Skip to main content

Abstract

In the near term, cloud computing faces a number of challenges clearly identified by our research. These include legal and regulatory compliance considerations, security and privacy issues, managing the contractual relationship between client and cloud provider, including lock-in and dependency, as well as managing the very flexibility that cloud provides. Nevertheless, many of these types of challenge have been faced previously and effective solutions have evolved. For example, safe harbour provisions address legal and regulatory issues about transferring data abroad and over 25 years of IT outsourcing have resulted in a skill base that is capable of managing contractual relationships with key partners. End-user computing, whether in the form of desktop computers or, increasingly, smartphones, has become effectively integrated within the IT infrastructure of most organizations. Cloud computing can, and should, learn from these experiences if it is to achieve its full potential. In this chapter and the next, we report on the five major challenges identified by our research and discuss ways forward.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. See Willcocks, L., Venters, W. and Whitley, E. (2010) ‘Glimpsing the Future through the Cloud: From Cost to Innovation,’ Presentation at the Cloud Business Summit, London, November 30. For more details see also www.HfSresearch.com and www.outsourcingunit.org.

    Google Scholar 

  2. When Gene Amdahl created IBM clones that were ‘plug-compatible’ with IBM’s legendary 360 and 370 series, but through the use of large-scale circuit integration were superior, IBM responded with aggressive sales tactics, which its opponents called FUD (fear, uncertainty, and doubt). In particular, IBM suggested that they were about to release better machines in the very near future — successfully persuading customers to hold off purchasing Amdahl mainframes. For a detailed description see Henderson (2009) The Encyclopaedia of Computer Science and Technology. New York, Infobase Publishing. Facts On File: 10.

    Google Scholar 

  3. Based on later research findings, this is different from our first formulation, which had Equivalence, Abstraction, Automation, and Tailoring. See Willcocks, L., Venters, W. and Whitley, E. (2011) Cloud and the Future of Business, Paper 1 — The Promise. London, Accenture/LSE.

    Google Scholar 

  4. One might also note that a firm’s financial assets invariably sit in a cloud off premises–at their banking service provider’s — exhibiting an apparently high level of confidence.

    Google Scholar 

  5. E.g. www.emis-online.com/emis-hosting-services.

  6. Distributed Denial of Service — the flooding of a server with requests from a widely distributed set of computers beyond the level it can cope with. In order to undertake such an attack, control is needed of a large number of computers — and thus malware that provides such access is often used. The distributed nature of such attacks makes them very hard to respond to. One major concern for cloud providers is the potential misuse of their services to aid such an attack (http://en.wikipedia.org/wiki/Denial-of-service_attack). One respondent commented on brand hacking: ‘I’ve had people attempt to crack — hack into — web-based solutions and cloud-based solutions … but in the same way they would have done had it been on our servers. They are trying to hack the client, not the solution … The big thing is, people hack brands or hack applications regardless of what the infrastructure is underneath.’ Steve Furbinger — RAPP, quoted in Willcocks, L. Venters, W. and Whitley, E. (2011) Cloud and the Future of Business, Paper 2 — Challenges. London, Accenture/Outsourcing Unit.

    Google Scholar 

  7. Killalea, T. (2008) ‘Meet the Virts: Virtualization Technology Isn’t New, but It Has Matured a Lot Over the Past 30 Years.’ ACM Queue, 6(1): 14–18.

    Article  Google Scholar 

  8. Quote from David Leyland, a senior executive with cloud supplier Glasshouse. Quoted in Willcocks, Venters and Whitley (2011) Paper 1.

    Google Scholar 

  9. Microsoft CEO Steve Ballmer gave this speech at the London School of Economics and Political Science on October 5, 2010 — Seizing the Opportunity of the Cloud: The Next Wave of Business Growth. On www.lse.ac.uk — see ‘media and events.’

  10. Healey, M. (2010) ‘How Cloud Computing Changes IT Outsourcing.’ InformationWeek June 15: 45–7.

    Google Scholar 

  11. Brynjolfsson, E., Hofmann, P. and Jordon, J. (2010) ‘Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model.’ Communications of the ACM, 53(5): 32–4.

    Article  Google Scholar 

  12. Services such as Akamai focus on accelerating access to Web resources using route-optimization technologies, caching, compression, and pre-fetching of data. Akamai maintains tens of thousands of network servers globally, which monitor Internet traffic and use this information to optimize data routes. www.akamai.com.

  13. As one example: ‘every customer is on the same service level agreement in SalesForce in terms of [the fact that] they can’t, you can’t buy your way to … a higher level of service availability, for example. And our view of that was that it’s really a principle of our architecture. So what we, you know, every technology, whether they are AIG or [a] one person start-up, gets the same level of service.’ (Tim Barker, SalesForce.com, quoted in Willcocks, Venters and Whitley (2011) Paper 2).

    Google Scholar 

  14. Jimmy Harris, Accenture. Interview November 2010. Quoted in Willcocks, Venters, and Whitley (2011) Paper 2.

    Google Scholar 

  15. Amazon offers a 10 percent discount if they fail to reach 99.95 percent up-time (http://aws.amazon.com/ec2-sla/). 3Tera has a greater focus on enterprise clients and its virtual, private data-center offering provides a discount of 10 percent of monthly service fees for availability between 99.999 percent and 99.900 percent and 25 percent of monthly service fees for less than 99.9 percent (http://blog.3tera.com/computing/175/). For many businesses such discounts are irrelevant compared with the business cost of service downtime — particularly as IaaS is cheap compared with maintaining existing infrastructure — hence the discount is small.

  16. The IT Infrastructure Library is a standardized ‘best-practice’ approach to IT service management (www.itil-officialsite.com/home/home.asp).

  17. Interview with Greg Bybee of VMware, November 2010. See Willcocks, Venters and Whitley (2011) Paper 2.

    Google Scholar 

  18. Van der Heiden, G. (2010) ‘The Status of the Application Services and SaaS Market in Europe.’ Gartner Outsourcing & IT Services Summit. London, Gartner.

    Google Scholar 

  19. See also Sethi, A. and Aries, O. (2010) ‘The End of Outsourcing (As We Know It).’ Business Week August 10, online viewpoint.

    Google Scholar 

  20. A point also made in Killalea, op. cit.

    Google Scholar 

  21. Dave Leyland, business development executive of Glasshouse, August 2010. Quoted in Willcocks, Venters and Whitley (2011) Paper 3.

    Google Scholar 

  22. Interview with Steve Furbinger of RAPP, October 2010. Quoted in Willcocks, Venters and Whitley (2011) Paper 2.

    Google Scholar 

  23. Excerpt from an interview with Hong Choing of Microsoft in December 2010. Quoted in Willcocks, Venters and Whitley (2011) Paper 2.

    Google Scholar 

  24. Interview with Bruce Carlos, April 18, 2013.

    Google Scholar 

  25. See Carr, N. (2009) The Big Switch. Boston, MA, Harvard Business Press: 5.

    Google Scholar 

  26. See also Carr, N. (2005) ‘The End of Corporate Computing.’ MIT Sloan Management Review, 46(3): 67–73.

    Google Scholar 

  27. Cornford, T. (2003) ‘Information Systems and New Technologies: Taking Shape in Use.’ In: C. Avgerou (ed.) Information Systems and the Economics of Innovation. Cheltenham, Edward Elgar Publishing: 162–77.

    Google Scholar 

  28. See, for example, Keen, P. G. W. and Woodman, L. (1984) ‘What To Do with All Those Micros: First Make Them Part of the Team.’ Harvard Business Review, 62(5): 142–50. Those with longer memories will recall predictions of the demise of the internal IT department throughout the 1980s, to be replaced by software packages and business unit computing. The rise of IT outsourcing from the late 1980s was also regularly predicted to lead to the end of the IT department.

    Google Scholar 

  29. See Willcocks, Venters and Whitley (2010) Glimpsing the Future.

    Google Scholar 

  30. See Lee, D. (1986) ‘Usage Patterns and Sources of Assistance for Personal Computer Users.’ MIS Quarterly, 10(4): 313–25.

    Article  Google Scholar 

  31. See Benioff, M. and Adler, C. (2009) Behind the Cloud — The Untold Story of How SalesForce.com Went from Idea to Billion-dollar Company and Revolutionized an Industry. San Francisco, CA, Jossey-Bass.

    Google Scholar 

  32. Interview with Robin Daniels of SalesForce.com, November 2010. Quoted in Willcocks, Venters and Whitley (2011) Paper 2.

    Google Scholar 

  33. E.g. trust.salesforce.com or http://status.aws.amazon.com/.

  34. See Etro, F. (2009) ‘The Economic Impact of Cloud Computing on Business Creation, Employment and Output in Europe.’ Review of Business and Economics, 54(2): 179–91.

    Google Scholar 

  35. See Willcocks, L. and Lacity, M. (2009) The Practice of Outsourcing: From Information Systems to BPO and Offshoring. London, Palgrave, especially chapters 1 and 2.

    Google Scholar 

  36. Quoted in personal correspondence, April 24, 2013, as part of our (so far anonymized) 2013/14 round of research interviews.

    Google Scholar 

  37. Mooney, J., Ross, J. and Phipps, J. (2012) ‘Embrace the Inevitable: Six Imperatives to Prepare Your Company for Cloud Computing.’ CISR Research Briefing, 12(10, October).

    Google Scholar 

  38. Ibid.

    Google Scholar 

  39. Willcocks, L. Reynolds, P., Thorogood, A. and Schlagwein, D. (2013) ‘Cloud Computing as Innovation: Slow Trains Coming?’ Public Seminar, Sydney Accenture offices, April 23.

    Google Scholar 

  40. See Reynolds, P., Lacity, M. and Willcocks, L. (2014) Cloud Strategizing: Building The Future Starting Today. LSE Outsourcing Unit Working Paper, February. London, LSE.

    Google Scholar 

  41. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M. (2010) ‘A View of Cloud Computing.’ Communications of the ACM, 53(4): 50–8.

    Article  Google Scholar 

  42. We thank Mike Hanley of PA Consulting for coining this phrase in conversation with us in January 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2014 Leslie Willcocks, Will Venters and Edgar A. Whitley

About this chapter

Cite this chapter

Willcocks, L., Venters, W., Whitley, E.A. (2014). The Challenges. In: Moving to the Cloud Corporation. Palgrave Macmillan, London. https://doi.org/10.1057/9781137347473_4

Download citation

Publish with us

Policies and ethics