Skip to main content

标  题: Re: 就要在兰花市场说兰花不值钱-关于amazon

发信人: helloguys (Skywalker), 信区: Stock
标  题: Re: 就要在兰花市场说兰花不值钱-关于amazon
发信站: BBS 未名空间站 (Tue Nov 14 11:34:26 2017, 美东)

最近的财报,Amazon 零售业务其实是亏的。但 AWS 非常盈利,所以财报好看。

至于说竞争对手,现在哪个行业是一家独大,没有竞争对手的?

如果有做过研究,你会明白 AWS 真的很霸道。

价格,这个看上去没有什么技术成分的指标,其实非常有技术成分。

Amazon 出名抠门。它不买品牌设备,即使品牌设备“更可靠”。它的理念是:再可靠
的设备,也会出故障。要提高可靠性,就要靠冗余度。所以它宁愿多买便宜货,靠冗余
度来提高可靠性(11 个 9)。

这也反映在它的用人策略上。Amazon 又名“美国华为”(血汗工厂)。以工作压力大
著称。但由于名声在外,所以仍然乌央乌央的许多人争着去。所以它 PIP、炒人毫不手
软。因为有“冗余”。

另外,它降低价格的另一个重要手段是“自动化”。云服务可以很复杂的。但 AWS 由
于高度的自动化,降低了人工成本和出错率,从而降低成本。

零售业利薄如纸,而 Amazon 把“抠门”作风应用到利润较高的云业务,此消彼长,非
常可观。

另外 AWS 是先行者。业务种类非常齐全。Microsoft, IBM, GOOGLE 都在追。就算“追
上”,也只是多分一杯羹,没有太大影响。

因此,只要云业务的市场格局没有太大变化,Amazon 可以继续流氓下去。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...