Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

Cloud computing involves the movement of content and applications from personal computers and private data centers to platforms floating somewhere in cyberspace. Users are tethered to their digital property only by an Internet connection; someone else provides and maintains the hardware and software supporting the services they use. Ideally, this shouldn’t give users anything to worry about. Reality, of course, is different. “We still have a long way to go to define what clouds can do and how users should interact with them,” says Vint Cerf, a father of the Internet who is now a vice president and chief Internet evangelist for Google.

Customers are typically concerned about the security and reliability of cloud providers’ operations. High-profile cases have reinforced those concerns–most notably when, earlier this year, the social bookmarking site Ma.gnolia.com irretrievably lost about half a terabyte of user data. “When there’s an outage, they end up in the New York Times,” James Staten, an analyst at Forrester Research, says of the cloud providers. “If there’s a significant security hole, they end up there too.”

Cloud users have the option of taking security into their own hands, says John Landwehr, director of security solutions and strategy at Adobe Systems. Some newer systems, including Adobe’s own LiveCycle Rights Management ES software, encrypt sensitive documents so engineering applications must “phone home” to check a user’s credentials before allowing a document to open. Such measures can head off some of the worries that arise when data and applications are stored remotely on virtual servers owned and managed by another company.

But there are other, potentially tougher problems–for example, the limitations of bandwidth and the architecture of today’s Internet. Customers who want to use clouds to process very large data sets sometimes find that the time it takes to send the data to the cloud provider can negate any time savings gained from drawing on its computational power. “Most of the challenge has to do with the fact that you’re accessing the cloud over the public Internet,” explains John Engates, CTO of the hosting company Rackspace. “Everybody thinks of the Internet as perfect, but it’s not … when you’re copying mountains of data across it, there are going to be failures.” And resending data that has been corrupted in transit makes transmission times even longer. Nick McKeown, director of the Clean Slate Design for the Internet project at Stanford, says that this problem will probably get worse before it gets better. “Everything will be moving around. Computation will move around, users will move around, data will move around,” he says. “Until now, the Internet’s solution to mobility has been a hack, retrofitted to an old and ossified architecture. This isn’t going to be good enough for cloud computing–we need more innovation in the architecture.”

Another issue is making cloud applications as reliable to use as locally running software, even in the face of a spotty network connection. Apple’s MobileMe cloud service, which stores and synchronizes data across multiple devices, got off to an embarrassing start last year when many users were left unable to access mail and synchronize data correctly. To avoid such problems, providers are turning to technologies such as Google Gears, Adobe AIR, and Curl, which allow cloud-based applications to run locally; some even allow them to run in the absence of a network connection. These tools give Web applications access to the storage and processing capabilities of the desktop, forming a bridge between the cloud and the user’s own computer.

0 comments about this story. Start the discussion »

Credits: James Gulliver Hancock, Tommy McCall

Tagged: Computing

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me