18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Factor – objective The Customer (Internal) Outsourcer (Extern)<br />

Complexity – a<br />

similar Objective<br />

Easy to use – a<br />

similar Objective<br />

Systems and services can be complex<br />

undercover, but can be simple to use.<br />

Systems and services must be simple and<br />

intuitive, requiring minimal training and<br />

helpdesk by phone.<br />

~ 667 ~<br />

Systems and operations must be easy to<br />

handle in order to maintain and change, but<br />

with a high cost of entry customers trying to<br />

be competitive on the market through them.<br />

Systems and services must be intuitive and<br />

simple, require a minimum technical support<br />

customers.<br />

In the recommendation of the general risks of outsourcing's namely: loss control<br />

service; the viability of the service provider; the quality of services; issues of trust in<br />

partner; the performance of applications and services; lack of experience in the field;<br />

hidden costs and unreliable; customizations and enhancements limited; transfer of<br />

knowledge; shared environments; elements of legacy.<br />

When all the risks of outsourcing are taken into consideration, there is at least one to<br />

which you take the decision to use a third party. Anyway, there are a number of<br />

proofs for these categories of risks occur often and are satisfactory to the purchaser<br />

and seller prospects.<br />

Outsourcing was a tool with the help of which multinational companies tried to reduce<br />

overhead costs. However, even for the multinationals there were some problems<br />

managing offshore projects. Remoteness, lack of openness and transparency in<br />

relations between a customer and service provider, cultural barriers could bring to<br />

nothing all potential savings and benefits.<br />

Another proposal to remove threats and vulnerabilities is cloud computing. The<br />

comparison between the outsourcing and cloud computing is presented in the<br />

following figure, where the arrows show the information flow.<br />

Figure 1. Comparison between outsourcing and cloud computing<br />

Cloud computing can be defined as a new style of computing in which dynamically<br />

scalable and often virtualized resources are provided as a services over the Internet.<br />

Cloud computing has become a significant technology trend, and many experts expect

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!