Skip to main content

来说说亚马逊

优势:

规模和整体化优势其实并不大,bp photo这样的企业轻轻松松的把电子产品的一大块蛋
糕分走。

电子书和传统书的优势才是根本,但是有动摇,传统书的定价和amazon的partnership
,已经无法动摇,一旦未来以电子书为基础,这个局面就有可能被aaple,barns noble
,甚至无数盗版整垮。

未来增长:

amazon最大增在在于amazon web service,1部分是推销kindle这样的电子书模式,一
部分是推销mp3,movie的subscriber模式,还有一部分是cloud,为企业提供host
service。

我面试就是做第三部分的。

1.对手很多,没前途 2.subscriber服务的到处都是,就是redbox,我觉得也不见得不
方便 3.cloud就更难了,看看AAPL 北卡的data center规模,大资金砸起来,未来真不
好说。

TAX的影响和传统网购的增长

其实tax的影响并不是那么巨大,原因在于网购主要的target是高价位,小体积,容易
indentify的产品,事实上因为有别的商家也有tax benefit,tax的影响并不巨大。

dealsea上经常出现coconut juice的deal,甚至于几大包的麦片,其实这正是amazon增
长滞后的sign,谁会在乎5块钱的麦片优惠的那点?也许你说有人会,可是如果你是
amazon,你愿意卖2k块的手机还是5块钱的麦片?

综合一下,amazon能不能survive or 能不能站稳某个价位,就要看他的web service表
现和企业转型。网购的未来已经是price in了。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...