="https://www.asiatechlens.com/p/vinfast-pivots-to-southeast-asia">VinFast Pivots to Southeast Asia. But Can It Outrun BYD in Indonesia?</a></strong><br>A piece on EV competition shaped by localization, industrial constraints, and execution risk.</p><p><strong><a href="https://www.asiatechlens.com/p/the-chip-wars-new-reality-a-view">The Chip War&#8217;s New Reality: A View from the Crossroads</a></strong><br>A read on how geopolitical pressure reshapes commercial supply chains.</p><p><strong><a href="https://www.asiatechlens.com/p/asias-high-stakes-chip-game-what">Asia&#8217;s High-Stakes Chip Game: What To Do When You&#8217;re Caught Between Washington and Beijing</a></strong><br>A read on how geopolitical pressure turns cross-border chip dependency into an operating problem for Asian firms caught between the US and China.</p>]]></content:encoded></item><item><title><![CDATA[Vietnam’s 5G Is Expanding Fast. Can Operators Trust the Stack It’s Built On?]]></title><description><![CDATA[As Vietnam builds out 5G on Chinese vendor equipment, operators face real questions about compliance exposure, interoperability constraints, and the cost of switching later]]></description><link>https://www.asiatechlens.com/p/vietnam-5g-vendor-stack-operator-risk</link><guid isPermaLink="false">https://www.asiatechlens.com/p/vietnam-5g-vendor-stack-operator-risk</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 15 Apr 2026 01:00:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ml6o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ml6o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ml6o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ml6o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1560833,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/194159487?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ml6o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ml6o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb27bd058-9e7e-4ae6-b89e-884fed97abc9_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://english.mst.gov.vn/5g-expansion-in-vietnam-mobifone-joins-the-race-to-accelerate-connectivity-197250328092041599.htm">Image: MobiFone</a></figcaption></figure></div><p>Vietnam&#8217;s 5G network is expanding quickly. For operators building industrial operations in the country, the harder question is not whether the network will reach them&#8212;it almost certainly will&#8212;but whether the infrastructure underneath it can be trusted over time.</p><p>As Vietnamese telecom operators roll out 5G using a mix of domestic and Chinese vendors&#8212;including Huawei and ZTE&#8212;businesses are taking on a structural risk that goes beyond connectivity. Early infrastructure choices are shaping data exposure, compliance posture, and switching costs for years to come. Once systems are built on top of a network stack, changing course later gets expensive and complicated, especially if regulation tightens or vendor compatibility becomes a problem.</p><p>For manufacturers, logistics operators, and industrial infrastructure players in Vietnam, this is the question that should be driving infrastructure decisions right now&#8212;not rollout speed, not coverage maps, but whether the vendor stack underneath the network is one they can build on without regret.</p><h2>The Rollout Is Real. Enterprise Uptake Is Not</h2><p>Vietnam&#8217;s 5G rollout is moving fast by any regional standard. According to the Vietnam Telecommunications Authority, the country had installed nearly 40,000 base transceiver stations as of February 2026, covering about 90% of the population and serving close to 23 million subscribers. Independent benchmarks from OpenSignal and GSMA broadly support the pace of expansion, though public estimates of enterprise adoption remain limited.</p><p>But enterprise uptake has been slower to follow. Private 5G networks&#8212;often positioned as the business payoff of the technology&#8212;have yet to take off in a meaningful way. Deployment in specialized settings like seaports and industrial facilities has been particularly slow, with businesses remaining cautious over technical integration challenges and regulatory issues such as spectrum allocation. Citing comments from former deputy minister of post and telecommunications Mai Liem Truc in a January 2026 Vietnamnet Global report, private networks were expected to become a major revenue driver for telco operators, but consumer users still account for most demand.</p><h2>The Real Risk Is the Vendor Stack</h2><p>With Vietnam expanding its 5G rollout, vendor choice is becoming the more consequential question. Telco operators Viettel and VNPT have signed 5G equipment deals with Huawei and ZTE, while Mobifone is exploring similar partnerships. Cost is clearly part of the rationale&#8212;Reuters reported that Vietnamese officials described Chinese telco equipment as reliable and cost-effective.</p><p>But for operators building on top of this infrastructure, the trade-offs go well beyond price. European officials have warned that the involvement of Chinese vendors in Vietnam&#8217;s advanced networks could raise questions for foreign investors about data security and the reliability of the underlying infrastructure.</p><p>For operators running data-heavy industrial operations, this translates into three specific risks.</p><h4>Compliance exposure.</h4><p>Vietnam&#8217;s own regulatory environment is tightening. The Personal Data Protection Decree (Decree 13/2023), effective since July 2023, requires cross-border data transfer impact assessments filed with the Ministry of Public Security, and the Law on Personal Data Protection (Law 91/2025) that took effect in January 2026 introduces revenue-based penalties&#8212;up to 5% of annual revenue for cross-border transfer violations. Operators whose systems sit on networks built with vendors flagged as high-risk by their trading partners face a compounding problem: Vietnam&#8217;s own data rules are getting stricter at the same time that the EU and US are tightening restrictions on Chinese-origin ICT infrastructure. The EU&#8217;s 5G Cybersecurity Toolbox has driven several member states to restrict or exclude high-risk vendors from core and sensitive network functions, and the European Commission has signaled it may make these measures binding. In the US, the ICTS supply chain final rule (effective February 2025) gives the Commerce Department broad authority to prohibit transactions involving ICT from foreign adversaries. An operator in Vietnam working with a European automotive OEM or a US logistics partner may find that vendor choices made at the network layer create compliance friction they did not anticipate.</p><h4>Interoperability constraints.</h4><p>Integrating with global systems, cloud providers, and cross-border platforms becomes more complex when the underlying network infrastructure is built on vendor-specific architectures. Open RAN&#8212;the set of standards designed to enable multi-vendor interoperability&#8212;is gaining momentum globally, with operators like AT&amp;T targeting 70% of RAN traffic on open platforms, and initial deployments appearing in Southeast Asia through the Orex SAI&#8211;Surge rollout in Indonesia. But Vietnam&#8217;s 5G buildout has largely followed the traditional single-vendor model. For operators who need their Vietnamese sites to integrate cleanly with global cloud infrastructure, enterprise platforms, or cross-border data systems, a proprietary network stack can mean additional integration layers, workarounds, and dependencies that compound over time.</p><h4>Switching costs.</h4><p>Once operations are built on top of a network stack, moving away from it requires reconfiguring systems, vendors, and workflows across the entire dependent layer. The scale of this problem is not hypothetical. In the US, the FCC&#8217;s &#8220;rip and replace&#8221; program to remove Huawei and ZTE equipment from domestic networks generated reimbursement claims of over $5 billion against an initial appropriation of $1.9 billion&#8212;and that was for relatively small carriers, not large-scale industrial operations. For operators in Vietnam who build factory automation, logistics tracking, or port management systems on top of a 5G network stack, the cost of switching later would involve not just the network equipment itself but the entire operational technology layer built above it.</p><h2>Operator Takeaways</h2><ul><li><p><strong>Do Now</strong></p><p>Focus on targeted 5G deployments in controlled settings where the use case is already clear&#8212;smart factories, seaports, airports, logistics hubs. These are areas where Vietnamese operators are already testing private networks and where value is easier to measure. Where possible, negotiate flexibility into infrastructure decisions: vendor diversification clauses, interoperability requirements, or exit options that reduce long-term lock-in risk. Wait too long, and operators may lose the chance to shape early network partnerships in industrial zones where infrastructure terms are already being set.</p></li><li><p><strong>Wait</strong></p><p>Hold back on scaling private 5G too broadly across sites until integration maturity, enterprise demand, and regulatory clarity improve. Vietnam&#8217;s enterprise rollout has been slower than expected, especially outside pilot environments. Push too quickly beyond pilots, and operators risk managing parallel legacy and 5G systems simultaneously&#8212;higher costs, engineering teams stretched thin, and uncertain returns on infrastructure that may need to be reworked later.</p></li><li><p><strong>Avoid</strong></p><p>Do not treat fast rollout or early 6G ambition as a signal of full industrial readiness. Operators who over-commit now risk locking into a vendor stack that becomes a liability when compliance requirements tighten, when global partners demand higher standards for data handling and interoperability, or when investment committees ask why the infrastructure cannot be adapted without a seven-figure rearchitecting program. The US rip-and-replace experience showed what happens when vendor choices made for cost reasons become a compliance problem years later. In Vietnam, the same dynamic is forming&#8212;but operators still have time to build with flexibility if they act now.</p></li></ul><p>Vietnam&#8217;s 5G network is moving ahead, and the opportunity for industrial operators is real. But the opportunity comes with a structural question that rollout statistics cannot answer: whether the vendor stack underneath the network is one that operators can build on for the long term&#8212;or one they will eventually need to build around. The smarter move is to deploy selectively, negotiate flexibility, and treat the country&#8217;s longer-term ambitions, including 6G, as a signal of direction rather than a decision point.</p><div><hr></div><h2>More from Asia Tech Lens</h2><p><strong><a href="https://www.asiatechlens.com/p/chinas-openclaw-wave-signal-or-noise-operators-ai-agents-tencent-bytedance-minimax">OpenClaw in China: What the AI Agent Frenzy Actually Means for Enterprise Deployment in Asia</a></strong><br>Why fast enterprise adoption can hide deeper integration, dependency, and lock-in risks.</p><p><strong><a href="https://www.asiatechlens.com/p/two-ai-phones-two-access-models-one-samsung-ai-agent-bytedance-doubao-galaxy-google-access-privacy">Two AI Phones. Two Access Models. One Critical Difference</a></strong><br>How underlying system design shapes trust, control, and the long-term risks of technological dependence.</p><p><strong><a href="https://www.asiatechlens.com/p/why-smartphone-prices-could-rise">Why Smartphone Prices Could Rise in 2026 as RAM Costs Surge</a></strong><a href="https://www.asiatechlens.com/p/why-smartphone-prices-could-rise"> </a>                        The AI phone race is also a hardware story. As memory costs reshape device pricing and features, the pressure is exposing how upstream component dependence can ripple through the wider tech stack.</p><p><strong><a href="https://www.asiatechlens.com/p/the-ai-battleground-how-southeast">US vs China AI Showdown: How Southeast Asia Is Quietly Choosing Open-Source Over Closed Model</a></strong><br>How regional operators are making stack decisions based on cost and usability, even when those choices carry longer-term strategic consequences.</p><p><strong><a href="https://www.asiatechlens.com/p/can-south-korea-replicate-its-k-pop">Can South Korea Replicate Its K-Pop Success in AI Chips?</a></strong><br>Why geography, supply-chain resilience, and strategic dependence matter as much as technical performance when countries try to build alternative tech stacks.</p>]]></content:encoded></item><item><title><![CDATA[Two Robots, One Plan]]></title><description><![CDATA[Beijing's five-year plan bundles proven factory automation and speculative humanoid robots under the same policy umbrella. For operators in manufacturing, that gap is the first thing to close]]></description><link>https://www.asiatechlens.com/p/two-robots-one-plan-china-fyp-robotics</link><guid isPermaLink="false">https://www.asiatechlens.com/p/two-robots-one-plan-china-fyp-robotics</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 19 Mar 2026 01:01:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_q-z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_q-z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_q-z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_q-z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1289740,&quot;alt&quot;:&quot;robots at work&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/191331286?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="robots at work" title="robots at work" srcset="https://substackcdn.com/image/fetch/$s_!_q-z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_q-z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fddc5d4-107a-4e02-9c5a-ea12101e0397_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image credit: <a href="https://www.robotics247.com/article/elite_robots_gets_order_3000_cobots_fortune_500_company">Robotics247.com</a></figcaption></figure></div><p>If you are a manufacturing or operations director in Southeast Asia, there is a reasonable chance someone has recently put China&#8217;s 15th Five-Year Plan in front of you as evidence that now is the time to move on robotics. The pitch is not wrong, exactly. But it is incomplete in a way that could cost you a capex cycle.</p><p>China&#8217;s plan frames industrial automation and humanoid robots under the same umbrella&#8212;&#8221;new quality productive forces&#8221;&#8212;governed by the same political language, eligible for the same funding mechanisms, and pointed at the same national transformation goals.</p><p>The framing is deliberate and effective at the macro level. At the procurement level, it creates a specific problem: the plan draws no meaningful line between what is deployable today and what is still being figured out.</p><p>That line is the operator&#8217;s job to draw.</p><h2>The Stack That&#8217;s Ready</h2><p>In 2024, China <a href="https://ifr.org/downloads/press_docs/2025-09-25-IFR_press_release_China_in_English.pdf">installed</a> 295,000 industrial robots&#8212;54% of the global total&#8212;with a world record of 2 million units working in factories. Domestic brands now supply <a href="https://en.people.cn/n3/2025/1205/c90000-20398797.html">58.5%</a> of that market, up from 31.4% in 2020.</p><p>The ROI case for industrial robotics is well-established, with cobots&#8212;collaborative robots designed to work alongside humans on the same floor without safety caging&#8212;typically offering a <a href="https://www.lastingdynamics.com/blog/collaborative-robots-cobots-software-2026">payback period</a> between 12 to 18 months.</p><p>For a manufacturing director, this is a procurement decision with quantifiable ROI available now. The 15th FYP is confirmation that China will keep compounding this advantage.</p><p>But &#8220;ready&#8221; does not mean frictionless.</p><p>Integration remains the constraint most operators underestimate. Retrofitting robotics into legacy production lines requires compatible control systems, reliable integrators, and carefully planned downtime. A cobot that performs well in a controlled demo still needs calibration against the variability of real factory inputs.</p><p>Trade policy is another variable emerging in the region. Some Southeast Asian markets are tightening scrutiny around Chinese industrial imports in sensitive sectors, and tariffs or certification delays can stretch deployment timelines. Even where trade barriers remain low, labor relations can complicate adoption when automation arrives in labor-intensive industries.</p><p>Even with a stack that works, successful deployments still depend on execution. The constraints are real but manageable. The question for most operators is not whether to engage this stack, but how quickly.</p><h2>The Stack That Isn&#8217;t</h2><p>The plan&#8217;s unified language covers humanoid robots with the same confidence. The deployment reality is categorically different.</p><p>Chinese firms shipped roughly <a href="https://restofworld.org/2026/china-humanoid-robots-unitree-agibot-tesla-optimus/">90%</a> of the world&#8217;s humanoid robot units in 2025, according to research firm Omdia, <a href="https://www.scmp.com/tech/tech-trends/article/3339346/chinese-firms-outpace-us-rivals-2025-humanoid-robot-shipments-agibot-takes-lead">led by</a> AgiBot at 5,168 units and Unitree at over 4,200&#8212;though Unitree&#8217;s own reported figures put its total at 5,500. The numbers sound significant until context is applied: global humanoid robot shipments reached just <a href="https://www.forbes.com/sites/johnkoetsier/2026/01/09/top-10-humanoid-robot-companies-by-shipments-revealed/">13,317 units</a> in 2025 in total, and it remains unclear how many of those represent genuine commercial sales versus demonstration models or pilot deployments. The headline showcase deployments&#8212;<a href="https://en.people.cn/n3/2025/0429/c90000-20309191.html">UBTECH at Zeekr</a>, for example&#8212;involve materials handling and quality inspection: tasks that purpose-built industrial arms already handle, often better and for less.</p><p>The technical constraints are specific and unresolved. Battery life is the hardest wall. Agility&#8217;s Digit, currently one of the first commercially deployed humanoids in the world, operates in warehouse environments with battery life reaching approximately <a href="https://www.humanoidsdaily.com/news/agility-robotics-upgrades-digit-humanoid-with-longer-runtime-amr-integration-and-enhanced-safety-features">four hours</a> depending on task intensity. A standard factory shift runs eight to twelve hours. The gap requires either a charging rotation system or continuous human supervision, both of which erode the labor-saving economics being sold.</p><p>This is where the timeline question matters.</p><p>When operators say humanoids might become relevant in &#8220;<a href="https://getproductiv.com/blog/man-vs-machine">18 to 24 months</a>,&#8221; the claim is not about hype cycles. It refers to three concrete thresholds: first, whether machines can sustain something close to a full factory shift; second, whether unit economics support pilot-to-production conversion; and third, whether the vendor ecosystem stabilizes enough to trust multi-year procurement decisions.</p><p>Until at least some of those thresholds are crossed, humanoids remain a monitoring exercise rather than a deployment plan.</p><h2>What Happens When Operators Don&#8217;t Separate Them</h2><p>The risk is not theoretical. In November 2025, K-Scale Labs&#8212;a humanoid startup that had received over <a href="https://eu.36kr.com/en/p/3558501366315912">$2 million</a> in orders, and launched two products&#8212;<a href="https://eu.36kr.com/en/p/3559984314980485">collapsed</a> on the verge of mass production. The CEO cited failed financing and an out-of-control burn rate.</p><p>K-Scale is one data point, but the<a href="https://interestingengineering.com/ai-robotics/china-humanoid-robotics-bubble-warning"> NDRC&#8217;s warning</a> that over 150 humanoid companies are now competing in China on largely identical products suggests the consolidation risk is sector-wide.</p><p>For a director who has signed an MOU or committed integration resources to a humanoid vendor, this is vendor survival risk, not just product maturity risk.</p><p>The second failure mode is subtler. Key suppliers in China&#8217;s humanoid robot supply chain are making preemptive investments in production capacity ranging from <a href="https://www.humanoidsdaily.com/news/goldman-sachs-chinese-suppliers-aggressively-building-humanoid-robot-capacity-ahead-of-orders">100,000 to 1 million</a> robot-equivalent units annually&#8212;despite no company having confirmed large-scale orders or a clear production timeline.</p><p>A manufacturing director who runs a premature pilot off the back of that supply-side confidence doesn&#8217;t just lose the capex, they make it harder to get the next automation proposal approved internally.</p><p>That&#8217;s because when companies run pilots around immature technology, the cost rarely ends with the pilot budget itself. Engineering teams divert time from deployable automation projects to support experimental trials. Management attention shifts toward solving integration problems that cannot yet be solved. And when the pilot inevitably stalls, the experience often hardens internal skepticism toward robotics more broadly. A failed experiment becomes the board&#8217;s reference point the next time someone proposes automation spending, even if the next proposal involves technology that is already commercially proven.</p><h2>Two Decision Tracks, Not One</h2><p>The 15th FYP groups these two stacks together because that serves China&#8217;s industrial strategy. It does not resolve the decision a manufacturing director in Southeast Asia is actually facing.</p><p>Proven industrial automation in structured environments is a procurement decision for now. The ROI is quantifiable, the supply chain is mature, and the sourcing window is open. Operators who wait for the humanoid narrative to settle before moving on this risk losing ground to competitors who already have.</p><p>Humanoid robotics is a market to monitor, not a capex line item, for at least the next 18 to 24 months. Assign someone to track battery milestones, safety certification progress, and vendor order books.</p><p>Watch for a humanoid platform sustaining something close to an eight-hour operational cycle in a real production environment, not a staged demo. Watch for second-tier manufacturers&#8212;not just headline startups&#8212;entering serial production with confirmed customer orders. And watch for safety certification frameworks that allow legged robots to operate routinely in shared factory workspaces. Note when the constraints actually resolve. Don&#8217;t budget ahead of that.</p><p>Beijing&#8217;s plan is a credible signal of long-term strategic commitment to both. It is not a procurement signal for both. The plan doesn&#8217;t draw that line.</p><p>That&#8217;s your job.</p>]]></content:encoded></item><item><title><![CDATA[iOS Is No Longer a Global Security Baseline. Enterprise IT in Asia Needs to Act Like It.]]></title><description><![CDATA[Regulatory unbundling in the EU, Japan, and China is turning iOS fleet management into a jurisdiction-by-jurisdiction problem]]></description><link>https://www.asiatechlens.com/p/ios-enterprise-fleet-security-asia-regulatory-fragmentation</link><guid isPermaLink="false">https://www.asiatechlens.com/p/ios-enterprise-fleet-security-asia-regulatory-fragmentation</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 18 Mar 2026 01:01:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gfHO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gfHO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gfHO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gfHO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:717821,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/191210324?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gfHO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gfHO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faee3dcbd-f3ef-407a-9a88-30dca7cc9be0_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Image credit:</strong> Adapted from <em>iPhone</em> by <strong>Ka Kit Pang</strong>, own work, licensed under <strong><a href="https://creativecommons.org/licenses/by-sa/4.0/deed.en">CC BY-SA 4.0</a></strong>.</figcaption></figure></div><p>Apple&#8217;s once-unified iOS ecosystem is splintering into a geography-dependent maze of permissions and protocols, driven by a patchwork of regional mandates&#8212;from the European Union&#8217;s Digital Markets Act (DMA) to Japan&#8217;s Mobile Software Competition Act (MSCA). Even in markets where formal legislation hasn&#8217;t yet passed, the pressure is forcing a retreat; in March 2026, Apple preemptively <a href="https://news.bloomberglaw.com/us-law-week/apple-cuts-china-app-store-fees-to-fend-off-local-regulators-1">slashed its App Store commission</a> in China to 25% following supposed discussions with the State Administration for Market Regulation (SAMR).</p><p>By breaking this model, regulators have handed developers a marginal discount in exchange for a significant administrative burden, leaving them to decide if the thin profit increases are worth the weight of managing their own payment infrastructure and security vetting. In the EU, this means navigating Core Technology Fees; in Japan, it involves third-party billing protocols; and in China, it requires balancing the new 12% &#8220;Mini App&#8221; rate against the technical requirements of the Declared Age Range API.</p><p>Ultimately, the true measure of success won&#8217;t be found in commission fee reductions, but in whether the market remains functional once the friction of fraud and compliance is fully priced into the user experience.</p><h2>The Illusion of Savings</h2><p>This connection between market functionality and institutional behavior is perhaps best viewed through the lens of economic incentives. According to <a href="https://www.linkedin.com/in/lazar-radic-73608146/">Lazar Radic Boskovic</a>, a PhD in law and digital competition expert, Apple remains entitled to charge for access to its ecosystem regardless of the regulatory framework.</p><blockquote><p><em><strong>&#8220;When regulators constrain one monetization channel&#8212;IAP commission, for example&#8212;Apple has strong incentives to reprice elsewhere&#8212;different commissions, per-install charges, developer services fees, and entitlements,&#8221;</strong></em></p></blockquote><p>he explained in an email interview with Asia Tech Lens.</p><p>This suggests that some laws change the form of the rake more than the existence of the rake itself, leading to what Lazar Radic Boskovic calls &#8220;compliance by reclassification.&#8221; He argues this is the natural response of a company under constraint: when a primary price is regulated directly, the business inevitably moves toward add-on fees and more complex pricing structures.</p><p>Consequently, the fee reshuffling in the EU and Japan functions as a technical pivot rather than a financial gain. This unbundling of the App Store experience into individual, billable components establishes a regulatory blueprint that enterprises should expect to see repeated across other vertically integrated platforms.</p><p>However, the redistribution of labor&#8212;including the hidden overhead of self-managed hosting, security, and payment processing&#8212;quickly erodes the savings of lower commissions. In this landscape, margins remain essentially flat while platform authority shifts from an inherent right into a series of negotiated, jurisdictional arrangements.</p><p>That means, in practice, the true expense lies not in the commission delta, but in the operational weight enterprises inherit as universal platform guarantees fragment into regional mandates.</p><h2>The Operational Breakdown: Managing The Unbundled Platform</h2><p>This transition is not merely a legal abstraction; it can be an immediate operational turning point for enterprise IT. When security is &#8220;unbundled&#8221; from the hardware, the burden of proof shifts from Apple to the enterprise.</p><p>For enterprises subject to the DMA and MSCA, compliance demands a rewrite of four core pillars: MDM architecture, BYOD boundaries, audit scope, and procurement strategy.</p><h3>MDM &amp; Configuration</h3><p>Previously, Mobile Device Management (MDM) on iOS was largely about enabling features. But in a post-DMA and post-MSCA environment, MDM is a defensive shield used to disable regional openings.</p><p>Recent iOS updates have introduced <a href="https://support.apple.com/en-ph/guide/deployment/dep6b5ae23e9/web">specific MDM keys</a> that allow administrators to prohibit the installation of <a href="https://support.apple.com/en-us/118110">alternative app marketplaces</a>. By using these keys to manage Manual Configuration Profiles, enterprises can navigate region-specific functional changes, effectively splitting the ecosystem into &#8220;Managed iOS&#8221; and &#8220;Consumer iOS.&#8221; Managing this landscape demands an MDM architecture sophisticated enough to toggle keys based on an employee&#8217;s precise legal location, which in turn drives a granular approach to audit logs and financial compliance.</p><p>This means managing a fleet of devices is no longer about giving every unit the exact same rules. Instead, MDM profiles must now be conditionally applied based on user identity and legal jurisdiction, with every override logged against the specific regulatory framework it enforces.</p><p>Moreover, since software companies now charge for individual features instead of one set fee, the audit log has become a billing verification tool. This now requires IT managers to track specific actions and payments to make sure their bills are correct.</p><h3>BYOD &amp; The &#8220;Managed Open In&#8221;</h3><p>The <a href="https://support.apple.com/en-ph/guide/deployment/depaa73a4973/web">&#8220;Managed Open In&#8221;</a> protocol has long been a standard for Bring Your Own Device (BYOD) security, ensuring work data stays in work apps. However, the introduction of third-party marketplaces breaks the closed ecosystem assumption that underpinned this protocol.</p><p>When employees download tools from third-party marketplaces on personal devices, they bypass Apple&#8217;s rigorous malware scanning and &#8220;Managed Open In&#8221; protections, creating significant gaps in data isolation and patch management. Moreover, these tools from third-party marketplaces may use alternative frameworks or private APIs that haven&#8217;t been audited for how they interact with the system clipboard or file providers. This increases the risk of leakage, where corporate data is accidentally moved into an unvetted environment.</p><p>As a result, enterprises must now grapple with the decision to either <a href="https://support.apple.com/en-ph/guide/deployment/dep6b5ae23e9/web">ban all third-party marketplaces</a> on BYOD devices or accept that corporate data may be put at risk in apps whose provenance hasn&#8217;t been verified by Apple&#8217;s traditional App Review team.</p><p><strong>Recommended Action: </strong>IT admins must now manually deploy specific MDM keys, such as allowMarketplaceAppInstallation, to lock down corporate devices. For a regional office in Singapore, this key might be &#8220;Allow,&#8221; while for an office in Japan, it might be &#8220;Disallow with Exceptions,&#8221; creating a fragmented security posture across the same company.</p><h3>Audit Scope</h3><p>For enterprises maintaining ISO 27001 compliance certifications, iOS was previously treated as an &#8220;inherited control.&#8221; Auditors accepted that because Apple managed the App Store, the platform was secure by default.</p><p>But by allowing <a href="https://developer.apple.com/support/payment-options-on-the-app-store-in-japan/">alternative payment processors</a> and marketplaces, the &#8220;scope&#8221; of a corporate audit expands. For example, if a financial services company in Japan uses an app that utilizes a third-party payment link&#8212;permitted under MSCA&#8212;that payment gateway now enters the firm&#8217;s audit scope.</p><p>This expansion can be problematic because it replaces the single <a href="https://www.apple.com/legal/privacy/en-ww/governance/">&#8220;Chain of Trust&#8221;</a> formerly guaranteed by Apple with a fragmented web of unvetted third-party providers. Auditors must now verify the encryption, access controls, and data handling practices of these external entities, saddling the enterprise with a significant operational and financial burden of auditing every link in their new, jurisdictional supply chain.</p><p>Apart from that, CISOs must now develop internal &#8220;Approved Marketplace Lists,&#8221; effectively building their own mini-App Stores. These administrative tasks require vetting overhead, which is the hidden cost of Apple&#8217;s commission discount.</p><p><strong>Recommended Action: </strong>IT and Compliance teams must now vet every third-party marketplace and payment processor used by employees. This involves deploying a Mobile Threat Defense (MTD), often integrated with Unified Endpoint Management (UEM), that can automate security checks on every app and payment service accessed on managed devices. If a service doesn&#8217;t meet the specific legal and security standards for that user&#8217;s current country, the software can automatically block the connection.</p><h3>Procurement</h3><p>Procurement was once a volume-discount exercise. It is now a compliance architecture decision. </p><p>The traditional concept of &#8220;Global Procurement&#8221; is changing as the regulatory gap between regions widens. A device purchased in a non-regulated market may lack the system-level APIs required to run certain localized enterprise apps that rely on alternative frameworks. In this example, if a Tokyo-based employee needs a specialized Japanese enterprise app that is only distributed via a local third-party marketplace, a &#8220;Global SKU&#8221; iPhone purchased outside of Japan may refuse to install it.</p><p>This then forces enterprises to pivot toward &#8220;Sovereign Fleet Management,&#8221; where procurement is tied strictly to the legal jurisdiction of the employee, not the lowest global hardware price.</p><p>Using a non-regulated device in a regulated market exposes enterprises to compliance failures. If a Tokyo-based enterprise provides an employee with an iPhone sourced from a US procurement contract, for example, that device will lack the jurisdictional logic to trigger the MSCA-mandated selection screens.</p><p><strong>Recommended Action: </strong>IT departments must mandate region-specific SKUS in their purchase orders to ensure the hardware includes the built-in digital permission required to trigger local features, such as the mandatory browser-selection screens in regulated markets. This means shifting from &#8220;buy 1,000 iPhones&#8221; to &#8220;buy 1,000 Japan (J/A) models,&#8221; ensuring the device identity matches the laws of the country where the employee works.</p><h2>The Restrictive Default</h2><p>Apple faces an engineering dilemma: how can it maintain a global codebase without falling into a state of compliance failure. The result is a shift toward regulatory arbitrage, where Apple as the platform holder has incentive to move the default toward the most restrictive security settings in every country unless a local law specifically requires it to do otherwise. This allows Apple to minimize legal risks and maintain control over the platform.</p><p>The strategy, however, creates a state of jurisdictional isolation. Geofencing &#8220;open&#8221; features&#8212;such as alternative browser engines, third-party app stores, and external payment links&#8212;to specifically regulated zones like the EU and Japan leaves the likes of India, Singapore, and South Korea, among others, on the &#8220;closed&#8221; global baseline.</p><p>For enterprises operating across both regulated and non-regulated Asian markets, this legislative delay is not a reprieve but a source of operational complexity. They face an asymmetric fleet&#8212;some devices are more open than others, not because of company policy, but because of where the phone was activated.</p><p>The burden of &#8220;platform integrity&#8221; now shifts from Apple to the enterprise. And IT teams must implement continuous attestation to ensure that a device from a regulated jurisdiction doesn&#8217;t compromise the network of an office operating on the global security baseline.</p><p>This results in &#8220;compliance by reclassification,&#8221; where the enterprise&#8217;s primary expense is no longer the device itself, but the massive operational overhead required to audit and manage a fleet that is no longer uniform.</p><p>Currently, Apple has no commercial incentive to provide the &#8220;unbundled&#8221; features mandated by Japan&#8217;s MSCA&#8212;such as alternative browser engines or third-party payment links&#8212;to other Asian markets. Because these features are built as &#8220;jurisdictional entitlements&#8221; Apple can technically geofence them. Without the threat of legislation, Apple will likely maintain its traditional closed ecosystem to protect its original commission structure and security branding.</p><p>After all, curation, security, and a clear allocation of responsibility are fundamental features that define Apple&#8217;s products and services, as Lazar Radic Boskovic notes.</p><p><em><strong>&#8220;Many consumers choose Apple precisely because they value a single, reliable intermediary and know where accountability lies when something goes wrong,&#8221; </strong></em>he said.</p><div class="pullquote"><p><em><strong>&#8220;Once those functions are split across multiple actors, responsibility fragments, enforcement becomes harder, and users are more likely to bear the costs through added complexity, risk, and friction.&#8221;</strong></em></p></div><p>If other Asian countries follow Japan&#8217;s lead, the region will not likely have a single set of rules. Instead, every country will have slightly different requirements for what Apple must allow.</p><h2>Conclusion</h2><p>The end of a global security baseline for iOS reveals that the most significant cost for the modern enterprise is not Apple&#8217;s commission, but the massive internal overhead of compliance and configuration. The use of third-party marketplaces and alternative payment processors force IT teams to assume direct responsibility for app provenance and data isolation. Enterprises can no longer rely on platform holders like Apple for security; they must instead conduct checks and audits of third-party providers and manage the manual MDM keys required to defend their corporate data.</p><p>In short, the real price of platform &#8220;openness&#8221; is the transfer of risk and responsibility from Apple&#8217;s engineers to the enterprise&#8217;s own balance sheet.</p><p>Enterprises must watch out for Asia&#8217;s rapidly shifting legislative map. Based on current legislative momentum, India could be one of the first to introduce similar &#8220;unbundling&#8221; mandates to Japan and the EU.</p><p>The country&#8217;s <a href="https://prsindia.org/policy/report-summaries/digital-competition-law">Digital Competition Bill</a> is the most notable looming threat to closed ecosystems because it specifically targets &#8220;core digital services&#8221;&#8212;including operating systems and app stores&#8212;and would likely force Apple to allow third-party marketplaces and alternative payment systems. Following a series of &#8220;gatekeeper&#8221; investigations by the CCI, the bill is now <a href="https://dailypioneer.com/news/intensify-scrutiny-of-duopoly-sectors-par-panel-to-cci">reportedly</a> a top priority in the 2026 legislative queue.</p><p>While technically &#8220;Oceania,&#8221; Australia has signaled it will introduce legislation in 2026 that mirrors the EU&#8217;s DMA. The Australian Competition and Consumer Commission (ACCC) has been conducting a multi-year inquiry that is expected to conclude later this year with formal legislative recommendations to the Treasury. The Commission&#8217;s <a href="https://www.accc.gov.au/inquiries-and-consultations/finalised-inquiries/digital-platform-services-inquiry-2020-25">fifth and seventh reports</a> specifically recommend new &#8220;service-specific&#8221; rules to address the power of mobile OS providers and app stores.</p><p>This move would likely turn the &#8220;Australia-New Zealand&#8221; corridor into an &#8220;open&#8221; zone, further fragmenting the fleet for multinational enterprises in the South Pacific. Australia exerts significant regulatory gravity within the Asia-Pacific; the enactment of such legislation serves as a bellwether for shifting digital mandates across the region.</p><p>As iOS becomes more fragmented, enterprises should be prepared to allot a 6 to 12-month lead time for adopting a new fleet management model. This process is a structural overhaul, not a configuration update, which begins with a shift in perspective: IT directors must stop managing devices as uniform hardware and start treating them as &#8220;Regulatory Units.&#8221; They must collaborate with Legal to map every device in the inventory to its specific jurisdictional mandate and Finance to reconcile platform invoices against actual regional usage. Ultimately, success depends on treating every device as a specific legal commitment to the country where it is used, requiring IT, Legal, and Finance to work as a single unit.</p><div><hr></div><h2>Go Deeper on Asia Tech Lens</h2><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall: Security, Fair Play, and the Economics of Attention</a></strong></p><p>ByteDance launched an AI assistant on ZTE's Nubia M153 that could operate across apps by reading the screen and tapping like a human. WeChat, Taobao, and Alipay pushed back within days. The piece examines why platforms draw hard lines when an outside agent starts executing inside their ecosystems&#8212;and what guardrails need to exist before phone-level AI goes mainstream.</p><p><strong><a href="https://www.asiatechlens.com/p/two-ai-phones-two-access-models-one-samsung-ai-agent-bytedance-doubao-galaxy-google-access-privacy">AI Phones Explained: The Two Models Shaping the Next Smartphone Battle</a></strong></p><p>Samsung's Galaxy S26 with Gemini and ByteDance's Doubao phone both promise AI that acts on your behalf&#8212;but they gain device access in fundamentally different ways. One works through approved APIs and permissions; the other drives the screen like a user. The gap between those models determines what scales, what breaks, and what enterprise IT will eventually need to govern.</p><p><strong><a href="https://www.asiatechlens.com/p/ai-sovereignty-dependency-economy-chokepoints">The Dependency Economy of AI: Sovereignty, Chips, and Global Chokepoints</a></strong></p><p>A 25-country analysis of national AI strategies reveals that only the US and China run anything close to a full-stack AI ecosystem. Everyone else is managing dependencies they don't control&#8212;on GPUs, cloud infrastructure, and model APIs. The piece argues enterprises should treat AI like a geopolitically exposed supply chain, mapping dependencies and stress-testing for export controls and vendor disruptions.</p><p><strong><a href="https://www.asiatechlens.com/p/the-prediction-market-boom-is-real-asia">The Prediction Market Boom Is Real. In Asia, So Is the Ban Hammer</a></strong></p><p>Prediction markets are surging globally but hitting legal walls across Asia. Singapore, Taiwan, Thailand, and China have blocked access to platforms like Polymarket, classifying them as illegal gambling. Local platforms are emerging through offshore entities with opaque headquarters. The piece traces a regulatory cat-and-mouse dynamic where demand is real, but the legal landscape offers no clear path to legitimacy.</p>]]></content:encoded></item><item><title><![CDATA[The Wrap | 7 - 13 March 2026]]></title><description><![CDATA[A weekly digest of what mattered in Asia&#8217;s tech stack]]></description><link>https://www.asiatechlens.com/p/the-wrap-7-13-march-2026-midea-china-openclaw-chip-ase-sapiens-china-singapore-tech-asia</link><guid isPermaLink="false">https://www.asiatechlens.com/p/the-wrap-7-13-march-2026-midea-china-openclaw-chip-ase-sapiens-china-singapore-tech-asia</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Fri, 13 Mar 2026 01:00:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4GPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4GPs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4GPs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4GPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3782077,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/190684743?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4GPs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!4GPs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F542cac03-67d7-4088-b3b2-8ae651e47f09_2560x1707.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em><strong>Editor&#8217;s Note: </strong>The frenzy around OpenClaw dominated your news feed this week. But behind the noise, several other stories were quietly unfolding in Asia.</em></p><p><em>A Chinese appliance giant committed another 60 billion yuan to AI and robotics. A Singapore startup raised $20 million to build enterprise AI models in-house. And major chip packaging expansions in Taiwan and the Chinese Mainland showed that capacity is still racing to catch up with AI hardware demand.</em></p><p><em>Taken together, these moves point to a more structural question: who will build Asia&#8217;s AI infrastructure, and who will control it?</em></p></blockquote><div><hr></div><h2>Midea Pledges $8.7 Billion on Robots and AI</h2><p>Midea Group, the Chinese appliance conglomerate that owns German robotics maker Kuka, announced it will invest 60 billion yuan (roughly $8.7 billion) in AI and robotics R&amp;D over the next three years. That roughly matches what the company spent on R&amp;D over the previous five years combined.</p><p>This isn&#8217;t a new direction. Midea has been building toward this since acquiring Kuka in 2017. What&#8217;s new is the scale of the commitment, and the fact that its six-armed humanoid robot, Miro U, is already being used on a production line at its Wuxi factory, where the company says it improved changeover efficiency by 30%.</p><p><strong>Signals To Watch</strong></p><ul><li><p>Midea has said it will roll out its AI factory model globally. If that happens at pace, it sets a new efficiency baseline that competitors and suppliers will be measured against.</p></li><li><p>Other Chinese appliance and manufacturing giants are making similar moves. Watch for a cluster of similar announcements in the coming months.</p></li><li><p>Miro U is already on the factory floor. The gap between announcement and deployment is shrinking, which means that entities treating humanoid robotics as a 2028 problem may need to revisit that timeline.</p></li></ul><div><hr></div><h2>New AI Packaging Capacity on Both Sides of the Strait </h2><p>Two significant chip packaging developments this week, both aimed at the same hardware demand wave, but serving very different strategic purposes.</p><p>In Taiwan, ASE Holdings, the world's largest semiconductor packaging and testing company, broke ground on a new $540 million facility in Kaohsiung dedicated to high-end AI and HPC packaging and testing. Construction starts this year, but completion is targeted for Q2 2028.</p><p>In Chinese Mainland, JCET, China&#8217;s largest chip packaging and testing company, opened its new automotive and robotics chip packaging plant in Shanghai. It is one of China&#8217;s first facilities dedicated specifically to automotive-grade and robotics chip packaging and testing, with AI-assisted defect detection and full production traceability built in.</p><p>Together, the two announcements show that advanced packaging capacity is being built in parallel across geographies because AI demand is outrunning what any one region can supply.</p><p><strong>Signals To Watch</strong></p><ul><li><p>ASE&#8217;s 2028 completion date is the number to hold onto. Procurement plans built around new AI packaging capacity coming online before then need to be pressure-tested.</p></li><li><p>JCET&#8217;s plant is purpose-built for automotive and robotics grades, the same grades that China&#8217;s expanding robot production, including facilities like Midea&#8217;s, will require. A domestic supply chain is being quietly assembled.</p></li><li><p>New capacity on paper does not mean available allocation. Watch how quickly both facilities reach full utilization before adjusting sourcing assumptions.</p></li></ul><div><hr></div><h2>Singapore Bets on Its Own AI Models</h2><p>Sapiens AI, a Singapore-based startup, raised $20 million this week to build large language models and enterprise AI tools in-house, targeting sectors including finance, healthcare, and government services. The funding will go toward model development, engineering hires, and computing infrastructure.</p><p>The company launched Agnes AI in April 2025. Reported user growth has been fast, with more than 5 million total users and 150,000 daily active users in under a year.</p><p>The bigger bet is strategic: if regulated enterprises in Asia grow more cautious about routing sensitive workloads through foreign model providers, local alternatives start to look less like nationalism and more like procurement logic.</p><p><strong>Signals To Watch</strong></p><ul><li><p>Agnes AI already has 5 million users and 150,000 daily active users after less than a year. The adoption numbers are the signal worth watching, not just the funding.</p></li><li><p>Malaysia, Indonesia, and Singapore all have government-backed homegrown model programs already underway. Sapiens is the first private commercial raise of this scale in the region. Watch whether others follow with VC-backed bets.</p></li><li><p>The data residency and API cost argument is gaining ground in regulated industries across Southeast Asia. This raise suggests investors believe the market is real, not just the narrative.</p></li></ul><div><hr></div><h2>Also This Week: The OpenClaw Frenzy</h2><p>We covered OpenClaw in depth earlier this week. But one thing shifted after we published.</p><p>Chinese authorities moved to restrict the tool&#8217;s use on office devices across government agencies and state-linked entities, including major banks, over security concerns. Bloomberg also reported that some employees were warned against installing it on personal phones while connected to company networks, and were asked to report prior installations for checks or removal.</p><p>Chinese AI and tech stocks slid on the news. Recent debutantes MiniMax and Zhipu fell more than 6%.</p><p>Read the full piece here: <strong><a href="https://www.asiatechlens.com/p/chinas-openclaw-wave-signal-or-noise-operators-ai-agents-tencent-bytedance-minimax">China&#8217;s OpenClaw Wave: Signal or Noise?</a></strong></p><div><hr></div><h2>Takeaway</h2><p>The common thread across all three stories this week is timing. Midea has robots on the factory floor, but its $8.7 billion commitment is a three-year pledge, not a delivery. ASE's new AI packaging facility in Kaohsiung will not be ready until 2028. Sapiens has users, but whether regulated enterprises will trust a homegrown model over an established foreign one is still open. </p><p>In other words: announcements are accelerating faster than operational readiness. The key question is not who is moving first, but who will be ready when the bottlenecks actually matter.</p><div><hr></div><h2>Sources</h2><ul><li><p><strong><a href="https://www.scmp.com/tech/article/3346234/chinas-midea-pledges-us87-billion-ai-and-robotics-pivot-automation">SCMP</a>: </strong>China&#8217;s Midea pledges US$8.7 billion for AI and robotics in pivot to automation</p></li><li><p><strong><a href="https://www.taiwannews.com.tw/news/6318566">Taiwan News:</a> </strong>ASE breaks ground on third Nanzih site in Kaohsiung</p></li><li><p><strong><a href="https://news.futunn.com/en/post/69894609/jcet-s-automotive-grade-chip-packaging-and-testing-factory-inaugurated?level=1&amp;data_ticket=1767321087849593">Futu Bull:</a> </strong>JCET&#8217;s automotive-grade chip packaging and testing factory inaugurated in Shanghai</p></li><li><p><strong><a href="https://www.bloomberg.com/news/articles/2026-03-11/china-moves-to-limit-use-of-openclaw-ai-at-banks-government-agencies">Bloomberg:</a> </strong>China Moves to Curb OpenClaw AI Use at Banks, State Agencies </p></li></ul>]]></content:encoded></item><item><title><![CDATA[China’s Compute Surplus Won’t Be Your Compute Surplus]]></title><description><![CDATA[China's AI infrastructure boom matters most to operators already inside Chinese tech stack&#8212;and barely at all to everyone else.]]></description><link>https://www.asiatechlens.com/p/chinas-compute-surplus-five-year-plan-data-center-ai</link><guid isPermaLink="false">https://www.asiatechlens.com/p/chinas-compute-surplus-five-year-plan-data-center-ai</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 12 Mar 2026 01:00:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6dZo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6dZo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6dZo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6dZo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png" width="1536" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1536,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2488828,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/190602522?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45ac2f9-ad09-4d9f-aebd-318cf58330a1_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6dZo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6dZo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16ddaba9-d3d7-4da4-a07f-e5ccc0d86c37_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://techwireasia.com/2022/07/data-center-infrastructure-continues-to-flourish-in-china-with-keppels-sixth-project/">Tech Wire Asia</a> </figcaption></figure></div><p>China may already have much of the AI infrastructure it needs. Data centers across the country are still underused, with many running at <a href="https://www.reuters.com/technology/china-plans-network-sell-surplus-computing-power-crackdown-data-centre-glut-2025-07-24/">roughly 30% capacity</a> according to Reuters, even as Beijing pushes a new AI-heavy plan.</p><p>The real task now is absorption. Whether that surplus becomes useful infrastructure for industrial operators across Asia, or remains largely locked inside China&#8217;s own policy-driven ecosystem, will decide whether the plan reshapes the regional AI stack or simply deepens a domestic one.</p><p>The plan is built around that absorption problem. Beijing&#8217;s latest Five-Year Plan makes clear how policymakers intend to tackle that mismatch.</p><p>The plan calls for a unified national computing network, larger intelligent computing clusters, and tighter coordination of where computing power is built and used. In practice, that means focusing on initiatives like East Data and West Computing, designed to better match data center capacity with energy resources and demand.</p><h2>The Compute Boom Mostly Stays Domestic</h2><p>China&#8217;s surplus compute is unlikely to become a regional utility story. Data governance rules, AI security systems, and local vendor ecosystems mean most of this infrastructure will primarily support China&#8217;s own industrial AI deployment.</p><p>Beijing has made that goal explicit. The government&#8217;s <a href="https://www.reuters.com/world/asia-pacific/china-vows-accelerate-technological-self-reliance-ai-push-2026-03-05/">new &#8220;AI+&#8221; push</a> is meant to embed AI across sectors such as manufacturing, logistics, and healthcare to lift productivity across the economy.</p><p>However, there are a few narrow channels where the effects may spill over.</p><p>Industrial companies already running on Chinese technology stacks may see lower compute costs. This includes manufacturing systems using Chinese automation platforms, logistics infrastructure linked to Chinese ports and supply chains, and industrial software tied to Chinese vendors.</p><p>For most operators outside China, the impact will be more indirect than transformative. The Five-Year Plan is designed first to absorb China&#8217;s own infrastructure buildout, not to export compute capacity to the region.</p><h2>Where The Stack Actually Shifts</h2><p>China&#8217;s compute push will be felt first inside sectors already tied to Chinese technology ecosystems.</p><p>That matters because many multinational and Asian companies have operations in China or rely on Chinese suppliers, vendors, and industrial platforms. For operators already running inside Chinese vendor ecosystems, the first change may simply be cost. If China can put more of its surplus capacity to work, AI workloads should get cheaper inside Chinese vendor stacks. Port logistics shows the pattern. Many terminals already use Chinese automation systems for crane operations and yard management.</p><p>If computing gets cheaper, AI tools for routing, scheduling, and predictive maintenance could become easier to roll out on top of those platforms.</p><p>Data access may also start to shift for companies operating in China&#8217;s industrial systems. China&#8217;s push for a national data market may make it easier to organize and use industrial data inside the country. That matters for factory automation systems that already rely on Chinese industrial software.</p><p>These systems run on large volumes of operational data for quality inspection or error detection. Local governments are already experimenting with this model. Reuters <a href="https://www.reuters.com/world/asia-pacific/chinas-jiangsu-touts-ai-industrial-push-xi-urges-province-lead-2026-03-07/">reported</a> that Jiangsu province alone plans 50 pilot AI applications in logistics and infrastructure, along with 186 smart production lines. That suggests these are some of the first places where Beijing wants AI to move from policy language into day-to-day operations.</p><p>Regulation is the third place where operators may start to feel change. Beijing is tightening AI oversight through new security and monitoring rules. For industrial systems linked to Chinese infrastructure, that could mean stricter compliance and reporting requirements. Energy grid management is one example, as tighter governance could shape how Chinese monitoring and optimization systems are deployed and run.</p><h2>What Companies Should Do Now?</h2><p>The key question is simple: where does the data stay and whose system is it running on? If the data is generated and used within one market, and the vendor stack is already Chinese, the workload is more likely to benefit if compute gets cheaper inside that ecosystem. That is why use cases like predictive maintenance, warehouse automation, and on-site quality inspection look safer for now.</p><p>Riskier bets are projects that assume China&#8217;s surplus computing will quickly become an open regional utility. Business models that rely on running cross-border AI workloads through Chinese infrastructure may run into barriers from data governance rules, security reviews, and platform restrictions.</p><p>The clearest thing to watch is whether China&#8217;s national integrated computing network starts to behave like a real market. One sign would be major cloud players like Alibaba Cloud or Huawei Cloud making compute pricing easier to compare across regions. Another would be clearer tools for moving workloads across provinces or easier access for companies outside China. That would suggest China&#8217;s compute system is becoming more unified, not just a patchwork of local clusters.</p><h2>When The Story Changes</h2><p>The most common mistake is assuming China&#8217;s AI infrastructure will evolve like the US cloud market, where platforms expanded globally and created a shared compute layer across regions.</p><p>China&#8217;s system is more likely to remain tied to domestic regulation and industrial policy. Treating it as a regional compute utility too early could lead companies to build systems that depend on infrastructure they cannot easily access.</p><p>For most operators outside China, the compute surplus is not yet a direct opportunity; it matters mainly for companies already tied to the Chinese supply chain or tech platforms.</p><p>The story changes if China turns its scattered infrastructure into a unified compute market, making cheaper AI capacity relevant across Asia.</p><p>That said, if you&#8217;re not already on Chinese tech stacks, this plan doesn&#8217;t change your priorities yet; if you are, the cost and compliance environment around your existing systems is about to move, and you should be mapping that exposure now.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/chinas-robot-spectacle-is-an-industrial-spring-festival-gala">China&#8217;s Robot Spectacle Is an Industrial Strategy</a></strong> </p><p>How Beijing used the Spring Festival Gala&#8217;s humanoid showcase to manufacture procurement cover and unlock budgets.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/chinas-openclaw-wave-signal-or-noise-operators-ai-agents-tencent-bytedance-minimax">OpenClaw in China: What the AI Agent Frenzy Actually Means for Enterprise Deployment in Asia</a></strong> </p><p>China's current AI adoption wave is substantially a domestic story and why operators outside China risk expensive, premature commitments if they treat it as a universal signal.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/inside-chinas-bold-push-to-build">Inside China&#8217;s Bold Push to Build Humanoid Robots</a></strong> </p><p>A ground-level look at how policy coordination, dense supply chains, and state-backed testbeds are compressing China&#8217;s path from demo to deployable.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War</a></strong> </p><p>How China&#8217;s Big Four used red packets and subsidies to manufacture habit formation around AI, and what happens when the incentives end. </p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-ai-battleground-how-southeast">US vs China AI Showdown: How Southeast Asia Is Quietly Choosing Open-Source Over Closed Model</a></strong></p><p>How countries like Malaysia, Indonesia and Singapore are already running Chinese open-source models in production, and what that tells you about where Chinese tech stacks are actually taking root outside China.</p><p></p></li></ul>]]></content:encoded></item><item><title><![CDATA[China's OpenClaw Wave: Signal or Noise?]]></title><description><![CDATA[What the cloud deployments, district subsidies, and developer frenzy actually tell a regulated operator and what they do not]]></description><link>https://www.asiatechlens.com/p/chinas-openclaw-wave-signal-or-noise-operators-ai-agents-tencent-bytedance-minimax</link><guid isPermaLink="false">https://www.asiatechlens.com/p/chinas-openclaw-wave-signal-or-noise-operators-ai-agents-tencent-bytedance-minimax</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 11 Mar 2026 01:01:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1q8t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1q8t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1q8t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1q8t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2097051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/190566854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1q8t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!1q8t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc42f6ff-347e-426f-9bcd-2b7b03335785_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://www.thestandard.com.hk/innovation/article/326219/Raise-a-lobster-craze-OpenClaws-meteoric-rise-transforms-Chinas-tech-landscape">The Standard</a></figcaption></figure></div><p><a href="https://www.scmp.com/tech/tech-trends/article/3345865/openclaw-fever-why-china-rushing-raise-lobster">On the morning of March 6</a>, Tencent&#8217;s cloud engineers set up free installation booths outside their Shenzhen headquarters for OpenClaw, an open-source AI agent that can autonomously run tasks on a computer. Students stood alongside retired engineers. Someone had flown in from Hangzhou. Meanwhile, across the city, <a href="https://www.ciw.news/p/openclaw-china-frenzy">Taobao sellers were charging up to 500 yuan</a> per remote install, with the busiest stores logging over a thousand orders. ByteDance, Alibaba, and other major cloud providers had already launched their own one-click deployment services. China&#8217;s own cybersecurity regulator had issued a formal warning about the same software just weeks before.</p><h2>What OpenClaw Actually Does</h2><p>OpenClaw started as a hobbyist GitHub project in November 2025 and within weeks had become one of the fastest-growing AI agent projects in the world. It links a large language model to tools such as messaging, browser control, file systems, scheduling, and command execution. In practice, that means it can handle tasks like filing reports, managing files, running shell commands, booking calendar slots, and writing code with limited human intervention.</p><p>What makes it notable is not that it replaces APIs altogether, but that in some workflows it can operate through the interface layer rather than relying on clean, purpose-built integrations. That matters in legacy-heavy environments, where AI projects often stall because every new deployment requires API work, permission redesign, vendor coordination, and system-by-system integration. OpenClaw changes that conversation by offering a way to work across messy stacks without waiting for all of that to be rebuilt first.</p><p>In China, that integration problem is especially acute because many large enterprises still run on fragmented IT estates built up over years of legacy systems, custom fixes, and weak documentation. Traditional agent deployment requires remapping those systems from the ground up. OpenClaw bypasses that but it is considerably slower. <a href="https://www.ciw.news/p/openclaw-china-frenzy">Each step takes 15 to 30 seconds compared to 1 to 3 seconds for a properly integrated agent</a>. For enterprises blocked by integration costs, however, that is a price worth paying.</p><h2>Reading the Subsidies Correctly</h2><p>The frenzy did not go unnoticed by local governments. Shenzhen&#8217;s Longgang district, home to China&#8217;s first AI and robotics bureau, released a draft policy on March 7 proposing financial support of up to 2 million yuan (USD 276,000) <a href="https://www.reuters.com/world/asia-pacific/chinas-shenzhen-backs-openclaw-ai-with-subsidies-despite-beijings-security-2026-03-09/">for approved OpenClaw application projects</a>, with larger commitments of up to 10 million yuan (USD 1.4 million) for more substantial ones, alongside free compute credits and discounted office space. Wuxi&#8217;s high-tech district followed two days later, offering between 1 and 5 million yuan (USD 138,000 to USD 690,000) for industrial applications including quality inspection and equipment maintenance.</p><p>In the same news cycle, China&#8217;s Ministry of Industry and Information Technology issued a formal warning that default or poorly configured OpenClaw deployments create serious exposure risks, and that public access and permissions must be tightly controlled. The Chinese state was simultaneously encouraging and cautioning against the same technology. That is not a contradiction to explain away. It is the most honest signal available about where OpenClaw actually sits: useful enough to promote, risky enough to warn against, and not yet resolved into either. Everything else in this piece follows from that.</p><p>These are district-level draft proposals, not central government policy. Longgang&#8217;s measures are still open for public comment until April 6. The goal is to attract developers and startups into a nascent ecosystem, not to signal that operators have tested and validated the technology. No one has signed off on a return on investment yet.</p><p>The cloud vendors are making a similar calculation. Alibaba Cloud, Baidu Intelligent Cloud, ByteDance&#8217;s Volcano Engine, JD Cloud, and Tencent Cloud all launched one-click OpenClaw deployment within weeks of the project going viral. Installation is free, but cloud compute, bandwidth, and API calls are chargeable, meaning every task OpenClaw runs on a cloud server generates a bill.</p><p>On March 9, several China cloud and software-linked stocks jumped around 20% amid policy support and OpenClaw enthusiasm. That looked more like a bet on infrastructure demand than on proven enterprise deployment revenue.</p><h2>The Constraint Map for Regulated Industries</h2><h3>Access and Audit Gaps</h3><p>OpenClaw includes some security controls and tool restrictions, but it does not natively provide the kind of enterprise-grade RBAC, centralized policy enforcement, and regulator-friendly audit architecture that banks, hospitals, and critical-infrastructure operators typically require. For firms in regulated industries, such as a bank that must demonstrate data access controls to its regulator, a hospital managing patient records, or an energy company operating under national security protocols&#8230;who accessed what data and when is a compliance requirement. And these are not gaps that better configuration will fix - they are baked into how the tool is built.</p><h3>Security is Already a Flagged Problem</h3><p><a href="https://beam.ai/agentic-insights/tencent-launches-qclaw-what-the-ai-agent-mainstream-moment-means-for-enterprise">SecurityScorecard identified over 135,000 OpenClaw</a> instances exposed to the public internet as of February 2026. A separate <a href="https://beam.ai/agentic-insights/tencent-launches-qclaw-what-the-ai-agent-mainstream-moment-means-for-enterprise">independent study</a> found that 42,665 of those exhibited authentication bypass conditions, meaning they could be accessed without any credentials at all. Three critical security vulnerabilities have been formally catalogued in the software, each with publicly available attack code, meaning the tools to exploit them are already in circulation. One of them, even when OpenClaw is configured to run only on a local machine rather than over the internet, allows an attacker to remotely execute their own commands on that machine and intercept the access credentials the agent holds. A further six vulnerabilities cover issues including missing authentication and unauthorized file access. More than 800 confirmed malicious add-ons have been found within OpenClaw&#8217;s own plugin registry.</p><p>China&#8217;s Ministry of Industry and Information Technology had already moved. In February, it issued a formal warning that default or poorly configured deployments create serious exposure risks and that public access and permissions must be tightly controlled. The advisory was not issued in isolation. It landed in the same week as the district subsidy announcements.</p><h3>The Continuity Risk</h3><p>In February, OpenClaw&#8217;s founder announced he was joining OpenAI and that the project would move to an independent open-source foundation, with OpenAI committed to supporting it. There are no reports of a foundation being formally established. OpenAI has publicly backed the arrangement, but the company has its own complicated history with open source commitments, and is currently facing litigation over its transition from a nonprofit to a for-profit entity.</p><p>For operators considering dependency on this tool, that context matters. The governance structure that will oversee security patches, licensing terms, and the development roadmap does not yet exist in a defined form. Until it does, there is no clear entity to hold accountable if something changes.</p><h3>The Data Exposure Problem</h3><p>Data volume is a further concern. Each task OpenClaw completes generates a trail of processed text, measured in units called tokens. A single active session can exceed 200,000 tokens. A power user can consume up to 50 million in a day. That data moves through the underlying model, through the messaging platform OpenClaw connects to, and in many configurations through a third-party cloud server. For firms handling sensitive information, the exposure surface widens with every task the agent runs, with no guaranteed boundary around what leaves the organization.</p><h2>The Rest of Asia Has a Different Calculation</h2><p>For operators in regulated Asian markets outside China, the calculation is different. The subsidy schemes are district-level Chinese policy, not a regional endorsement. The one-click deployment push is also running through Chinese cloud providers, which means the speed, cost, and convenience of adoption are being shaped by a domestic ecosystem rather than by a model that travels easily across borders.</p><p>Part of what has made OpenClaw compelling in China is the cost structure around it. OpenRouter data in late February showed Chinese-developed models accounting for 61% of token consumption among the platform&#8217;s top ten models, pointing to a pricing and usage dynamic built on Chinese infrastructure, intense domestic competition, and Chinese regulatory conditions. Those economics are part of the story, not a backdrop to it.</p><p>None of that carries cleanly into Singapore, Jakarta, Manila, or Mumbai. Operators in those markets would be adopting the same architecture without the subsidy window that lowers early risk, without the cloud ecosystem that makes deployment friction lighter, and without the cost structure that has helped make the trade-off look attractive in China. They would still be taking on the same security, governance, and continuity risks, but with fewer of the offsetting advantages.</p><p>The frenzy is therefore substantially a China-domestic story. Treating China&#8217;s current adoption wave as a universal signal is where operators outside mainland China are most likely to make a premature and expensive commitment.</p><h3>What to Do With This, Right Now</h3><p>The architecture underneath OpenClaw is real and the direction of travel is not in doubt. But the signals surrounding the current frenzy are a different matter. Stock moves indicate compute demand, not deployment proof. Subsidies signal ecosystem building, not validated operator returns. Cloud vendor moves signal infrastructure opportunity, not technological readiness for regulated environments.</p><p>First, understand the architecture properly before the next board conversation arrives.</p><p>OpenClaw&#8217;s screen-level approach to legacy integration is a genuinely new capability, and knowing what it can and cannot do is table stakes for any technology leader in Asia over the next 12 months.</p><p>Second, identify one contained pilot candidate: a workflow that sits behind a legacy interface, involves no sensitive data, and has a clear enough output to measure whether the agent actually performed. Run it. Learn from it. Do not scale it.</p><p>Third, watch the governance transition closely. The establishment of the OpenClaw foundation and the terms under which OpenAI supports it will signal whether this project is heading toward enterprise readiness or toward becoming an OpenAI product feature. Those are very different outcomes for an operator evaluating dependency.</p><p>Fourth, do not let the China frenzy set the timeline. The subsidy window is short and the obsolescence risk is real. The vendors currently subsidizing adoption are building toward native agent layers that may make OpenClaw&#8217;s middleware position redundant. The evaluation window exists independently of their promotional cycle.</p><p>The operators who come out ahead will be the ones who use this window to build understanding rather than dependency. The current moment rewards speed in headlines and punishes it in production.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/at-waic-hong-kong-the-ai-steve-hoffman">At WAIC Hong Kong, the AI Conversation Has Moved Past the Model Race</a></strong><a href="https://www.asiatechlens.com/p/at-waic-hong-kong-the-ai-steve-hoffman"> </a>The two-stack decision frame for operators in third market.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/chinas-robot-spectacle-is-an-industrial-spring-festival-gala">China's Robot Spectacle Is an Industrial Strategy</a></strong><a href="https://www.asiatechlens.com/p/chinas-robot-spectacle-is-an-industrial-spring-festival-gala"> </a></p><p>China's deployment playbook and subsidy cycle logic.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War</a></strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny"> </a></p><p>Cloud vendor pile-on and what happens when incentives end.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">What Tencent&#8217;s Yuanbao PAI Reveals About Its AI Strategy</a></strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival"> </a></p><p>A read on how Tencent uses mass adoption moments to force trial and legitimize new technology behaviors at scale. </p></li><li><p><strong><a href="https://www.asiatechlens.com/p/indias-ai-push-is-real-production-sarvam">India's AI Push Is Real. Production Access Is the Constraint</a></strong><a href="https://www.asiatechlens.com/p/indias-ai-push-is-real-production-sarvam"> </a></p><p>Why India's AI ambitions are running ahead of its deployment infrastructure, and what that means for operators building now.</p><p></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Two AI Phones. Two Access Models. One Critical Difference.]]></title><description><![CDATA[Samsung&#8217;s Galaxy S26 with Gemini relies on permission-based integrations, while ByteDance&#8217;s Doubao phone demonstrated UI-driven automation. The real divide is how AI gains control of the device]]></description><link>https://www.asiatechlens.com/p/two-ai-phones-two-access-models-one-samsung-ai-agent-bytedance-doubao-galaxy-google-access-privacy</link><guid isPermaLink="false">https://www.asiatechlens.com/p/two-ai-phones-two-access-models-one-samsung-ai-agent-bytedance-doubao-galaxy-google-access-privacy</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Fri, 06 Mar 2026 08:55:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8U-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8U-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8U-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8U-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1712971,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/190070942?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8U-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8U-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22edfddb-74a9-4898-ba49-0691526871e4_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Two models are emerging in the race to build &#8220;AI phones.&#8221;</p><p><a href="https://android-developers.googleblog.com/2026/02/the-intelligent-os-making-ai-agents.html?m=1">One works</a> through approved integrations with apps and operating systems, relying on APIs and permissions that developers explicitly grant.</p><p>The other works by reading the screen and acting through the interface like a human user, tapping through apps even without formal integrations.</p><p>Both approaches can complete the same task. But they represent fundamentally different ways for AI to gain authority on a device.</p><p>And that difference is how the AI gets access and that may ultimately determine which model actually scales.</p><h2>One Task, Two Paths</h2><p>Say you tell your phone: &#8220;Get me a ride to the hotel.&#8221;</p><p>Two AI phones can do it.</p><p>In one approach, the assistant connects to ride-hailing apps through official integrations. It uses permissions granted by the user and the app developer. The system stays inside Android&#8217;s normal app boundaries, and the user can intervene or confirm sensitive steps.</p><p>In the other approach, the AI assistant reads what is on the screen and taps through apps like a person would, often using accessibility features. Because it works through the interface itself, it can move across apps even when those apps do not provide official integrations.</p><p>That second model entered the spotlight in December 2025, when <a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">ByteDance introduced its Doubao assistant</a> on ZTE&#8217;s Nubia M153 handset. The device demonstrated an AI agent capable of navigating apps through UI automation.</p><p>When Samsung launched the Galaxy S26 with Gemini in February 2026, comparisons quickly followed. Some Chinese tech media even dubbed it the &#8220;global version&#8221; of the Doubao phone.</p><p>It&#8217;s a catchy headline. But it collapses a crucial difference.</p><p><a href="https://www.linkedin.com/in/boancqu/">Prof Bo An</a>, President&#8217;s Chair Professor and Head of Division of Artificial Intelligence at the College of Computing and Data Science, NTU Singapore, draws a clear line: <em><strong>&#8220;The fundamental difference is where the AI assistant operates.&#8221;</strong></em></p><p>One approach works through official system functions and app integrations, while the other operates at the GUI level, interacting with apps the way a person would.</p><h2>Architecture Determines Control</h2><p>For many researchers, the real question in the AI phone debate is not features, but system design.</p><p>Robert Dahlke, Managing Partner at German firm <a href="https://openrouter.ai/assets/State-of-AI.pdf">TNG Technology Consulting</a>, says the core issue is the <em><strong>&#8220;role the AI agent plays within the system.&#8221;</strong></em></p><p>Dahlke, who also works on building leading open source large language models at TNG, says that in some implementations, he explains, the AI agent effectively acts<em><strong> &#8220;as a substitute for the human user.&#8221;</strong></em></p><p><em><strong>&#8220;The agent gains privileges close to those of a human user and can tap, navigate the interface, and execute cross-application tasks on the phone in the same way a person would.&#8221;</strong></em></p><p>That makes it one of the most powerful ways to enable AI on a device, and also one of the most permissive. The challenge, Dahlke says, is control.</p><p>When people use a phone, actions happen step by step. In a fully agentic setup, the AI can replace the user in executing those actions, reducing the control layers that normally sit between intention and execution.</p><p>Samsung + Gemini and similar systems take a more constrained approach.</p><p>In those designs, the functions an AI agent can perform are defined through <em><strong>&#8220;explicit permission mechanisms,&#8221;</strong></em> such as APIs, MCP or other structured integrations. This establishes clear capability boundaries and ensures the AI operates only within authorized functions.</p><p><a href="https://www.linkedin.com/in/wei-lu-59aa9615/">Professor Wei Lu</a> from the College of Computing &amp; Data Science at the Nanyang Technological University in Singapore<strong> </strong>says the issue is not just what the AI can do, but what happens when the user no longer directs each step. In a conventional smartphone setup, the user interacts with individual apps while the operating system enforces the rules around what each app can access. A permission-based assistant still works within that structure.</p><p>But when an AI system begins interpreting a user&#8217;s broader goal and carrying out the intermediate steps on its behalf, responsibility becomes harder to trace.</p><p>As Wei puts it<em><strong>, &#8220;Whether that concierge faithfully represents the user&#8217;s intent&#8212;and who is accountable when it does not&#8212;is precisely what this architectural difference makes harder to determine.&#8221;</strong></em></p><p>Dahlke notes that similar high-authority agents are already being explored in desktop environments. Tools such as the popular experimental agent systems OpenClaw are sometimes only run on employees&#8217; separate machines, allowing organizations to contain potential risks.</p><p><em><strong>&#8220;AI agents may operate with high levels of authority, but they should do so within controlled environments.&#8221;</strong></em></p><p>Smartphones make that balance harder to maintain. They are deeply personal devices containing banking information, private communications, identity credentials, and payment systems.</p><p>Allowing an autonomous agent to operate freely on such a device, Dahlke warns, could introduce risks such as unintended actions or accidental transactions.</p><p>The real challenge, he says, is <em><strong>&#8220;finding the right balance between expanding AI capabilities and maintaining system control.&#8221;</strong></em></p><h2>Reliability is the Real Benchmark</h2><p>Even before governance questions arise, there is a practical challenge: reliability.</p><p>Complex tasks require what researchers call <em><strong>&#8220;long-horizon planning.&#8221;</strong></em> The agent has to break one goal into many smaller steps, then keep track of what it has already done as it moves across screens and apps.</p><p>Prof Bo An explains that this is where problems begin to accumulate.</p><p><em><strong>&#8220;Probabilistic errors compound with each action.&#8221;</strong></em></p><p>As tasks stretch across multiple screens, systems must implement robust error-recovery mechanisms and maintain strong state management to track progress and user intent.</p><p>The difficulty is that mobile interfaces are not designed for automation. Buttons move, pop-ups appear, and security checks interrupt flows.</p><p>Those variations can easily confuse an AI agent relying on screen interpretation, causing it to tap the wrong button or get stuck halfway through a task.</p><p><a href="https://www.linkedin.com/in/chai-yeow-yeoh-4b93b039/">Chai Yeow Yeoh</a>, Senior Specialist in Cybersecurity at Singapore Polytechnic&#8217;s School of Computing, frames the divide as one between a protocol-driven model and a vision-driven one.</p><p><em><strong>&#8220;The main technological difference between these two methods lies in the interaction layer.&#8221;</strong></em></p><p>One model, he says, uses a protocol-driven approach that lets AI communicate with apps through structured code and APIs in the background. The other, by contrast, relies on a vision-driven method in which the AI interprets the front end by reading pixels and simulating human actions on the screen.</p><p>To simplify, Yeoh says, <em><strong>&#8220;consider an AI agent that works mainly through app and system permissions as having backstage access,&#8221; </strong></em>while the UI-driven agent is<em><strong> &#8220;a highly advanced robot standing in front of the phone.&#8221;</strong></em></p><p>That distinction has practical consequences. APIs behave more like contracts. They usually remain stable even when an app&#8217;s visual design changes. A UI-driven model is more fragile. Move a button, change a color, or insert a new prompt, and the automation can fail.</p><p>Yeoh notes that <em><strong>&#8220;APIs act like contracts that don&#8217;t change every time an app&#8217;s appearance alters.&#8221; </strong></em>By contrast, if a developer moves a Submit button or changes its color, <em><strong>&#8220;the AI&#8217;s visual model might fail to recognize it, leading to failed automations.&#8221;</strong></em></p><p><a href="https://www.linkedin.com/in/pradeep-varakantham-5b25943/">Pradeep Reddy Varakantham</a>, Professor of Computer Science in the School of Computing and Information Systems at Singapore Management University, says the UI-driving approach can be <em><strong>&#8220;brittle and not as reliable.&#8221;</strong></em></p><p>He adds that if apps worry their data is being used without explicit permission, <em><strong>&#8220;they may start behaving adversarially and start adding UI features to fool the OS agent.&#8221;</strong></em></p><p>In other words, interface automation risks becoming a cat-and-mouse game between AI agents and app developers.</p><h2>Accountability Is the Harder Problem</h2><p>Reliability is only part of the challenge. The deeper issue is accountability.</p><p><a href="https://faculty.smu.edu.sg/profile/ding-xuhua-356">Ding Xuhua</a>, Professor of Computer Science and Co-Director, Centre on Security, Mobile Applications and Cryptography, Singapore Management University, calls it a trust boundary problem.</p><p><em><strong>&#8220;When it is at the OS level, you have to fully trust it as it becomes the boss of the phone,&#8221;</strong></em> he says.</p><p>If the AI remains an application, the operating system can still regulate its behavior.</p><p>But when the agent sits deeper in the system, the bar for oversight rises significantly.</p><p><em><strong>&#8220;If the AI system is at the OS level, it becomes much harder to reliably attain accountability and auditability,&#8221; </strong></em>Ding explains.</p><p>That matters because when something goes wrong, the question is not just whether the AI made a mistake. It is whether the system can clearly show what it did, why it did it, and whether the user properly authorized the action in the first place.</p><p>As Prof Wei Lu from NTU notes, <em><strong>&#8220;that interpretation is not itself an auditable record in the same way that a permission grant is.&#8221;</strong></em></p><p>In other words, when a user approves a goal instead of a specific step, more of the execution path is determined by the AI itself. That can make it harder to reconstruct decisions afterward and harder to assign responsibility when outcomes go wrong.</p><p>Such safeguards become especially important in services involving banking, government systems, and identity verification, where unclear access models can quickly become unacceptable.</p><p>Ding does not argue that interface automation should never exist. But he says it must operate under strict guardrails and clear accountability frameworks.</p><p>Chai Yeow Yeoh, Senior Specialist in Cybersecurity at Singapore Polytechnic&#8217;s School of Computing, says systems with this level of autonomy should not run without stronger user oversight.<em><strong> &#8220;An AI agent should operate under a Human-in-the-Loop framework that emphasizes observability and final decision-making.&#8221;</strong></em></p><p>In practice, that means users should be able to see what the agent is doing, stop it immediately, and explicitly approve high-risk actions before they are completed.</p><p>Without those, trust becomes difficult to establish.</p><h2>Privacy and Exposure</h2><p>The access model also shapes what the AI is able to observe.</p><p><em><strong>&#8220;When an AI agent can operate across multiple apps, it raises concerns about privacy and data exposure,&#8221;</strong></em> Yeoh says.</p><p>A UI-driven model may require broad visibility into whatever appears on the screen. A permission-based model is narrower by design, accessing only the fields or functions explicitly made available through approved interfaces.</p><p>As Yeoh puts it, the Samsung/Gemini approach follows<em><strong> &#8220;the principle of Least Privilege by only accessing specific data fields through secure APIs.&#8221;</strong></em></p><p>That distinction matters because privacy risk begins not only when an agent acts, but when it sees more than it needs to.</p><h2>The Ecosystem Decides What Scales</h2><p>Beyond architecture and reliability lies another factor: the ecosystem.</p><p><a href="https://www.highcapacity.org/">Kyle Chan</a>, an American researcher and fellow at the Brookings Institution&#8217;s China Center, a prominent tech voice on X following the AI race between China and the US, argues that platform partnerships may ultimately matter more than raw AI capability.</p><p><em><strong>&#8220;Google approach to AI agents for Android offers a more durable approach than the one by ByteDance. Google is making a longer-term investment in app partnerships. ByteDance is trying to rush ahead without permission and has already run into walls.&#8221;</strong></em></p><p><em><strong>&#8220;Google&#8217;s approach is more comparable to Huawei&#8217;s agent-to-agent framework approach. Because both Google and Huawei build mobile operating systems, they can integrate AI agents far more deeply into their devices.&#8221;</strong></em></p><p>He further compares the competition to an earlier platform race.</p><p><em><strong>&#8220;Building out a network of app partners will likely be even more important than sheer agentic AI performance.</strong></em> <em><strong>This is like the race to become the next Apple app store, but even bigger.&#8221;</strong></em></p><p>That comparison matters because distribution layers shape which services users actually adopt. If everyday tasks increasingly begin with an AI assistant, that layer could influence which apps are called by default and who ultimately owns the user relationship.</p><p>Wei Lu says the assistant layer could become more powerful as users shift from opening apps directly to simply stating goals.</p><p>When that happens, the competitive question is no longer just which app performs a task best, but which systems the assistant chooses to call first.</p><p>One model asks platforms to participate. The other tries to work around them.</p><p>That distinction helps explain why app ecosystems may accept one approach more readily than the other&#8212;and why scaling an AI phone may depend as much on developer cooperation as on the model itself.</p><p>For now, the AI phone race is coalescing around two access models: approved integrations with defined permissions, and interface-level automation with broader system access. Both promise powerful automation.</p><p>But in areas where trust, traceability, and responsibility matter, such as banking, government services, and identity systems, that architectural difference becomes decisive.</p><p>An AI phone becomes truly viable only when existing services are willing to work with it, tasks complete reliably, and actions can be traced when something goes wrong. That is the standard these systems will ultimately have to meet.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall: Security, Fair Play, and the Economics of Attention</a></strong><br>The rollout showed how quickly platforms push back when a phone-level agent starts acting across apps without approved access.</p><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War: The Big Four&#8217;s Fight for Daily Habit</a></strong><br>How China&#8217;s tech giants are competing to become the default AI gateway, and why habit, distribution and control of the user layer matter as much as model power.</p><p><strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">What Tencent&#8217;s &#8220;Yuanbao PAI&#8221; Reveals About Its AI Strategy</a></strong><br>A consumer AI read on how Tencent is using product design, distribution and social mechanics to make AI part of everyday behavior.</p><p><strong><a href="https://www.asiatechlens.com/p/why-smartphone-prices-could-rise">Why Smartphone Prices Could Rise in 2026 as RAM Costs Surge</a></strong><br>Why the AI phone race is also a hardware story, with rising memory costs starting to reshape smartphone pricing and device trade-offs.</p><p><strong><a href="https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china">Agentic AI Can Act. Singapore&#8217;s New Rulebook Says: Prove You Can Stop It</a></strong><br>A governance companion on why autonomy needs limits, visibility and the ability to step in when something goes wrong.<br></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Wrap | 28 Feb - 6 March 2026]]></title><description><![CDATA[A weekly digest of what mattered in Asia&#8217;s tech stack]]></description><link>https://www.asiatechlens.com/p/the-wrap-28-feb-6-march-2026-two-sessions-five-year-plan-china-india-ase-korea-semiconductor-ai-supplychain-governance-robots</link><guid isPermaLink="false">https://www.asiatechlens.com/p/the-wrap-28-feb-6-march-2026-two-sessions-five-year-plan-china-india-ase-korea-semiconductor-ai-supplychain-governance-robots</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Fri, 06 Mar 2026 01:01:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iLMA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iLMA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iLMA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iLMA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1204478,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189966308?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iLMA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iLMA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8df16276-223c-4399-b0af-156dc051537c_6067x4367.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em><strong>Editor&#8217;s Note: </strong>The world is watching China this week as the Two Sessions begin. This is where the year&#8217;s economic and industrial direction gets set, with direct consequences for trade, supply chains, and capital allocation across Asia. Beijing is using the government work report and the 15th Five-Year Plan outline to signal an unambiguous priority: technology as national capacity. The emphasis is not AI as a standalone sector, but AI and robotics as the operating layer for manufacturing and supply chains, supported by the rails that make deployment governable, including data markets, security systems, and standards. This week&#8217;s wrap follows that logic from policy intent to the bottlenecks that will decide who can actually ship: packaging, test, and integration capacity.</em></p></blockquote><div><hr></div><h2>China&#8217;s Five-Year Plan Puts AI And Robotics At The Center</h2><p>China has set out a five-year roadmap to turbocharge scientific breakthroughs and embed AI across its industrial economic machine, positioning technology and scientific research as top national priorities. According to reports, the plan name-checks AI more than 50 times and describes an AI-driven industrial future where robots plug labor shortages and factories operate with little human oversight. It also pushes commercialization, including AI-powered humanoid robots and wider deployment across the full supply chain.</p><p>The plan also signals how broad this tech push is. It name-checks frontier areas including biomedicine, quantum technology, atomic-scale manufacturing, hyperscale computing clusters, nuclear fusion, and brain-computer interfaces. Watch for where this turns into procurement logic, especially in industrial automation, robotics, and domestic AI stack adoption.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether specific industries get near-term procurement targets for &#8220;AI+&#8221; and factory automation.</p></li><li><p>How fast humanoid robots move from pilots into subsidized, scaled deployments in industrial settings.</p></li><li><p>Whether SOEs are directed to buy domestic stacks for industrial AI, robots, and automation systems.</p></li></ul><div><hr></div><h2>China&#8217;s Five-Year Plan Builds A National Data Market And An AI Security System</h2><p>The draft outline of the 15th Five-Year Plan (2026&#8211;2030) also focuses on the rails that make AI adoption workable at scale. It aims to raise the value-added of &#8220;core digital economy industries&#8221; to 12.5% of GDP. It calls for new policies for an integrated national data market, AI adoption across the full supply chain, and an AI security system.</p><p>For operators, this is the governance and control layer. A national data market changes how data is accessed, priced, shared, and enforced. An AI security system changes what gets approved, audited, and monitored in production. </p><p>For firms operating in China-linked industrial ecosystems, data governance and model controls may increasingly become commercial requirements, not just compliance issues. Logging, monitoring, change visibility, and approval traceability could become critical for deployment.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether the national data market produces real standards and enforcement, not just a policy slogan.</p></li><li><p>What the AI security system becomes in practice: standards, certification, audits, or incident reporting.</p></li><li><p>Whether &#8220;security&#8221; starts to mean required model controls, logging, and monitoring for enterprise deployments.</p></li></ul><div><hr></div><h2>Micron Opens India&#8217;s First Semiconductor Assembly And Test Facility </h2><p>Micron has opened its semiconductor assembly and test facility in Sanand, Gujarat. The facility is designed to take DRAM and NAND wafers from Micron&#8217;s global network and turn them into finished memory and storage products. The project represents a combined investment of approximately US$2.75 billion by Micron and its government partners. This is the most concrete step so far in India&#8217;s push to build real semiconductor capacity, starting with assembly, test, and packaging rather than leading-edge fabrication.</p><p>This matters because packaging and test is where supply chains can diversify first. It also signals where ecosystem bets will cluster next: chemicals, substrates, equipment maintenance, logistics, and the technician pipeline. The facility does not change next quarter&#8217;s supply constraints, but it does change 12- to 36-month planning for anyone qualifying alternate routes for memory and components. </p><p>Companies qualifying alternate semiconductor supply routes should begin paying attention not only to fabs, but to where packaging, testing, maintenance, and logistics ecosystems are becoming reliable enough to support mainstream programs.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether large OEMs start qualifying India-linked packaging and test for mainstream programs, not just pilots. </p></li><li><p>Whether the surrounding supplier ecosystem forms fast enough to keep timelines predictable. </p></li><li><p>Whether India becomes a serious node for advanced packaging over time, not just basic assembly and test.</p></li></ul><div><hr></div><h2>ASE Bets Bigger On Advanced Packaging To Meet AI Demand</h2><p>ASE, the world&#8217;s largest chip packaging and testing group, says demand is rising fast for advanced packaging tied to AI chips. It expects advanced packaging sales to double in 2026 to about US$3.2 billion, and says it plans to lift investment from last year&#8217;s US$5.5 billion level.</p><p>TSMC gets most of the attention in the AI supply chain, but this is a reminder that packaging and integration capacity is not only a foundry story. A lot of the work still sits with specialist packaging players, and when those queues tighten, delivery timelines slip and costs show up in places buyers do not always track. </p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether packaging lead times lengthen even if chip supply improves. </p></li><li><p>Whether cost pressure shifts from GPUs to packaging, testing, and integration. </p></li><li><p>Whether more capacity comes online outside a few dominant packaging players. </p></li></ul><div><hr></div><h2>Takeaway</h2><p>This week made one thing clear: the AI push is moving from narrative to industrial buildout. China is signaling direction and building the governance rails around deployment. India is adding real semiconductor capacity in packaging and test. ASE is warning that advanced packaging is already becoming a pressure point.</p><p>The practical lesson is to plan around the full deployment chain, not just access to chips. Packaging, testing, and integration capacity can now shape rollout timelines as much as compute itself. Operators should ask vendors where they sit in the packaging queue, what capacity they have locked in, and what contingencies exist if lead times stretch. The issue is no longer just whether AI systems can be built. It is whether the surrounding infrastructure is ready to support deployment at scale.</p><div><hr></div><h2>Sources</h2><ul><li><p><strong><a href="https://www.reuters.com/world/china/china-parliament-approve-growth-policy-plans-amid-growing-us-rivalry-2026-03-04/">Reuters:</a> </strong>China ramps up &#8216;high stakes&#8217; tech race with US as economic imbalances deepen</p></li><li><p><strong><a href="https://www.eetasia.com/ase-ramps-up-investment-as-ai-packaging-demand-accelerates/">EE Times Asia:</a> </strong>ASE Ramps Up Investment as AI Packaging Demand Accelerates</p></li><li><p><strong><a href="https://www.crnasia.com/india/news/2026/micron-opens-india-s-first-semiconductor-assembly-and-test-facility-in-gujarat">CRN:</a></strong> Micron opens India&#8217;s first semiconductor assembly and test facility in Gujarat</p></li></ul>]]></content:encoded></item><item><title><![CDATA[China’s Robot Spectacle Is an Industrial Strategy]]></title><description><![CDATA[The Spring Festival Gala&#8217;s humanoid showcase was less a technological demonstration than a glimpse into how China turns spectacle into industrial momentum]]></description><link>https://www.asiatechlens.com/p/chinas-robot-spectacle-is-an-industrial-spring-festival-gala</link><guid isPermaLink="false">https://www.asiatechlens.com/p/chinas-robot-spectacle-is-an-industrial-spring-festival-gala</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 05 Mar 2026 01:00:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aQcG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aQcG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aQcG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aQcG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png" width="1536" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1536,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2248657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189875761?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf48c19b-7227-4e21-a330-4388c677e6be_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aQcG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!aQcG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23ec8778-c474-4465-884d-c5eb6a1152bd_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://www.globaltimes.cn/page/202602/1355460.shtml">Global Times</a></figcaption></figure></div><p>When humanoid robots <a href="https://www.reuters.com/business/media-telecom/chinas-humanoid-robots-ready-lunar-new-year-showtime-2026-02-16/">danced</a> across the stage of the Spring Festival Gala this Lunar New Year, the performance appeared at first glance to be technological theater. Broadcast live by state broadcaster China Central Television to an average of <a href="https://news.cgtn.com/news/2026-02-18/China-s-Spring-Festival-Gala-hits-23-06-billion-views-and-counting-1KRGDQvFxaE/p.html">325 million</a> viewers per minute, the machines executed synchronized martial arts choreography alongside human performers. It was a guaranteed viral moment.</p><p>But to read this as a scheme to gain virality would risk missing the bigger picture. Virality, in this case, is a means to an end. The robot performance was not meant to be mere entertainment. It was a showcase of how China uses spectacle as an industrial instrument to accelerate the conditions under which emerging technologies can be deployed, tested and improved. With the humanoids market projected to surpass a value of <a href="https://www.morganstanley.com/insights/articles/humanoid-robot-market-5-trillion-by-2050">US$5 trillion</a> by 2050, it seems strategic for a country to realign priorities around these machines.</p><p>More importantly, for industrial operators, the issue is less whether China&#8217;s robots impress on stage than whether China is accelerating the path to affordable, repeatable deployments faster than its competitors&#8212;and what response that demands: early pilots, strategic partnerships, cautious observation, or avoidance.</p><h1>Spectacle as Industrial Legitimacy</h1><p>The Spring Festival Gala occupies a unique position in China&#8217;s political economy. Beyond entertainment, it functions as a national signaling platform. Technologies granted prominence on the broadcast often acquire informal policy legitimacy, shaping how investors, local governments and state-owned enterprises interpret industrial priorities.</p><p>That legitimacy translates into specific institutional mechanisms. First, national exposure provides procurement cover: officials responsible for purchasing decisions face career risk when adopting immature technologies, but a robot showcased on a state-endorsed broadcast reframes experimentation as policy alignment rather than personal judgment. Second, visibility helps unlock budgets. Pilot projects that might otherwise struggle for approval can be categorized as supporting nationally prioritized industries, allowing funding to move through existing innovation or industrial modernization programs. Third, signaling cascades downward. Following high-profile endorsements, local governments frequently respond by launching demonstration zones, issuing targeted tenders, or incorporating emerging technologies into industrial park development plans.</p><p>For companies and public-sector buyers, legitimacy lowers institutional risk. While the Gala does not cause factories to automate overnight, it makes pilot programs easier to approve within bureaucratic procurement systems. That&#8217;s because in China, legitimacy is a procurement primitive. In other words, technologies are often purchased once they are seen as legitimate or aligned with national priorities.</p><p>Government entities are already among the largest early buyers. In recent years, they have increasingly shown interest in adopting humanoid robots. Reuters <a href="https://www.reuters.com/world/china/chinas-ai-powered-humanoid-robots-aim-transform-manufacturing-2025-05-13/">reported</a> that state procurement of humanoid robots and related tech increased to 214 million yuan (US$31 million) in 2024 from 4.7 million yuan (around US$680,000) in 2023. The Economist recently <a href="https://www.economist.com/business/2026/02/18/chinas-humanoids-are-dazzling-the-world-who-will-buy-them">argued</a> that the Chinese government will likely remain the biggest source of demand for some time to come.</p><p>On top of procurement, Chinese authorities have been handing out generous subsidies for humanoid firms, with more than <a href="https://www.reuters.com/world/china/chinas-ai-powered-humanoid-robots-aim-transform-manufacturing-2025-05-13/">US$20 billion</a> allocated to the humanoid sector in recent years.</p><p>China&#8217;s hands-on approach to humanoid robotics mirrors its earlier push into electric vehicles, where aggressive state support and large-scale deployment helped drive costs down and produce globally competitive products. Already, several Chinese humanoid models are significantly more affordable than Western models&#8212;the former priced between roughly US$5,000 and US$15,000, while the latter often exceeded US$150,000.</p><p>But more importantly, these state-backed environments function less as profit centers than as testbeds. They are practice fields where the machine can learn and improve before serving commercial clients.</p><h1>Building the Data Flywheel</h1><p>Most humanoid robots today are not commercially efficient. That is precisely why China is deploying them early.</p><p>Chinese robotics firms have placed humanoid systems in pilot programs across different facilities, where robots perform limited repetitive tasks while generating operational data. This creates what industry analysts describe as a data flywheel: deployment produces data, data improves algorithms, and improved systems justify further deployment. Rather than subsidizing finished products, China is effectively subsidizing learning itself.</p><p>For operators, this phase resembles large-scale field testing rather than commercialization. The critical metrics are not unit sales or performance demonstrations but operational evidence: how long robots can function without interruption, how frequently they require maintenance, and how easily they integrate into existing workflows. Each deployment reveals hidden costs that rarely appear in demonstrations but ultimately determine economic viability. They can be costs related to software updates, supervision requirements, or even safety protocols and retraining.</p><p>The Gala helps build a case for this learning loop by making experimentation politically safe.</p><p>But that doesn&#8217;t mean all stakes are eliminated. If humanoids fail to transition from demonstrations to reliable productivity tools, the industry could drift into what critics describe as &#8220;demo-ware&#8221;: impressive performances without durable business models.</p><h1>Commercial Reality and the Limits of Spectacle</h1><p>Despite rapid progress, commercial viability remains uncertain. Many humanoid robots operate for <a href="https://theconversation.com/robots-run-out-of-energy-long-before-they-run-out-of-work-to-do-feeding-them-could-change-that-255940">only a few hours</a> under heavy workloads due to battery constraints, with some models&#8217; runtimes limited between one to two hours. These runtimes fall far below the eight- to twelve-hour work shifts typical of human workers. On top of that, dexterous robotic hands remain <a href="https://www.construction-physics.com/p/robot-dexterity-still-seems-hard">expensive</a>, and most systems still <a href="https://www.simplexitypd.com/blog/top-5-technical-challenges-in-humanoid-robotics/">require supervision</a> in unpredictable environments.</p><p>For that reason, the distinction between demonstration and deployment is critical. A robot capable of dancing on stage may still struggle to operate continuously on factory floors. For potential buyers, the relevant question is no longer whether robots can move convincingly, but whether deployments produce measurable returns. Can machines operate through full production shifts? Is maintenance predictable? Are responsibilities clear if failures cause disruption or damage?</p><p>China&#8217;s approach distributes these risks across state-supported pilots. It&#8217;s quite a unique approach compared with other countries. The United States typically emphasizes profitability before scale, while Japan and South Korea have historically focused on socially acceptable robotics applications such as caregiving and assistance.</p><p>While each approach carries its own rationale, China&#8217;s deployment-led strategy seems to secure it an early global lead. Out of the <a href="https://www.techinasia.com/news/chinese-firms-led-global-humanoid-robot-shipments-2025">13,000 humanoid robots</a> delivered worldwide in 2025, most of them came from Chinese companies, according to research firm Omdia.</p><p>Whether China&#8217;s strategy succeeds in the long run depends on whether early pilots evolve into repeatable return-on-investment use cases. If deployments generate reliable productivity gains, the country could industrialize embodied AI much as it did electric vehicles and solar manufacturing. If not, humanoid robotics risks remaining trapped in a cycle of impressive demonstrations without sustainable demand.</p><p>The dancing robots of the Spring Festival Gala were therefore less a declaration of technological arrival than an early move in an industrial experiment. China is betting that putting imperfect machines into the real world sooner will allow it to learn faster than rivals.</p><p>China is optimizing for iteration speed: more deployments, more data, faster cost-down. The open question is whether that converts into repeatable ROI use cases outside state-supported pilots.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><p><strong><a href="https://www.asiatechlens.com/p/inside-chinas-bold-push-to-build">Inside China&#8217;s Bold Push to Build Humanoid Robots</a></strong><br>How policy coordination, component dominance, and real-world testbeds are compressing the path from &#8220;demo&#8221; to deployable machines.</p><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War</a></strong><br>How the Big Four use red packets and subsidies to manufacture habit formation, and what happens when incentives end.</p><p><strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">What Tencent&#8217;s &#8220;Yuanbao PAI&#8221; Reveals About Its AI Strategy</a></strong><br>A Spring Festival playbook read on how China uses mass moments to force trial and legitimize new consumer tech behaviors at scale.</p><p><strong><a href="https://www.asiatechlens.com/p/singapore-robots-global-expansion">Singapore&#8217;s Robots Don&#8217;t Go Viral&#8212;They Go Global</a></strong><br>A contrast case: why Singapore&#8217;s winners optimize for reliability and exportability, not spectacle, and what &#8220;quiet scale&#8221; looks like.</p><p><strong><a href="https://www.asiatechlens.com/p/plush-playful-and-powered-by-ai-how">Plush, Playful, and Powered by AI: How China&#8217;s Toys are Evolving</a></strong><br>A &#8220;fast-deploy, fast-learn&#8221; consumer parallel to humanoids: how open models + cheap hardware + mass-market distribution create an iteration flywheel, and why privacy and failure modes show up only after deployment.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Vietnam’s New AI Law: The Road Ahead For Businesses]]></title><description><![CDATA[Vietnam&#8217;s AI Law phases in enforcement. Use the transition window to build evidence trails, vendor change control, and disclosure gates or procurement and audits will stop deployments]]></description><link>https://www.asiatechlens.com/p/vietnams-new-ai-law-governance-risk-management-business-compliance</link><guid isPermaLink="false">https://www.asiatechlens.com/p/vietnams-new-ai-law-governance-risk-management-business-compliance</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 04 Mar 2026 01:01:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qL2j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qL2j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qL2j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qL2j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1318240,&quot;alt&quot;:&quot;Skyline in Vietnam&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189824515?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Skyline in Vietnam" title="Skyline in Vietnam" srcset="https://substackcdn.com/image/fetch/$s_!qL2j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qL2j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b87ee3b-1368-455b-947b-ff975b6913ef_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://technode.global/category/onlocation/vietnam/discover-vietnam-tech/">TechNode</a></figcaption></figure></div><p>A chatbot flow gets updated. A vendor proposes a &#8220;slightly better&#8221; model. A team automates a step in approvals.</p><p>Nothing dramatic. Just the steady drip of AI becoming normal.</p><p>Then comes the question businesses rarely prepare for: can you prove what this system is doing, who it affects, and what happens when it changes?</p><p>Vietnam&#8217;s AI Law makes those questions unavoidable. It took effect on 1 March 2026, but businesses running existing AI systems have a transition window: 18 months (1 Sept 2027) for healthcare, education, and finance, and 12 months (1 March 2027) for other sectors. But that window is not a pause button. It is the time you have to build documentation, logging, vendor change control, and disclosure workflows before procurement, audits, or regulators can block deployment.</p><p><a href="https://www.rajahtannasia.com/viewpoints/new-law-on-artificial-intelligence-takes-effect-on-1-march-2026/">The law&#8217;s core mechanic is straightforward</a>: classify AI by risk, then apply obligations accordingly. Systems fall into high-risk, medium-risk, or low-risk, and providers must self-classify, keep documentation supporting that classification, and for medium- and high-risk systems, notify the Ministry of Science and Technology through the national AI portal before deployment.</p><p>The International Association of Privacy Professionals (IAPP) describes this as a &#8220;risk-based management&#8221; approach, similar in structure to the EU&#8217;s AI Act, which in practice means organizations need to explain, consistently, how systems were classified and what controls sit around them.</p><p>This will not fail because a model is unsafe. It will fail because the business cannot prove what model ran, on what data, with what oversight, and what changed. In practice, the pressure shows up in three choke points. Procurement blocks deployments when vendors cannot provide audit trails or change notes. Audit blocks when the organization cannot reconstruct decisions, including what version ran and what oversight existed. Disclosure blocks when labeling exists only as policy and the workflow does not enforce it consistently.</p><p>Vietnam is borrowing two enforcement instincts: the EU forces pre-deployment discipline; China forces labeling/platform responsibility. Vietnam borrows from both, so the first friction will appear in procurement, auditability, and disclosure workflows.</p><p>A defining feature of the AI Law is that it regulates by role, not by industry. It distinguishes between the developer, provider, deployer, user, and affected person. That role mapping matters because it determines who is responsible for documentation, oversight, vendor obligations, and disclosure.</p><h2>Build the AI Inventory</h2><p>AI already appears in more places than internal reporting suggests. It is embedded in customer chat and automated replies, fraud alerts and transaction monitoring, queue triage and routing, recommendation systems, and content workflows. Some uses are explicit. Others are bundled into vendor products and automation features that may not be labeled as AI.</p><p>The point of the inventory is to make it clear what AI is in use, where it matters, and who owns it, so businesses can move on to risk triage, minimum controls, vendor requirements, and disclosure decisions.</p><p>For each system in use, capture:</p><ul><li><p>System name and business owner.</p></li><li><p>Where it is used (customer interaction, approvals or eligibility, prioritization/triage, safety monitoring, fraud/AML flags, content generation).</p></li><li><p>What it influences (recommendation only, or automated action).</p></li><li><p>Sourcing (internal build, vendor system, or hybrid).</p></li><li><p>Data exposure (customer, health, financial, operational).</p></li><li><p>Change history (customization, fine-tuning, new data sources, expanded use cases).</p></li></ul><p>That final point is often underestimated. In a role-based regulatory structure, incremental modifications can shift responsibilities and trigger re-assessment expectations. A strong inventory makes such changes visible early, before a vendor update, an incident, or an audit forces the issue.</p><h2>Triage What Will Become High-Risk</h2><p>A workable triage starts with two questions.</p><p><strong>First: does the system influence consequential outcomes?<br></strong>If an AI system can affect safety, legal rights, access to services, or material financial outcomes, treat it as high-risk until assessed otherwise. This commonly includes approvals and eligibility decisions, credit or insurance outcomes, medical or safety-related triage, and automated enforcement actions.</p><p>High-risk status matters because conformity assessment is a condition for being put into use. Assume modifications trigger reclassification duties, especially new data sources, new user groups, or expanded decision authority.</p><p>Also, most companies are deployers even when they think they are &#8220;just using software,&#8221; and deployer obligations do not disappear because the model is &#8220;the vendor&#8217;s problem.&#8221;</p><p>The cliff edge is the Prime Minister&#8217;s high-risk list. It will specify which high-risk categories require mandatory pre-use conformity certification before being put into service, and it may arrive late in the transition window. Do not treat the absence of the list as clearance. Treat any high-risk likely system as if it could land on the certified subset and build the evidence trail now: classification memo, logs and versioning, human oversight and rollback, and vendor change control that survives procurement and audit.</p><p><strong>Second: could it reasonably mislead, influence, or manipulate people who do not realize they are dealing with AI?<br></strong>Many customer-facing systems land here. Medium-risk systems include situations where customer support chat that sounds human and provides account or service guidance without explicit disclosure that it is AI.</p><p>The inventory should already reveal which systems will be hardest to defend later. The goal of triage is to surface those systems early, before a vendor update, expanded use case, or external scrutiny turns a workable deployment into a stop-ship.</p><div><hr></div><h3>Minimum Viable Compliance</h3><ul><li><p><strong>AI inventory exists</strong> (named owner + system purpose + data class + deployment surface)</p></li><li><p><strong>Risk classification memo exists</strong> (why it&#8217;s low/medium/high + what would change that)</p></li><li><p><strong>Evidence capture works</strong> (logs/versioning/inputs/outputs stored and retrievable)</p></li><li><p><strong>Human override path exists</strong> (who/when/how recorded)</p></li><li><p><strong>Rollback path exists</strong> (pause/revert/manual route)</p></li><li><p><strong>Vendor change control exists</strong> (notification + audit trail access + incident support)</p></li><li><p><strong>Disclosure is enforced in workflow</strong> (UI/script/publishing gate + audit evidence)</p></li></ul><div><hr></div><h2>Install Controls That Survive Audits</h2><h4>Logging and Traceability</h4><p>Businesses should be able to reconstruct what happened when a decision is questioned. At minimum, that means recording the key inputs used, the output produced, the version of the model or system, and the business action taken as a result.</p><h4>Human Oversight</h4><p>It should be clear who is authorized to intervene or override, when intervention is required, how overrides are recorded, and what happens when the system behaves outside expected boundaries.</p><h4>Rollback Capability</h4><p>Medium- and high-impact systems should not be treated as one-way deployments. There needs to be a defined method to pause the system, revert to a prior configuration, or route decisions back to manual handling when performance degrades, unexpected behavior is detected, or risk thresholds are breached.</p><p>Incident handling is treated as a shared obligation across the AI value chain. That means setting incident thresholds, escalation procedures, and operational readiness to suspend or withdraw systems when required, including content generation incidents where outputs impersonate a real person or create deepfake-like media.</p><p>These controls only work if the business can access the underlying evidence consistently. For many deployments, that evidence sits with third-party suppliers, which is why contract terms become the next practical control surface.</p><h2>Vendor Discipline</h2><p>Many AI systems used in business workflows are vendor products or vendor models embedded into platforms, which means the information needed for traceability and incident handling may not be available by default.</p><p>Before renewing, expanding, or embedding a vendor system into a regulated workflow, operators need to ask four questions</p><ul><li><p>Can the third party provide model and version change logs?</p></li><li><p>Can the third party provide audit evidence without requiring source code disclosure?</p></li><li><p>What is the third party&#8217;s incident notification SLA, and what investigation support is provided?</p></li><li><p>Who is the third party&#8217;s lawful local contact point or authorized representative in Vietnam, if the system is high-risk?</p></li></ul><p>For high-risk systems supplied by foreign providers, vendor due diligence also needs a Vietnam-specific check. <a href="https://www.tilleke.com/insights/a-closer-look-at-vietnams-new-ai-law-what-it-means-for-ai-businesses/">Tilleke &amp; Gibbins</a> notes that foreign providers of high-risk AI systems must establish a lawful local contact point, and systems subject to mandatory pre-use conformity certification may require a commercial presence or an authorized representative in Vietnam.</p><p>Operational contract clauses to prioritize:</p><ul><li><p><strong>Model change notifications:</strong> Versioning and change notes that let you assess whether classification, controls or disclosures must be revisited.</p></li><li><p><strong>Audit trail access:</strong> Logs, documentation, and functional explanations that support auditability without requiring source code disclosure.</p></li><li><p><strong>Incident disclosure:</strong> What counts as an incident, notification timelines, and obligations to support investigation and remediation.</p></li></ul><h2>Transparency Duties and Disclosure</h2><p>Providers must ensure that users are aware when they are interacting with an AI system, and must ensure that AI-generated audio, images, and videos are marked in a machine-readable format as prescribed by the Government. Deployers must clearly notify the public when AI-generated or AI-edited content could cause confusion about authenticity, and must apply easy-to-recognize labels for content that simulates real persons or recreates events.</p><p>The failure mode is predictable. Labeling is written into a policy, but nothing in the product or publishing workflow enforces it. The result is uneven compliance across teams, vendors, and channels.</p><p>A workable transparency workflow answers three questions:</p><ul><li><p>Who decides what gets labeled and what exceptions exist.</p></li><li><p>Where it is enforced (product UI, customer support scripts, publishing gates, creative pipelines, metadata steps).</p></li><li><p>What happens when it fails (escalation, correction or removal, evidence retention).</p></li></ul><h2>What This Looks Like in Three Common Settings</h2><h4>Banks</h4><ul><li><p>Where does AI influence eligibility, pricing, credit limits, fraud escalation, or collections prioritization, and what is automated versus advisory?</p></li><li><p>For any disputed outcome, can the business reconstruct inputs, model/version, output, and any override decision, including who overrode it and why?</p></li><li><p>Do third parties commit contractually to change logs, audit evidence, and incident notification SLAs, including investigation support?</p></li></ul><h4>Hospitals</h4><ul><li><p>Which clinical workflows use AI for triage, imaging support, prioritization, or safety-related decisions, and which of those should be treated as high-risk likely?</p></li><li><p>If an outcome is questioned, can the hospital reproduce what ran and when, including model/version, key inputs, human oversight, and escalation actions?</p></li><li><p>Is there an operational rollback path to manual care pathways, and an incident escalation process that works 24/7 rather than relying on a single person</p></li></ul><h4>Logistics players</h4><ul><li><p>Where does AI influence routing, warehouse vision, safety monitoring, or prioritization decisions, and what are the operational consequences when it is wrong?</p></li><li><p>Can the business trace an operational decision end to end, including inputs, model/version, output, and the action taken, and can it pause or revert the system quickly?</p></li><li><p>Where do disclosure and labeling obligations show up in customer-facing or worker-facing workflows, and is enforcement built into the process rather than left to policy?</p></li></ul><p>Vietnam&#8217;s AI Law does not require businesses to stop using AI. It requires businesses to be able to stand behind it.</p><p>That means risk classification that holds up under scrutiny, baseline controls that make systems traceable and interruptible, vendor contracts that prevent silent model changes and missing audit trails, and transparency that is enforced where real work happens.</p><p>If you run medium/high-risk AI and can&#8217;t produce evidence on demand, treat the next 90 days as a compliance build sprint&#8212;because the first enforcement you&#8217;ll meet is procurement and audit, not a courtroom.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><p><strong><a href="https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china">Agentic AI Can Act. Singapore&#8217;s New Rulebook Says: Prove You Can Stop It</a></strong><br>Why &#8220;prove oversight and rollback&#8221; is becoming a procurement and audit baseline, even before hard law.</p><p><strong><a href="https://www.asiatechlens.com/p/indonesia-is-racing-to-regulate-ai">Indonesia Is Racing To Regulate AI. The Messy Part Is Implementation</a></strong><br>A practical read on why fast regulation creates ambiguity, and how operators should pace deployments when enforcement detail lags policy intent.</p><p><strong><a href="https://www.asiatechlens.com/p/ai-cybercrime-southeast-asia">AI Is Accelerating Cybercrime and Southeast Asia Feels It First</a></strong><br>A risk-and-controls lens on fraud, abuse, and why incident thresholds and escalation paths need to mature alongside AI adoption.</p><p><strong><a href="https://www.asiatechlens.com/p/the-ai-battleground-how-southeast">The AI Battleground: How Southeast Asia Is Forging a New Path Between Superpowers</a></strong><br>A regional framing on how Southeast Asian governments balance adoption and governance, and what that means for enterprise deployment constraints.</p><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall: Security, Fair Play, and the Economics of Attention</a></strong><br>A deployment-constraints case study on what blocks &#8220;working&#8221; AI in the real world when security, platform rules, and operational evidence are not ready.</p>]]></content:encoded></item><item><title><![CDATA[The Wrap | 21 - 27 Feb 2026]]></title><description><![CDATA[A weekly digest of what mattered in Asia&#8217;s tech stack]]></description><link>https://www.asiatechlens.com/p/the-wrap-21-27-feb-2026-china-qwen-ai-japan-korea-data-center-docomo-malaysia-minimax-moonshot</link><guid isPermaLink="false">https://www.asiatechlens.com/p/the-wrap-21-27-feb-2026-china-qwen-ai-japan-korea-data-center-docomo-malaysia-minimax-moonshot</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Fri, 27 Feb 2026 01:00:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NR8m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NR8m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NR8m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NR8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3782077,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189206762?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NR8m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 424w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 848w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 1272w, https://substackcdn.com/image/fetch/$s_!NR8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ca297-64a3-47a6-8d2c-03bc0bfa2f1a_2560x1707.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><em><strong>Editor&#8217;s Note: </strong>Another AI heavy week. The biggest moves came from incumbents setting the terms on price, capacity, and where workloads can run. Across Asia, the questions are growing sharper: how cheap can AI get, how quickly can compute expand, and what constraints are already showing up in power, networks, and governance.</em></p></blockquote><div><hr></div><h2>Alibaba Bundles China&#8217;s Top Models into A Low-Cost Coding Tool</h2><p>Alibaba is pushing into AI coding tools by selling a subscription that lets users switch between several Chinese models, including Qwen 3.5 plus models from Zhipu, Moonshot, and MiniMax. The pricing is deliberately mass-market: the lite tier is 7.9 yuan (about US$1.15) for the first month, then 40 yuan (about US$5.82) thereafter. The pro tier starts at 39.9 yuan (about US$5.81) and goes up to 200 yuan (about US$29.11).</p><p>By bundling multiple models behind one workflow and one price point, Alibaba is trying to make AI-assisted coding a default habit, not a special purchase. For operators, this is the practical version of &#8216;priced by incumbents: AI becomes a line item you can roll out widely, but it also increases the need for controls, because cheap access makes it easier for usage to sprawl across teams without clear governance.</p><p><strong>Signals To Watch: </strong></p><ul><li><p>Whether other clouds copy the bundle model (multi-model switching, one subscription).</p></li><li><p>Whether enterprises start treating coding assistants like a standard seat licence. </p></li></ul><div><hr></div><h2>China Models Take The Lead As MiniMax And Moonshot Top Token Usage </h2><p>Chinese open-source models from MiniMax and Moonshot topped OpenRouter&#8217;s latest token-usage ranking, after a wave of new releases pushed Chinese models ahead of U.S. labs on the platform. MiniMax&#8217;s M2.5 (launched about two weeks ago) ranked first with 4.55 trillion tokens, while Moonshot&#8217;s Kimi K2.5 (released last month) ranked second with 4.02 trillion tokens. MiniMax, Moonshot, and DeepSeek together made up nearly two thirds of total token usage among the top five models.</p><p>Token usage on a neutral hosting platform tells you where developers are actually spending time and money, which tends to shape tooling, integrations, and what shows up on enterprise shortlists next. It also tightens the set of &#8220;default&#8221; choices, which is helpful for speed but risky for resilience. If a small group of models becomes the default across teams, you inherit concentration risk: pricing power shifts to the winners, and you need a clear plan for governance, support, and switching costs before dependency hardens.</p><p><strong>Signal To Watch:</strong> </p><ul><li><p>Whether enterprise software vendors start supporting these models by default.</p></li><li><p>Whether pricing tightens as usage concentrates and capacity gets scarce.</p></li><li><p>Whether buyers start requiring stronger operational guarantees: audit logs, incident response, uptime commitments, and clear data boundaries.</p></li></ul><div><hr></div><h2>Malaysia Freezes New Non-AI Data Centers</h2><p>Malaysia has stopped approving new data centers that are not related to AI because of rising electricity and water demands. Prime Minister Anwar Ibrahim said Malaysia&#8217;s current energy supply is sufficient for the next one to two years, but the country will need more sources longer term, including the ASEAN Power Grid. The policy has effectively been in place for about 1.5 to 2 years. </p><p>For operators, this is the hard constraint behind AI scale in Southeast Asia. Compute is starting to be treated like a limited resource that gets allocated. That changes rollout planning, contract terms, and where you place workloads. It also shifts leverage: when capacity is scarce or gated, vendors and landlords set the rules.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Clearer definitions of what qualifies as &#8220;AI-related&#8221; for approvals.</p></li><li><p>Power and water requirements showing up as stricter conditions in contracts and permits.</p></li><li><p>More workloads designed to run across multiple countries from day one.</p></li></ul><div><hr></div><h2>SK Hynix Plans A US$15 Billion Expansion Of Chip Production In Yongin</h2><p>SK Hynix said it will invest 21.6 trillion won (about US$15.07 billion) to build new semiconductor production lines in Yongin by 2030. For operators, this is a reminder that AI budgets are being shaped by the supply chain. The biggest costs in AI systems are still hardware and availability, especially for memory-heavy configurations. Announcements like this do not help your next purchase cycle, but they do matter for 12&#8211;36 month planning because they are one of the clearest signals on whether component shortages and pricing pressure might ease, or whether AI infrastructure stays expensive and capacity-constrained.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether lead times improve for AI-grade components and systems.</p></li><li><p>Whether pricing pressure eases or just moves to a different bottleneck.</p></li><li><p>More large capex commitments across the Korea&#8211;Taiwan&#8211;Japan semiconductor supply web.</p></li></ul><div><hr></div><h2>Japan&#8217;s DOCOMO Uses Its Mobile Network Servers To Run AI Apps</h2><p>NTT DOCOMO, Japan&#8217;s largest mobile operator, ran an AI application on the same general-purpose servers it already uses to run its virtualized mobile network (vRAN), inside its commercial network.</p><p>For operators, this is a shift in where AI can live. If telcos turn spare network compute into a managed AI layer, AI execution starts to sit alongside connectivity, not just inside hyperscaler clouds. That can help for latency-sensitive use cases, distributed operations, and situations where you want tighter control over where data is processed. The trade-off is dependency: you are buying into a telco platform, with telco tooling and telco terms. If this becomes a real product, buyers will need clear performance guarantees and a practical exit path.</p><p><strong>Signals To Watch:</strong></p><ul><li><p>Whether telcos productize this with pricing.</p></li><li><p>What workloads it can support in production.</p></li><li><p>Portability: whether the setup can move across telcos/vendors without major rework.</p></li></ul><div><hr></div><h2>Takeaway</h2><p>This week&#8217;s signals point in the same direction: AI is getting packaged into low-cost seats, usage is concentrating around a few models, hardware investment is ramping, and networks are being positioned as a place to run workloads. The operator move is to make governance practical: set budget guardrails, standardize logging and approvals, and design for at least one credible fallback option from the start.</p><div><hr></div><h2>Sources</h2><ul><li><p><strong><a href="https://www.theedgesingapore.com/news/artificial-intelligence/alibaba-pushes-deeper-ai-coding-tools-low-cost-access">The Edge Singapore:</a></strong> Alibaba pushes deeper into AI coding tools with low-cost access</p></li><li><p><strong><a href="https://www.scmp.com/tech/tech-trends/article/3344587/chinas-minimax-moonshot-top-ai-token-use-ranking-ending-year-us-dominance">SCMP:</a> </strong>China&#8217;s MiniMax, Moonshot top AI token use ranking, ending year of US dominance</p></li><li><p><strong><a href="https://www.malaymail.com/news/malaysia/2026/02/24/malaysia-freezes-new-non-ai-data-centres-over-power-and-water-concerns-says-anwar/210287">Malay Mail:</a> </strong>Malaysia freezes new non-AI data centres over power and water concerns, says Anwar</p></li><li><p><strong><a href="https://evertiq.com/design/2026-02-25-sk-hynix-to-invest-15-billion-in-yongin-semiconductor-cluster">Evertiq:</a> </strong>SK hynix to Invest $15 billion in Yongin Semiconductor Cluster</p></li><li><p><strong><a href="https://www.thefastmode.com/technology-solutions/47314-docomo-demos-ai-applications-running-directly-on-cpus-in-commercial-vran-network">The Fast Mode:</a> </strong>DOCOMO Demos AI Applications Running Directly on CPUs in Commercial vRAN Network</p></li></ul>]]></content:encoded></item><item><title><![CDATA[When Battery Economics Shift: What Gets Stress-Tested in China’s EV Strategy?]]></title><description><![CDATA[Hybrids gaining share isn&#8217;t just a consumer pivot&#8212;it raises the question of whether capital was deployed faster than battery costs were falling]]></description><link>https://www.asiatechlens.com/p/when-battery-economics-shift-what-electricvehicles-ev-china-av</link><guid isPermaLink="false">https://www.asiatechlens.com/p/when-battery-economics-shift-what-electricvehicles-ev-china-av</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 26 Feb 2026 01:00:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YcXb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YcXb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YcXb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YcXb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3118236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189120394?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YcXb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!YcXb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15cd2e2b-1226-4452-87d6-8a30aa67332f_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://www.google.com/imgres?imgurl=https://chinaglobalsouth.com/wp-content/uploads/2024/10/BYD-Cars_Suzhou.jpg&amp;tbnid=mxfEyLI5bSWBwM&amp;vet=1&amp;imgrefurl=https://chinaglobalsouth.com/2025/03/02/chinas-electric-vehicles-dominate-indonesias-ev-market-in-january-2025/&amp;docid=VHlh5hPx_Z7a8M&amp;w=960&amp;h=540&amp;itg=1&amp;hl=en-vn&amp;source=sh/x/im/m1/3&amp;kgs=a87c5fc31254c0be&amp;shem=shrtsdl">The China-Global South Project</a></figcaption></figure></div><p>China&#8217;s EV mix is <a href="https://www.scmp.com/tech/article/3343905/chinas-ev-momentum-slows-pricier-batteries-steer-drivers-hybrids">shifting</a>: EV growth is slowing, battery prices remain higher than many expected, and hybrids are gaining market share.</p><p>At first glance, this appears to be a straightforward sales story. Within the broader EV category, the demand mix&#8212;meaning the breakdown of what consumers are choosing to buy&#8212;is tilting away from fully battery electric vehicles (BEVs) and toward hybrids, which combine a battery with a traditional combustion engine.</p><p>Hybrid models differ based on how much they rely on electricity: a HEV (Hybrid Electric Vehicle) runs mainly on gasoline and typically cannot be plugged in; a PHEV (Plug-in Hybrid Electric Vehicle) has a larger battery that can be charged from an external power source, allowing for sustained all-electric driving before the gasoline engine kicks in; an EREV (Extended-Range Electric Vehicle) operates primarily as an electric car, with a gasoline engine serving mainly as a backup generator.</p><p>Analysts <a href="https://onestopesg.com/esg-news/rising-battery-costs-may-shift-china-s-ev-momentum-toward-hybrids-1771768429645">estimate</a> that BEVs could be up to 20 percent more expensive than comparable PHEVs. Lithium price pressures could add up to 3,800 yuan to the production cost of a midsize BEV, compared with roughly 2,000 yuan for a PHEV, according to recent industry research. In January this year, BEVs accounted for 58 percent of total EV sales, compared with 62 percent for 2025 as a whole. Hybrids&#8217; market share rose accordingly.</p><p>But to focus on these sales trends is to miss the bigger picture.</p><p>For the past decade or so, China&#8217;s EV push has been built on several assumptions: battery costs would steadily fall, fully electric cars would soon cost roughly the same as gasoline vehicles, and scale would deliver sustainable profits. Companies invested billions into electric-only platforms, battery plants, and supply chains on that premise.</p><p>Now those investments are put under scrutiny. Against the backdrop of less than predictable battery prices, decision-makers are forced to rethink their capital allocation&#8212;where money has been committed, how those investments were justified, and what happens when the assumptions behind them begin to shift.</p><p>Automakers, battery manufacturers, and policymakers would, soon enough, have to grapple with the following question: if hybrids remain more popular and more economically practical than fully electric cars for the next three to five years, what part of their EV strategy should they reconsider?</p><h2>Reconsider: Battery Costs and the Cost Parity Assumption</h2><p>At the center of China&#8217;s EV expansion was the idea of cost parity. In simple terms, cost parity means a fully electric vehicle can be produced and sold at roughly the same cost as a comparable gasoline car, without heavy reliance on government subsidies. Once that point is reached, electric cars can compete naturally on price while preserving healthy profit margins.</p><p>The challenge is that batteries make up a large portion of an EV&#8217;s total cost. If parity slips, OEMs face a bad choice: protect margin and lose BEV share, or protect share and bleed cash through pricing. That is why hybrids matter. They are not just a consumer preference; they are a way to sell electrification with less exposure to cell cost.</p><p>Long-term procurement contracts further complicate the picture. Automakers typically sign multi-year agreements with battery suppliers to lock in volume and pricing. These contracts are meant to provide stability. But if BEV demand grows more slowly than forecast, or if battery input costs fluctuate in unexpected ways, such agreements can pressure margins instead of protecting them.</p><p>In this context, hybrids gaining share sends an important signal. Hybrids use smaller batteries and therefore rely less heavily on falling battery prices to make economic sense. If consumers&#8212;and manufacturers&#8212;find hybrids more practical in the near term, it suggests the economics of full electrification are maturing more slowly than anticipated.</p><div><hr></div><h2>Who Wins and Who&#8217;s Exposed if Hybrids Outperform BEVs</h2><p><strong>Winners:</strong></p><ul><li><p><strong>Flexible-platform OEMs</strong> that can swing mix between BEV, PHEV, and EREV without stranding plants or tooling.</p></li><li><p><strong>OEMs with pricing power and cash buffers</strong> that can slow BEV expansion, keep utilization healthy, and avoid margin-destructive price cuts.</p></li><li><p><strong>Battery makers with demand diversity</strong>, meaning hybrid packs, energy storage, and export volumes that keep factories loaded even if domestic BEV growth softens.<br><strong>Players with contract optionality</strong>, including volume-flex terms and indexation bands that reduce take-or-pay exposure when forecasts slip.</p></li></ul><p><strong>Exposed:</strong></p><ul><li><p><strong>BEV-only platform bets</strong> that require sustained BEV volume to justify fixed costs and can&#8217;t easily pivot the line.</p></li><li><p><strong>Margin-fragile OEMs</strong> that need BEV growth to cover high fixed costs and are forced into price cuts to protect share.</p></li><li><p><strong>Cell makers concentrated on large-pack BEV demand</strong>, especially where expansion phases assume high utilization to hit unit economics.</p></li><li><p><strong>Regions that planned infrastructure and incentives around BEV-only acceleration</strong>, where a slower BEV curve creates stranded public and private capex.</p></li></ul><p>The dividing line is optionality. Flexible platforms and flexible contracts turn a mix shift into a planning problem. BEV-only capacity turns it into a balance-sheet problem.</p><div><hr></div><h2>Reconsider: Platform Strategy and Utilization Rates</h2><p>The next layer of impact appears in platform strategy. A vehicle platform is the underlying structural design that determines how cars are engineered and manufactured.</p><p>Some automakers have invested in dedicated BEV platforms built exclusively for electric vehicles. These designs are optimized for large battery packs and electric drivetrains. They can be highly efficient&#8212;but only if produced at sufficient scale. They require substantial upfront capital and depend on strong, sustained demand to justify the investment.</p><p>Others rely on flexible architectures that can produce hybrids, plug-in hybrids, and fully electric vehicles on the same production line. While not as optimized for pure EV performance, these platforms offer adaptability. If demand leans toward hybrids for several years, companies with flexible systems can adjust production more easily.</p><p>This distinction matters because profits rise and fall with changes in sales volume. EV manufacturing involves high fixed costs: factories, tooling, and battery facilities. When volumes are strong, profits can increase rapidly. But when sales fall short of expectations, those same fixed costs weigh heavily on earnings.</p><p>The dynamic extends to gigafactory capacity planning. A gigafactory is a massive battery production facility designed to supply millions of EVs annually. These plants require enormous upfront investment and only generate strong returns when running close to full capacity. If hybrids require smaller batteries and BEV demand underperforms, utilization rates may decline. Lower utilization means higher costs per unit and thinner margins.</p><p>Platform choices and gigafactory buildouts are long-cycle decisions. Once capital is committed, it is difficult to reverse. When battery economics shift, these bets come under pressure.</p><h2>Reconsider: Industrial Pacing</h2><p>Zooming out, the issue becomes one of industrial pacing&#8212;the speed at which the entire EV ecosystem expands. This includes mining, battery production, vehicle assembly, and charging infrastructure. China accelerated this ecosystem aggressively, seeking technological leadership and scale advantages.</p><p>If BEV demand grows more slowly than expected, the question becomes one of timing. Expanding too quickly can create excess capacity and compress margins. Expanding too slowly risks ceding competitive advantage. Policymakers may need to recalibrate subsidy schedules or electrification targets to better align ambition with economic reality.</p><p>In short, hybrids gaining share is not, in itself, the central story.</p><p>The deeper story is what happens when the economic foundations of China&#8217;s EV expansion&#8212;falling battery costs, rapid cost parity, and sustained BEV scale&#8212;are tested by reality. When battery economics shift, it is not consumer sentiment alone that matters. It is capital allocation, platform design, factory utilization, and industrial pacing that determine who absorbs the shock&#8212;and who adapts.</p><div><hr></div><h2>Decision Guide Sheet</h2><p>If hybrids remain more popular and more economically practical than fully electric vehicles (BEVs) for the next three to five years, what concrete decisions should automakers, battery manufacturers, and policymakers reconsider&#8212;and under what conditions?</p><h3>For Automakers</h3><ul><li><p><strong>If BEV sales growth underperforms expectations for 2&#8211;3 consecutive quarters:</strong> Reassess planned expansion of electric-only factories. Delay or phase gigafactory-linked capacity additions. Rebalance production targets toward hybrid or extended-range models.</p></li><li><p><strong>If BEV factory utilization drops below ~70&#8211;75%:</strong> Shift production mix toward hybrid models where feasible. Accelerate transition to flexible platforms capable of producing multiple powertrains. Freeze new capex tied exclusively to BEV scale until demand visibility improves.</p></li><li><p><strong>If hybrid gross margins exceed BEV margins for multiple quarters: </strong>Reevaluate product mix strategy. Prioritize profitability over pure BEV volume growth. Adjust investor guidance away from &#8220;scale at all costs&#8221; narratives.</p></li><li><p><strong>If battery input prices remain volatile or elevated beyond forecast bands:</strong> Renegotiate long-term procurement contracts for flexibility. Reduce exposure to rigid volume commitments. Diversify battery chemistry sourcing where feasible.</p></li></ul><h3>For Battery Manufacturers</h3><ul><li><p><strong>If BEV order growth slows while hybrid penetration rises: </strong>Reassess long-term capacity expansion timelines. Delay additional gigafactory phases not yet under construction. Increase development of smaller-pack solutions for hybrid platforms.</p></li><li><p><strong>If utilization falls below ~80% across major plants:</strong> Consolidate production lines. Pursue export markets more aggressively. Shift production toward energy storage or non-auto segments.</p></li><li><p><strong>If pricing pressure intensifies and margins compress: </strong>Tighten capex discipline. Prioritize higher-efficiency chemistries or cost-optimized LFP lines. Reevaluate expansion assumptions embedded in prior investment cycles.</p></li></ul><h3>For Policymakers</h3><ul><li><p><strong>If BEV adoption plateaus while hybrids structurally gain share: </strong>Reassess electrification timelines. Consider recalibrating policy targets to reflect economic pacing. Avoid forcing demand beyond cost readiness.</p></li><li><p><strong>If industry-wide capacity utilization weakens:</strong> Moderate further supply-side incentives. Shift policy support toward R&amp;D and efficiency improvements rather than pure volume expansion.</p></li><li><p><strong>If OEM margins deteriorate despite rising EV penetration: </strong>Evaluate whether subsidy withdrawal or regulatory acceleration is misaligned with industry economics. Reexamine incentive structures for hybrid vs BEV vehicles.</p></li></ul><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/not-just-evs-china-leads-the-world">Not Just EVs: China Leads the World in Battery Production and Technology for all Vehicles</a></strong><br>A battery-first look at how chemistry, materials, and scale shape cost curves, margins, and the pace of electrification.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/vinfast-pivots-to-southeast-asia">VinFast Pivots to Southeast Asia - But Can it Outrun BYD in Indonesia?</a></strong><br>A demand-and-economics read on how Chinese incumbents pressure challengers through pricing, localization, and infrastructure constraints.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/singapores-driverless-proving-ground">Singapore&#8217;s Driverless Proving Ground: How Chinese AVs Are Turning Pilots Into Proof</a></strong><br>A production lens on mobility deployment: regulation, operating constraints, and what it takes to move beyond pilots.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-chip-wars-new-reality-a-view">The Chip War&#8217;s New Reality: A View from the Crossroads</a></strong><br>A broader industrial framing on how China&#8217;s manufacturing scale and supply chains compound advantages across strategic sectors, including batteries and EVs.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/chinas-bet-on-domestic-tech-the-companies">China&#8217;s Bet on Domestic Tech</a></strong><br>A capital-allocation lens on China&#8217;s &#8220;scale-first&#8221; approach to strategic stacks (chips + compute), including the efficiency tradeoffs China is willing to accept to sustain momentum under constraints.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Agentic AI Can Act. Singapore’s New Rulebook Says: Prove You Can Stop It.]]></title><description><![CDATA[Singapore&#8217;s new Model AI Governance Framework for Agentic AI is voluntary, but it is already a procurement and audit baseline: bound autonomy, prove oversight, and design rollback before you scale]]></description><link>https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china</link><guid isPermaLink="false">https://www.asiatechlens.com/p/agentic-ai-can-act-singapore-new-guidelines-agents-china</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 25 Feb 2026 01:00:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kCoZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kCoZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kCoZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kCoZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2157965,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/189008262?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kCoZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kCoZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ccec10-f331-4404-b316-bcdd1b037127_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Agentic AI, advanced autonomous systems that can act without human supervision, is becoming more common and sophisticated.</p><p>An agent that can draft an email is one thing. An agent that can send it, trigger a payout, or change settings in a live system is a very different kind of risk. The operator question is no longer whether AI can help with everyday tasks, but can we safely let it execute actions in regulated systems this year, or keep it in recommend-only mode until controls are provable?</p><p>This sounds practical and convenient, but it also comes with serious risks. Failures can threaten safety and financial stability, making governance and control mechanisms central to deployment decisions.</p><p>IMDA launched Singapore&#8217;s Agentic AI Guidelines in January to promote responsible deployment. The voluntary framework is intended to move faster than legislation and shape what companies can defend in audits, risk reviews, and procurement discussions.</p><p>Prof Wei Lu from NTU&#8217;s College of Computing &amp; Data Science bluntly describes the shift. <em><strong>&#8220;At a fundamental level, the shift from generative AI to agentic AI marks a move from AI as an &#8216;advisory co-pilot&#8217; to an &#8216;operational actor&#8217;,&#8221;</strong></em> he tells Asia Tech Lens.</p><p>The biggest risk in early AI rollouts is giving an agent too much power over old, clunky systems, where small mismatches can cascade once automation is introduced. As Lu pointed out, the fix is to set strict boundaries and only give the AI the bare minimum access it needs to do its job.</p><p>Before an agent gets permission to act, operators need to answer three things: do you know exactly what the agent is allowed to do, can you audit every action, and can you roll it back quickly when needed? If you cannot answer yes to all three, you are not making a technical choice; you&#8217;re taking a governance risk.</p><p>Charmian Aw, partner (Data, Privacy, and Cybersecurity) at Hogan Lovells, believes that operators need to be extra careful when using agentic AI in sectors such as finance and healthcare.</p><p><em><strong>&#8220;These are repeatedly identified in the Guidelines as high&#8209;impact areas where erroneous or unauthorized autonomous actions can lead to significant harm for individuals,&#8221;</strong></em> she tells Asia Tech Lens.</p><p>For anyone running these systems, the message is clear: pick exactly which tasks the AI can touch, and make sure humans are always in the loop to spot and stop mistakes before they spread.</p><h2>Why Voluntary Rules Still Matter</h2><p>While Singapore&#8217;s guidelines are not law yet, they give companies a head start on future regulations.</p><p>Aw points out that in a market without strict AI laws, these guidelines serve as a much-needed benchmark. Companies can use them to assess their own risks and conduct audits, demonstrating they&#8217;re keeping up with emerging regulatory expectations.</p><p><em><strong>&#8220;In practice, commercial entities frequently adopt non&#8209;binding frameworks as procurement and vendor&#8209;management baselines, which may create commercial pressure for service providers to align with the guidelines even without legal compulsion,&#8221;</strong></em> Aw said.</p><p>For operators running the system, use the guidelines as a checklist. Ask yourself if your AI&#8217;s actions are restricted, easy to track, and most importantly, reversible.</p><p><em><strong>&#8220;We see the guidelines as likely to influence deployment and rollout, with organizations in highly-regulated sectors adopting tighter controls such as autonomy limits and layered approvals, consistent with the guidelines&#8217; emphasis on restricting bounded autonomy and meaningful human oversight,&#8221;</strong></em> Ciara O&#8217;Leary, associate (data, privacy, and cybersecurity) at Hogan Lovells, explains.</p><p>Even though it is not binding, the framework raises the bar. Teams will need to show they can monitor what an agent does, explain why it did it, and roll back mistakes before giving it more freedom.</p><h2>What Breaks First</h2><p>Early failures in agentic AI deployments often occur at the interfaces among agents, tools, and human workflows, especially in legacy environments that rely on implicit judgment rather than explicit, machine-readable rules. In such settings, small mismatches can quickly escalate once automation is introduced, according to Prof Lu.</p><p>Most incidents will not look like sci-fi autonomy. They will look like silent misrouting: the agent writes to the wrong field, triggers the right workflow with the wrong parameters, or sends the right message to the wrong customer.</p><p>This makes observability an important bottleneck.</p><p><em><strong>&#8220;Agentic systems operate at machine speed across multiple tools and environments, generating large volumes of unstructured reasoning traces and execution logs that are difficult to monitor or interpret in real time using existing enterprise tooling,&#8221;</strong></em> Lu said, adding that this makes it challenging to detect abnormal behavior early or to reconstruct what went wrong after an incident.</p><p>Accountability is messy when too many people are involved. To stay safe, design rollback paths wherever you can. The operational rule is simple: don&#8217;t give the systems more power than your safety nets can catch. If you can&#8217;t detect and fix a mistake quickly, keep it recommend-only.</p><h2>Controls Before Scale</h2><p>Early deployments of agentic AI will likely incorporate human-based accountability mechanisms, which the guidelines explicitly emphasize and that are reflected across global regulatory approaches, according to Aw.</p><p><em><strong>&#8220;Given the relative immaturity of agentic systems, sophisticated organizations will likely prioritize controls that strengthen accountability, observability, and reversibility,&#8221;</strong></em> she says.</p><p>In practical teams, prioritize human approvals. Don&#8217;t let the AI make big calls like making a payment or changing safety settings without a human signing off first. Keep a clear paper trail of everything it does, test the system regularly, and make sure you&#8217;re still the one in control.</p><p>Echoing this view, Prof Lu said that governance must evolve from content moderation toward more demanding priorities, such as enforcing behavioral guardrails with clearly defined action-space boundaries, and extending the principle of least privilege from human users to agent identities.</p><p><em><strong>&#8220;Critically, these boundaries must be defined at the design stage, not retrofitted after deployment,&#8221;</strong></em> he said.</p><p>For operators, think of agentic AI as a step-by-step process. Start with low-risk, easy-to-undo tasks. Only give the AI more freedom once you&#8217;ve seen it work and make sure you know how to catch any mistakes before they spread.</p><h2>Regional Implications</h2><p>Singapore is ahead of its neighboring Southeast Asian countries in guiding agentic AI, but that doesn&#8217;t mean the guidelines will become a single regional standard.</p><p><em><strong>&#8220;Southeast Asia reflects a highly heterogeneous and decentralized regulatory landscape. Jurisdictions are taking divergent, and in many cases, deliberately sovereign approaches to AI governance, shaped by differing political priorities, institutional capacities, and levels of digital&#8209;economy maturity,&#8221;</strong></em> said Aw.</p><p>That said, while the guidelines may inform regional thinking, they seem unlikely to replace domestic regulatory preferences.</p><p>For Chinese tech companies operating in Singapore or Southeast Asia, Aw believes that the implications are limited. She points out that China already operates under a set of binding and prescriptive AI regulations, including the Algorithm Recommendation Rules, the Deep Synthesis Rules, and the Generative AI Measures.</p><p><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">ByteDance&#8217;s Doubao &#8220;AI phone&#8221;</a> episode is a reminder that agents are arriving before the scaffolding is ready. If the guardrails do not align with platform rules, autonomy becomes untraceable and reversibility becomes theoretical. For operators, strategy comes first, define controls and boundaries before deployment.</p><p>Singapore has set a reference point, not a universal template. For operators deploying agentic AI across Asia, treat Singapore&#8217;s framework as the reference procurement baseline, then tune autonomy and evidence requirements to each regulator&#8217;s enforcement posture. Do not assume portability across markets unless your control plane is portable.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/budget-2026-puts-ai-into-execution-singapore-sea">Budget 2026 Puts AI Into Execution Mode. Operators Need To Fund Foundations Before Features</a></strong><br>Singapore&#8217;s AI push is shifting from experimentation to production. </p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War: The Big Four&#8217;s Fight for Daily Habit</a></strong><br>A distribution-first AI race: red packets, subsidies, and bundling tactics designed to force trial at scale. </p></li><li><p><strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">What Tencent&#8217;s &#8216;Yuanbao PAI&#8217; Reveals About Its AI Strategy</a></strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival"><br></a>Tencent&#8217;s bet is &#8220;Social + AI&#8221; - one that rides the existing WeChat social mechanics rather than trying to build a new habit from scratch. </p></li></ul><ul><li><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall: Security, Fair Play, and the Economics of Attention</a></strong><br>A cautionary tale of cross-app agency. When an assistant behaves like an operator across apps, platforms start treating it as automation abuse, triggering security and policy constraints that can kill distribution even if the product works.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/asias-agentic-moment-the-manus-interview">Asia&#8217;s Agentic Moment: The Manus Interview</a></strong><br>The interview frames the real operator risks (permission creep, brittle tool integrations, and silent workflow errors) and the controls that separate a pilot from production: scoped identities, least privilege, full action trails, and fast rollback.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/at-waic-hong-kong-the-ai-steve-hoffman">At WAIC Hong Kong, the AI Conversation Has Moved Past the Model Race</a></strong><br>A conversation with Steven Hoffman on where the market is actually heading: away from &#8220;who has the best model&#8221; and towards who can monetize, distribute, and operate AI at scale. </p></li><li><p><strong><a href="https://www.asiatechlens.com/p/ai-cybercrime-southeast-asia">AI Is Accelerating Cybercrime, and Southeast Asia Is Where The Damage Shows Up</a></strong><br>Maps AI capability to attacker advantage: faster fraud, better impersonation, and identity compromise at scale. Reinforces why agentic deployment must be paired with monitoring, controls, and incident response, not just model upgrades.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Wrap | 14 - 20 Feb 2026]]></title><description><![CDATA[A weekly digest of what mattered in Asia&#8217;s tech stack]]></description><link>https://www.asiatechlens.com/p/the-wrap-14-20-feb-2026-ai-summit-india-newdelhi-china-cny-springfestival-bytedance-tencent-openai-baidu-anthropic</link><guid isPermaLink="false">https://www.asiatechlens.com/p/the-wrap-14-20-feb-2026-ai-summit-india-newdelhi-china-cny-springfestival-bytedance-tencent-openai-baidu-anthropic</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Fri, 20 Feb 2026 01:00:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VimA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VimA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VimA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VimA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VimA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VimA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VimA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1204478,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/188446189?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VimA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VimA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VimA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VimA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec86066d-3d45-4f2a-88f6-1c9aa7b45a4c_6067x4367.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>Editor&#8217;s Note: </strong>This week, Asia&#8217;s AI story was told through two showcases, one in India and one in China, and they shone a light on where the region is heading.</em></p><p><em>In India, the spotlight came through the AI summit week, with the country selling itself as a global AI hub. But the message was not only ambition. As the summit played out, the regulatory posture tightened in parallel, a reminder that scale comes with oversight.</em></p><p><em>In China, the Lunar New Year window and the Spring Festival Gala acted like a national distribution moment. AI and humanoid robots were placed on the main stage, not as a novelty but as a signal of where the country wants momentum to sit. Around it, the holiday period doubled as a live trial of how quickly AI can be pushed into everyday use.</em></p><p><em>Put together, these two moments made the subtext clear: the next phase of AI in Asia will be decided as much by distribution and governance as by model capability.</em></p><div><hr></div><h2>AI Impact Summit Week Signals India&#8217;s AI Ambition</h2><p>India&#8217;s AI Impact Summit has become one of the week&#8217;s defining showcases, drawing global tech leaders to New Delhi and framing India as the next major theatre for AI adoption and governance.</p><p>The summit&#8217;s biggest announcements were about infrastructure and capacity, not a single product drop. Google rolled out a new India&#8211;US subsea cable initiative, launched a $30 million AI-for-Science Impact Challenge and a second $30 million challenge focused on AI for government innovation, and expanded its skilling push, including training aimed at public servants. Microsoft used the week to reinforce its access-and-adoption pitch, saying it is on pace to invest $50 billion by 2030 to expand AI access across the &#8220;Global South.&#8221; On domestic capacity, Yotta announced a $2 billion investment in Nvidia&#8217;s latest chips to build a major AI computing hub, including a New Delhi &#8220;supercluster&#8221; targeted to go live by August 2026. The Indian government also underlined its own compute intent, announcing plans to add 20,000 GPUs under its national AI push.</p><p>Running in parallel with the summit, though, was the sharper signal: a tightening compliance posture. India&#8217;s IT minister told global platforms they must operate within India&#8217;s constitutional framework and cultural context. Earlier this month, the government updated its rules to formally define AI-generated content and make platforms responsible for ensuring it is clearly labelled, while also cutting the deadline to remove unlawful content to three hours after notification, down from 36 hours. In finance, the Reserve Bank of India (RBI) has asked lenders to adopt board-approved policies for AI use, keep model information available for internal and external audits when required, ensure human oversight for models used in financial decision-making, and disclose where AI is used in products and services as adoption accelerates.</p><p><strong>Signals To Watch:</strong> </p><ul><li><p><strong>From pledges to projects:</strong> which summit announcements translate into deployments you can point to, not just MOUs and skilling headlines.</p></li><li><p><strong>Three-hour takedown becomes real:</strong> whether enforcement is strict and consistent, and how quickly platforms build 24/7 escalation, legal review, and audit trails to match.</p></li><li><p><strong>Labeling starts to bite:</strong> whether &#8220;AI-generated&#8221; labeling becomes standardized in products and platforms, and how aggressively non-compliance is penalized.</p></li><li><p><strong>Finance rules harden:</strong> whether RBI guidance turns into concrete supervisory expectations, including board-level governance, audit readiness, human oversight, and mandatory disclosure.</p></li><li><p><strong>Capacity buildout changes the map:</strong> whether public-sector GPU additions and private builds (like Yotta) materially shift where large AI workloads run in India over the next 6&#8211;12 months.</p></li><li><p><strong>Who wins the ecosystem layer:</strong> whether cloud, telco, or domestic infrastructure players become the default on-ramp for enterprises and government agencies adopting AI.</p></li></ul><div><hr></div><h2>Lunar New Year Turns Into an AI Stress Test in China</h2><p>In China, the Spring Festival Gala is not just entertainment. It is the country&#8217;s biggest attention node and a reliable signal of what the system wants to elevate. When humanoid robots move from a side segment to the main stage, it is a message about industrial direction, status, and momentum. The Gala is where national priorities get packaged into something mass audiences can absorb, and where companies get to borrow institutional credibility at population scale.</p><p>What mattered this week was what sat underneath that spectacle. The Spring Festival window has become a structured launch season for consumer AI. Major platforms timed upgrades, releases, and distribution pushes around the holiday peak, using it to drive trial and to test whether assistants can turn into daily routines. The push toward &#8220;agent&#8221; positioning, and the effort to embed AI inside core apps, were part of the same pattern: the fight is moving from who has the best model to who becomes the default layer people reach for first.</p><p>For operators, the Gala week compresses the future into a few days. It shows what &#8220;mass adoption conditions&#8221; actually look like: sudden traffic concentration, high expectations for uptime and safety, and a user base that will churn fast once incentives or novelty fades. If you sell AI products or rely on AI workflows, treat these attention spikes as real-world stress tests. Build for resilience, guardrails, and escalation, and watch the companies that convert a national showcase into repeat use after the holiday peak.</p><p><strong>Signals To Watch</strong></p><ul><li><p><strong>Post-holiday retention:</strong> who keeps users once the peak traffic and promotions fade.</p></li><li><p><strong>Agent reality vs agent branding:</strong> which products move from &#8220;agent&#8221; marketing to reliable multi-step task completion inside real workflows.</p></li><li><p><strong>Distribution shifts:</strong> whether AI features get pulled deeper into default surfaces (search, messaging, payment, short video, super-app entry points) rather than living as standalone apps.</p></li><li><p><strong>Operational safety as a differentiator:</strong> how players handle misfires at scale, including content risk, model drift, and escalation speed under public scrutiny.</p></li><li><p><strong>Robots beyond spectacle:</strong> whether humanoids show up in repeatable deployments in factories, logistics, retail, or public services instead of remaining choreographed demonstrations.</p><div><hr></div></li></ul><h2>Takeaway</h2><p>If you are buying or building, carry forward the practical questions: what parts of your rollout depend on temporary attention spikes versus durable integration, whether your operating model can meet faster enforcement rhythms, and whether your governance, labeling, oversight, and audit trails are strong enough for AI to live inside everyday workflows without eroding trust.</p><div><hr></div><h2>Sources</h2><ul><li><p><strong><a href="https://www.reuters.com/business/retail-consumer/openai-google-india-hosts-global-ai-summit-2026-02-16/">Reuters:</a></strong> From OpenAI to Google, India hosts global AI summit</p></li><li><p><strong><a href="https://www.reuters.com/world/india/india-file-ai-fanfare-meets-policy-pushback-2026-02-18/">Reuters:</a></strong> India File: AI fanfare meets policy pushback</p></li><li><p><strong><a href="https://www.aljazeera.com/news/2026/2/16/india-hosts-ai-impact-summit-drawing-world-leaders-tech-giants">Al Jazeera: </a></strong>India&#8217;s hosts AI Impact Summit, drawing world leaders, tech giants</p></li><li><p><strong><a href="https://economictimes.indiatimes.com/tech/technology/google-announces-30-million-science-fund-new-subsea-connectivity-initiative/articleshow/128503747.cms?from=mdr">The Economic Times:</a> </strong>Google announces $30 million science fund; new subsea connectivity initiative</p></li><li><p><strong><a href="https://blogs.microsoft.com/on-the-issues/2026/02/17/acting-with-urgency-to-address-the-growing-ai-divide/">Microsoft Blog:</a></strong> We need to act with urgency to address the growing AI divide </p></li><li><p><strong><a href="https://www.scmp.com/tech/big-tech/article/3343825/kung-fu-somersaults-and-scale-unitree-eyes-20000-robot-output-2026-after-gala">SCMP:</a> </strong>Kung fu, somersaults and scale: Unitree eyes 20,000-robot output in 2026 after gala</p></li><li><p><strong><a href="https://eu.36kr.com/en/p/3677571989283719">36Kr:</a></strong> Doubao Officially Announces Interactive Games for CCTV Spring Festival Gala, ByteDance&#8217;s AI Continues Aggressive Advance </p></li><li><p><strong><a href="https://www.globaltimes.cn/page/202602/1355015.shtml">Global Times:</a> </strong>AI giants ramp up user competition with pre-Spring Festival digital red envelope campaigns</p><p></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Budget 2026 Puts AI Into Execution Mode. Operators Need To Fund Foundations Before Features]]></title><description><![CDATA[Singapore is accelerating AI deployment, but for regulated, asset-heavy operators, the binding constraint remains legacy systems and operational controls]]></description><link>https://www.asiatechlens.com/p/budget-2026-puts-ai-into-execution-singapore-sea</link><guid isPermaLink="false">https://www.asiatechlens.com/p/budget-2026-puts-ai-into-execution-singapore-sea</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Thu, 19 Feb 2026 01:30:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9TaD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9TaD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9TaD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9TaD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2232706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/188348914?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9TaD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9TaD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a5ef1af-0e54-491d-b00e-263ff1cb7270_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: <a href="https://www.azernews.az/region/254347.html">AzerNews</a></figcaption></figure></div><p>Singapore&#8217;s Budget 2026 elevates AI from emerging tech to a <a href="https://www.straitstimes.com/singapore/how-singapore-will-build-its-ai-capabilities?ref=navigating-ai">national priority</a>. A new National AI Council, chaired by PM Lawrence Wong, will coordinate strategy, regulation, and resources.</p><p>National AI Missions will <a href="https://www.channelnewsasia.com/singapore/ai-missions-healthcare-finance-sectors-sme-budget-2026-5929931">target four sectors</a>: advanced manufacturing, connectivity including logistics, finance, and healthcare. Enablers include a new one-north AI park for testing and scaling, expanded TeSA program to build AI literacy in non-tech roles such as accountancy and legal, and a Champions of AI program to support enterprise transformation.</p><p>For operators in banking, logistics, manufacturing, and similar sectors, this is not a signal to rush AI purchases. Long procurement cycles, legacy cores, and regulatory scrutiny mean early spending choices determine whether deployments scale safely or create operational risk.</p><p>The temptation is to fund visible, demo-friendly tools, leveraging government incentives, missions, and talent programs. These feel aligned and low-risk but often fail under production load, audit pressure, or incident response when deeper foundations are absent.</p><p>So the question is simple: are you funding AI tools, or the foundations that let them survive production?</p><h2>The Operator Gate: Three Tests Before Scaling</h2><p>Before scaling any AI system, operators should test these three basics:</p><ul><li><p><strong>Reliability</strong>: Can networks, integrations, and core systems handle real-world usage without degradation or failure? If not, AI will falter at peak traffic or during incidents.</p></li><li><p><strong>Evidence</strong>: Can you rapidly trace data inputs, model changes, and decision rationale? Without this, audits, compliance reviews, and post-incident probes become major risks.</p></li><li><p><strong>Portability</strong>: Can you switch vendors or roll back without rewriting core workflows? Vendor lock-in turns every update into a costly, high-risk event.</p></li></ul><h2>Foundations, Not Models, Drive ROI</h2><p>Most AI projects fail not because models underperform, but because surrounding systems are unprepared. In regulated sectors, success hinges on legacy integration, clean data flows, robust identity/access controls, monitoring/incident response, and disciplined change management.</p><p>As Adeline Liew, Country Business Leader, Singapore, Alcatel-Lucent Enterprise, said in her notes to media, the real gap is between ambitious AI applications and the aging infrastructure required to run them. For many enterprises, the bottleneck is not the model itself but the reliability and speed of internal networks. If underlying systems are slow or disconnected, AI investments struggle to deliver returns.</p><p>Budget 2026 incentives are sequencing tools, not transformation funding. The enhanced Enterprise Innovation Scheme (EIS) offers 400% tax deductions on qualifying AI spend, capped at S$50,000 per year of assessment for YA2027 and YA2028. It helps offset early experiments and foundation work, but it will not remove enterprise constraints on delivery.</p><p>&#8220;To realize the full economic potential of these national investments, infrastructure must be viewed as a strategic business asset rather than a back-office expense,&#8221; said Liew.</p><p>In this view, AI readiness becomes a core business capability: investing in modernized foundations enables organizations to move beyond testing and achieve sustained gains in productivity and service delivery.</p><p>Use these incentives for low-regret priorities: foundational cleanup such as data lineage and monitoring upgrades, and tightly controlled pilots, not broad deployments.</p><h2>Skills Boost Adoption; Operating Models Ensure Survival</h2><p>Budget 2026 expands AI training across the workforce, including non-tech roles, raising baseline comfort and usage. Yet training alone does not redefine decision rights, escalation paths, or risk ownership. In regulated environments, redesigning workflows, governance, and accountability determines whether systems survive audits, outages, and other future problems.</p><p>PM Wong framed the Budget as a shift from isolated pilots <a href="https://www.straitstimes.com/singapore/budget-2026-pm-wong-to-chair-new-national-ai-council-national-ai-missions-will-launch-to-drive">to scaled deployment </a>at national speed. For operators, speed and scale only work if operating models evolve too. As KPMG partner Edmund Heng <a href="https://www.straitstimes.com/singapore/budget-2026-pm-wong-to-chair-new-national-ai-council-national-ai-missions-will-launch-to-drive">notes</a>, &#8220;Clear accountability, a risk-based approach, and early governance will be critical for sustainable AI implementation at scale. Good governance empowers AI adoption with confidence, while unclear governance hinders it.&#8221;</p><h2>What to Fund Now, Pilot, or Delay: By Sector</h2><p>National AI Missions provide sequencing signals. Each sector carries different evidence burdens and incident tolerances.</p><h3>Finance and healthcare</h3><ul><li><p><strong>Fund now</strong>: Data lineage, audit trails, model validation, and rollback controls meeting regulatory standards.</p></li><li><p><strong>Pilot with guardrails</strong>: Narrow decision-support use cases under human oversight with clear incident playbooks.</p></li><li><p><strong>Delay</strong>: High-impact automation in core banking or clinical workflows until auditability, explainability, and safe rollback are proven.<strong> </strong>In practice, this means decisions that change customer or patient outcomes without an auditable human sign-off path. In healthcare, delay automation that touches triage, diagnostic support, or patient routing unless model behavior can be demonstrated and safely rolled back.</p></li></ul><h3>Advanced manufacturing and connectivity/logistics</h3><ul><li><p><strong>Fund now</strong>: Legacy system integrations, network upgrades, and monitoring for stable data flows under load.</p></li><li><p><strong>Pilot with guardrails</strong>: Limited automation on specific lines, routes, or segments with manual fallback.</p></li><li><p><strong>Delay:</strong> End-to-end autonomy across systems of record unless integrations have proven SLOs and tested fallback paths.</p></li></ul><p>In all cases, prioritize low-regret foundations, run scoped pilots with rollback, and scale only after reliability, governance, and accountability prove themselves in live conditions.</p><p>Budget 2026 makes AI a national imperative but leaves execution risks inside enterprises. Competitive advantage will come not from adopting fastest, but from sequencing investments more deliberately than peers: fund foundations first, treat missions as leading indicators, and move with disciplined speed.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny">The Chinese New Year AI Gateway War: The Big Four&#8217;s Fight for Daily Habit</a></strong><br>How red packets, subsidies, and new AI apps are being used to force trial at scale, and what happens when incentives end.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/ai-cybercrime-southeast-asia">AI Is Accelerating Cybercrime, and Southeast Asia Feels It</a></strong><br>Why AI raises the baseline threat level, and why resilience, monitoring, and incident response matter as much as model capability.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/why-bytedance-ai-phone-hit-a-wall">Why ByteDance&#8217;s AI Phone Hit a Wall: Security, Fair Play, and the Economics of Attention</a></strong><br>A useful case study on what breaks at scale when security, platform rules, and operational constraints collide with fast product rollout.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/ai-for-global-equity-begins-with">AI for Global Equity Begins With Local Realities</a></strong><br>Why the hardest AI problems are trust, language, and deployment, and why &#8220;responsible&#8221; starts with real user constraints.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/the-chip-wars-new-reality-a-view">The Chip War&#8217;s New Reality: A View from the Crossroads</a></strong><br>Why AI and semiconductor decisions are becoming geopolitical choices from Singapore&#8217;s vantage point, and how ecosystem fragmentation raises the stakes for vendor lock-in and resilience.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Chinese New Year AI Gateway War: The Big Four’s Fight for Daily Habit]]></title><description><![CDATA[ByteDance, Tencent, Alibaba and Baidu are using red packets, subsidies and new AI apps to force habit formation. The real test comes after the holiday, when the giveaways stop]]></description><link>https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny</link><guid isPermaLink="false">https://www.asiatechlens.com/p/the-chinese-new-year-ai-gateway-war-tencent-bytedance-baidu-alibaba-cny</guid><dc:creator><![CDATA[Asia Tech Lens]]></dc:creator><pubDate>Wed, 18 Feb 2026 01:01:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!si4i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!si4i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!si4i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 424w, https://substackcdn.com/image/fetch/$s_!si4i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 848w, https://substackcdn.com/image/fetch/$s_!si4i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 1272w, https://substackcdn.com/image/fetch/$s_!si4i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!si4i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png" width="1536" height="968" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:968,&quot;width&quot;:1536,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3023993,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.asiatechlens.com/i/188328541?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f50c7b7-b02c-44c7-a7bf-0242bacfcace_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!si4i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 424w, https://substackcdn.com/image/fetch/$s_!si4i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 848w, https://substackcdn.com/image/fetch/$s_!si4i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 1272w, https://substackcdn.com/image/fetch/$s_!si4i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff12c5c62-d337-4e19-af36-6ffb2a709804_1536x968.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For China&#8217;s tech giants, the CCTV Spring Festival Gala is a once-a-year distribution super node. It is the closest thing China has to the Super Bowl, and the sponsorship optics carry institutional weight in a system where industrial priorities are set from the top. The Gala made that subtext visible. Humanoid robots were not a side act. It signaled what platforms want to be associated with: industrial capability, not just consumer entertainment.</p><p>While robots took center stage on screen, a parallel battle ran underneath it in the infrastructure layer. <a href="https://www.scmp.com/news/china-future-tech/ai/article/3338038/bytedances-volcano-engine-lands-exclusive-ai-cloud-slot-spring-festival-gala">ByteDance&#8217;s Volcano Engine secured</a> an &#8216;exclusive AI cloud partnership&#8217; for the 2026 Gala, following Alibaba Cloud&#8217;s exclusive cloud-and-AI role for the 2025 show. That matters in a market where demand for AI workloads is rising and cloud competition is tightening. In AI, the company that wins the infrastructure relationship can shape the rest of the lifecycle, from deployment and performance to cost, distribution, and commercial leverage.</p><p>The Gala is also the sharpest peak in a wider Lunar New Year campaign window that stretches across late January through February, where red packets, perks, and sharing mechanics are used to force trial at scale and test who stays once incentives fade. <a href="https://www.linkedin.com/in/ashahemrajani/">Asha Hemrajani</a>, Senior Fellow, S. Rajaratnam School of International Studies at Nanyang Technological University, sees it as a sign that consumer AI is moving into what she calls the age of <em><strong>&#8220;agentic commerce,&#8221;</strong></em> shifting from assistants that respond to queries to systems that <em><strong>&#8220;act on the consumer/customer&#8217;s behalf,&#8221; </strong></em>including automating decisions about what to buy.</p><p>The shift in tone is hard to miss. After years of talking up cost-cutting and efficiency, the biggest platforms are back to paying for behavior change. Liang Chen, an associate professor of strategy and entrepreneurship at Singapore Management University, calls the giveaways <em><strong>&#8220;a subsidy on user behavior,&#8221; </strong></em>arguing the companies are<em><strong> &#8220;buying the right to be users&#8217; default interface for the next decade.&#8221;</strong></em></p><p>That bet is now visible in the incentive pools and the distribution mechanics. Alibaba&#8217;s Lunar New Year campaign, launched on February 6, will distribute RMB 3 billion (US$431 million) in incentives through Qwen. It has packaged the push around high-frequency consumption, including AI-driven ordering for everyday services. Tencent put RMB 1 billion (about US$140 million) behind Yuanbao&#8217;s cash red-packet campaign. Alongside the incentives, Tencent promoted Yuanbao PAI, a group-based feature built for coordination and shared use. Think of it as a shared &#8220;room&#8221; rather than a chat thread: users join a PAI space and the assistant participates in the group, designed to reduce friction in multi-person planning through quick summaries, reminders and timed updates, while also enabling lightweight creative generation that can be shared back into the group. Baidu is running an RMB 500 million (about US$70 million) incentive programme to pull users into its assistant experience over a longer window. ByteDance is anchoring its push on the Gala&#8217;s credibility stage through Volcano Engine, alongside a broader Doubao holiday promotion drive.</p><div class="pullquote"><p><em><strong>&#8220;The re-ignition is driven by three factors: peak traffic anxiety, as traditional mobile internet growth is dead; the threat of disruption. The giants are terrified of missing the &#8220;AI-native&#8221; generation of users and are using the Spring Festival&#8212;China&#8217;s biggest attention window&#8212;as a brute-force attempt to buy user habits, just as WeChat did with mobile payments in 2015.&#8221;</strong></em></p><p><em><strong>-</strong></em> <a href="https://www.linkedin.com/in/ashleydudarenok/">Ashley Dudarenok</a>, China digital expert, author, and keynote speaker</p></div><p>That &#8220;brute force&#8221; matters because the real goal is to change what people do every day. If an AI assistant becomes the first place people go to ask a question, plan something, or trigger an action, it starts to function like a new interface layer on top of apps. <a href="https://www.linkedin.com/in/captainhoff/">Steven Hoffman</a>, the Chairman &amp; CEO of Founders Space, who tracks platform strategy in China, says the harder part is keeping users engaged once the giveaways stop and the novelty wears off.</p><p>The winner among them will be the one that can turn a Chinese New Year download spike into a daily routine, by making its AI feel like the easiest, most natural way to get things done.</p><h2>From Territory Wars to Gateway Wars</h2><p>China&#8217;s platforms have fought brutal battles before. Ride hailing, food delivery, e-commerce, short video, payments. Those wars were about owning a vertical. Liang Chen, Associate Professor of Strategy &amp; Entrepreneurship at Singapore Management University, says this round is different because it targets the layer above the verticals.</p><p>Liang describes this round as <em><strong>&#8220;a battle for the gateway.&#8221;</strong></em> If one player becomes the default AI entry point, it can start routing users into everything else, effectively brokering traffic and transactions across other apps and services. He compares it to earlier distribution resets created by control of the entry layer, from WeChat&#8217;s super-app gravity to Google&#8217;s Android advantage.</p><p>He says<em><strong> &#8220;the Spring Festival provides a window for resetting user behavior&#8221;</strong></em> when hundreds of millions of people pause routines at the same time. That pause creates a brief opportunity to install new behaviors quickly. In that sense, the subsidies are a temporary discount on habit change, buying the first wave of trial at national scale.</p><p>Liang argues the real goal is a forced migration from &#8216;search&#8217; to &#8216;agent,&#8217; paying for the first-mover chance to become the next operating system rather than just another app.</p><p>Ashley Dudarenok argues Chinese New Year is exposing a shift in what companies are building. <em><strong>&#8220;This Spring Festival marks the death of &#8216;AI as a feature,&#8217;&#8221;</strong></em> she says. The big spend is pushing standalone assistants toward habit formation, with integration into everyday workflows as the differentiator, from commerce use cases like Qwen&#8217;s ordering hooks to social coordination features like Yuanbao PAI.</p><h2>Four Plays, Four &#8220;DNAs&#8221;</h2><p>The giveaway war may look uniform on the surface, but the strategies underneath are not.</p><p><em><strong>&#8220;Each company is playing to its unique strengths, revealing their core DNA,&#8221; </strong></em>Ashley Dudarenok says.</p><ul><li><p><strong>ByteDance (Doubao):</strong> Ashley Dudarenok says ByteDance is &#8220;<em><strong>all about platform independence,&#8221;</strong></em> using Douyin and its CCTV tie-up to bypass rival ecosystems. The Gala badge matters here. Volcano Engine, ByteDance&#8217;s cloud arm, was named the show&#8217;s exclusive AI cloud partner, a signal that ByteDance can run national-scale AI workloads on its own stack rather than renting credibility from someone else&#8217;s ecosystem. Alongside that infrastructure flex, ByteDance used the holiday window to push product momentum. It promoted Seedance 2.0, its AI video-generation model, as a marquee capability inside Doubao, reinforcing the message that Doubao is not just another chatbot, but an interface for creating and doing. Beyond these headlines, ByteDance also ran a broader Lunar New Year giveaway push to drive trial and sharing at scale.</p></li></ul><ul><li><p><strong>Alibaba (Qwen):</strong> As per Ashley, Alibaba is focused on<strong> </strong><em><strong>&#8220;consumption integration,&#8221; </strong></em>tying AI to real-world transactions so it feels immediately useful. That&#8217;s why it has put RMB 3 billion (about US$431 million) behind Qwen. The simplest way to see it is this: Qwen is being pushed less as a chatbot and more as a tool that can trigger a real purchase. The proof point is the milk-tea giveaway. Within hours of launch, the surge pushed Qwen past Tencent&#8217;s Yuanbao to the top of China&#8217;s Apple App Store free chart. Alibaba&#8217;s Qwen team said more than <a href="https://www.scmp.com/tech/article/3342702/alibabas-bubble-tea-giveaway-pushes-qwen-past-tencents-yuanbao-top-china-app-store">10 million free orders</a> were placed within nine hours, using vouchers capped at 25 yuan. The spike overwhelmed many stores, with users reporting overload and disruption as traffic surged.</p></li></ul><ul><li><p><strong>Tencent (Yuanbao): </strong>Ashley calls Tencent&#8217;s approach <em><strong>&#8220;the most nuanced play,&#8221;</strong></em> because its real edge is not a bigger model, but AI + social. Tencent put RMB 1 billion behind Yuanbao&#8217;s cash red-packet campaign. In figures released on Feb 18, Tencent said Yuanbao&#8217;s daily active users (DAU) exceeded 50 million and monthly active users (MAU) reached 114 million, with users participating in more than 3.6 billion lucky draws and making over 1 billion AI creations. But Tencent is trying to make sure Yuanbao is remembered for more than cash. That is where <a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">Yuanbao PAI comes in</a>: a group feature built around shared activity rather than solo prompting. PAI is closer to a shared room than a chat thread, designed for coordination and group utility, from lightweight recaps and timed info drops to simple creative outputs that can be generated and shared in-context. The architecture is the tell. Tencent is not dropping an AI bot directly into WeChat group chats as a visible participant. It is ringfencing the experiment inside Yuanbao, using PAI as a bridge to Tencent&#8217;s social graph without risking backlash inside its core messaging product. Steven Hoffman argues that is precisely the advantage: <em><strong>&#8220;the big advantage of Yuanbao PAI is that it is literally injecting AI into the space where people live, communicate, socialize, and do everything they need to get done.&#8221;</strong></em> But he also flags the constraint: in group spaces, AI can feel intrusive fast. If Tencent wins this round, it will be by finding a workable social contract for AI in groups, useful enough to reduce friction, quiet enough to keep the conversation human.</p></li></ul><ul><li><p><strong>Baidu: </strong>Ashley describes Baidu as being on a <em><strong>&#8220;quiet scale quest.&#8221;</strong></em> With RMB 500 million behind its holiday push, Baidu is trying to convert existing habits into AI habits through a spread of seasonal features and incentives. This push is built for endurance. Baidu&#8217;s rewards run from January 26 to March 12, with prizes up to 10,000 yuan, and the company is bundling the push into the Baidu App via nearly a hundred Spring Festival-themed activities tied to the Beijing Radio and Television Spring Festival Gala. What makes Baidu different is the installed base it is trying to redirect. The Ernie AI Assistant has <a href="https://www.scmp.com/tech/tech-trends/article/3340866/baidu-launches-ernie-50-firms-ai-assistant-users-reach-200-million-month">reportedly</a> surpassed 200 million monthly active users, embedded inside Baidu&#8217;s core surfaces and connected into services such as JD.com, Meituan and <a href="http://trip.com">Trip.com</a>. Baidu is betting that distribution plus integration can outlast the holiday spike.</p></li></ul><h2>The Retention Cliff</h2><p>The red packets are doing what they have always done in China&#8217;s internet wars. They pull people through the door fast. The harder part starts when the door prize disappears.</p><p>Ashley Dudarenok calls the escalation a warning sign in itself. <em><strong>&#8220;Firstly, incentive inflation,&#8221;</strong></em> she says. <em><strong>&#8220;The budget escalated from RMB 500 million to RMB 3 billion in a matter of days. This is an unsustainable subsidy war.&#8221; </strong></em>The spending can force trial quickly, but it also sets a trap: if users arrive for the prize rather than the product, they leave the same way.</p><p>Steven Hoffman is even more direct about what happens after the holiday glow fades. <em><strong>&#8220;People will try it out,&#8221;</strong></em> he says,<em><strong> &#8220;but they won&#8217;t see the value there, and then they will revert to doing what they did before.&#8221;</strong></em> In his view, the deepest challenge is not distribution. It is the fact that <em><strong>&#8220;what people really want and what you think they want are often two entirely different things.&#8221;</strong></em> The Spring Festival window can manufacture curiosity, but it cannot manufacture conviction.</p><p>That gap is especially sharp in social settings, where platforms can&#8217;t afford to break the vibe.<em><strong> &#8220;In these group chats, people don&#8217;t really want AI interfering,&#8221; </strong></em>Hoffman says. <em><strong>&#8220;They don&#8217;t want AI taking a lead role.&#8221; </strong></em>That, in his view, is why Tencent is proceeding cautiously rather than pushing a fully integrated experience too fast.</p><h2>The Cost of Failure</h2><p>The second half of the story is not only about retention. It is about risk.</p><p>Asha Hemrajani worries most about transaction-heavy workflows because one small error can spread. She points to a pattern described by OWASP, a widely used set of application-security guidelines: &#8220;Cascading Failures,&#8221; where a single initial error, <em><strong>&#8220;from a malicious prompt injection, a bug in the agent, or a misunderstanding of the end-user&#8217;s command,&#8221;</strong></em> can propagate across multiple systems before a human has the chance to intervene. She also flags <em><strong>&#8220;deliberate or accidental leakage of sensitive personal information</strong></em> <em><strong>which can then be used to propagate other crimes such as scams.&#8221;</strong></em></p><p>Trust constraints are not limited to transaction safety. They also extend to provenance and rights in generative media. <a href="https://www.cnbc.com/2026/02/16/bytedance-safegaurds-seedance-ai-copyright-disney-mpa-netflix-paramount-sony-universal.html">ByteDance&#8217;s Seedance 2.0</a> drew attention for its capabilities, but also sparked controversy over training data and content similarity claims, a reminder that create features can turn into governance and reputational liabilities.</p><p>In other words, the moment the assistant can place an order, move money, or trigger services, trust becomes a hard gate. If users believe the system can misfire at speed, they stop delegating. At that point, no incentive pool can buy them back.</p><p>Hemrajani adds that if these consumer AI playbooks are exported into Southeast Asia, the dependency question becomes political as well as technical. Chinese apps remain subject to China&#8217;s cyber and data laws, including the National Intelligence Law, which has shaped regional scrutiny over data access and sovereignty.</p><p>Liang Chen adds a different kind of constraint, one that does not show up on App Store charts. He argues the strategic risk is building a massive user base that is economically negative to serve because inference costs are variable. Unlike traditional apps, where serving an extra user is close to free, AI usage scales with cost. If a platform buys a user base that is there for rewards rather than real demand for the intelligence, it can end up carrying high servicing costs without durable value in return.</p><h2>Regulation Is Tightening the Arena</h2><p>Hemrajani&#8217;s view is that this consumer AI escalation is also happening in a narrower arena. She points to two concrete signals:<em><strong> &#8220;In September 2025, the Chinese State Administration for Market Regulation (SAMR) intervened in the food delivery marketplace and warned e-commerce platforms about too high subsidies. In January 2026, Chinese regulator banned platforms from forcing their online merchants to launch promos and give discounts. This new rule is effective this month (February). The aim of these new regulations is to cool down intense competition between the platforms. There is good reason to do so because this intense competition has been eating into the profit margins of these platforms and thus has a deflationary impact on the Chinese economy.&#8221;</strong></em></p><p>This is why she reads the AI app push as more than product ambition<em><strong>. &#8220;These platforms launching AI apps is yet another escalation in their battle for market share,&#8221; </strong></em>she says, <em><strong>&#8220;given that other routes have been closed to them due to new government regulations.&#8221;</strong></em></p><h2>What to Watch After the Festivities End</h2><p>The subsidies cannot last forever. There is a definite spike right now because the incentives and attention are concentrated, but that limited-time surge alone doesn&#8217;t prove the plan worked.</p><p>What matters is what usage looks like when the festival ends and routine returns. Ashley Dudarenok says she would watch for a retention cliff, warning that Spring Festival incentive apps have historically seen very low carryover, sometimes dropping to single-digit retention after the first week.</p><p>Her scoreboard is simple:</p><ul><li><p><strong>DAU/MAU ratio:</strong> the stickiness score. Does daily usage hold up, or does it collapse once the holiday rush passes?</p></li><li><p><strong>Session frequency:</strong> are users opening the app multiple times a day for different tasks, or just once to check for leftover rewards?</p></li><li><p><strong>Core feature engagement:</strong> what share of daily users are actually using the assistant&#8217;s capabilities rather than spending most of their time in the rewards layer? If the traffic stays concentrated in red packet mechanics, Dudarenok warns, &#8220;you haven&#8217;t built an AI product; you&#8217;ve built a temporary casino.&#8221;</p></li></ul><p>Liang Chen frames the same test in behavioral terms. Look for longer, more complex interactions, not just quick prompts. Look for evidence that queries lead to completed actions inside the ecosystem, not dead-end chat. And watch whether usage holds after people return to work, when patience drops and utility has to be obvious.</p><p>In Liang&#8217;s view, retention will not come from social virality but from integration depth. The agent that holds payment credentials, knows your location, and has a history of successful transactions becomes hard to replace.</p><p>If this holiday sprint shows anything, it is that China&#8217;s platforms can still manufacture mass trial on command. What they cannot manufacture is habit. That has to be earned after the festival ends, when users return to normal routines and start judging these assistants on whether they save time, reduce friction, and complete tasks reliably.</p><p>The direction of travel is clear. Consumer AI is shifting from being something people talk to, toward something people delegate to. That shift concentrates power in the layer that can turn intent into action safely, across payments, services, and coordination, without breaking trust.</p><p>The next few months will decide whether this was a seasonal spike or the start of a new default. The winner will not be the platform that bought the most attention. It will be the one that users keep opening when there is nothing left to collect.</p><div><hr></div><h2>Related Reading On Asia Tech Lens</h2><ul><li><p><strong><a href="https://www.asiatechlens.com/p/what-tencents-yuanbao-pai-reveals-spring-festival">What Tencent&#8217;s &#8220;Yuanbao PAI&#8221; Reveals About Its AI Strategy</a></strong></p><p>Why Tencent is testing &#8220;social AI&#8221; during Spring Festival; explains how group coordination features could turn AI into a daily habit layer.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/ai-for-global-equity-begins-with">AI for Global Equity Begins With Local Realities</a></strong><br>Why the hardest AI problems are trust, language, and deployment, and why &#8220;responsible&#8221; starts with real user constraints.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/thailands-digital-transformation">Thailand&#8217;s Digital Transformation</a></strong><br>A ground-level look at how platforms, payments, and infrastructure shape adoption, and how China-linked tech shows up in everyday systems.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/inside-chinas-bold-push-to-build">Inside China&#8217;s Bold Push to Build Humanoid Robots</a></strong><br>Why humanoids are becoming an industrial signal; looks at policy support, public demos, and the race to move from spectacle to scale.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/plush-playful-and-powered-by-ai-how">Plush, Playful, and Powered by AI: How China&#8217;s Toys Are Evolving</a></strong><br>Why China&#8217;s AI-toy boom matters for consumer adoption; compares China&#8217;s fast product cycles with a more cautious Western approach.</p></li><li><p><strong><a href="https://www.asiatechlens.com/p/why-southeast-asias-super-apps-wont">Why Southeast Asia&#8217;s Super Apps Won&#8217;t Look Like China&#8217;s</a></strong><br>Why WeChat-style dominance is hard to copy, and why distribution in SEA looks more fragmented, regulated, and competitive.</p></li></ul>]]></content:encoded></item></channel></rss>