search
HomeDatabaseMysql Tutorial金融时报:开放源的成本魅力_MySQL

金融时报:开放源的成本魅力_MySQL

Jun 01, 2016 pm 02:11 PM
linuxproductuseopencostprogramsoftwarecharm

  开放源软件可以替代传统的专有程序,节省硬件、使用权和运行开支。但也有分析师认为,更换软件的“转换成本”有可能高于省下来的那笔钱。

  英国《金融时报》记者杰弗里·耐恩(Geoffrey Nairn)报道

  听听埃米·尼尔斯巴赫(Amy Niersbach)谈芝加哥市政府采用开放源软件,你就不难理 解,为什么开放源的流行已成为近年来最重大的技术趋势之一。

  这位芝加哥市平台架构师表示:“我们在硬件、使用权和运行成本方面节省了一大笔钱,而性能也不错。”

  芝加哥市政府正转而使用开放源(这里指红帽子Linux操作系统),以替代昂贵的专有程序(proprietary program),这样可以把节省的资金用在其它方面。

  注意到开放源益处的不仅仅是这些现金匮乏的公共部门。

  在商业领域,信息主管们越来越在意专有软件价格的上涨、不必要的功能,以及好像被设置会落伍的弱点,那使他们必须按照供应商规定的时间表进行升级。

  因此,许多机构正更为密切地关注开放源软件,将其作为替代传统专有程序的选择,这种选择更为便宜,且不受限制。

  但他们发现,从商业角度来看,开放源的使用情况并不总是那么清楚。开放源最吸引人之处是无须支付使用权费用,但更换软件的“转换成本”有可能高于节省下来的这笔钱。

  分析师警告称,实际上,那些指望开放源会大量削减IT预算的机构可能会感到失望。

  咨询公司Quocirca的分析师克莱夫#朗博顿(Clive Longbottom)表示:“使用开放源看似节省了大笔金钱,但这只是在初期授权费用方面。”

  开始使用开放源软件后,其它IT费用,如人事、技术支持和维护费用,均不会消失。由于企业内部没有开放源专家,在项目出错或不得不聘请咨询顾问时,这些费用实际上还会增加。

  因此,许多机构在采用开放源的问题上非常非常谨慎。一般来说,他们首先会在一些不重要的应用程序中使用Linux软件,同时继续维持在专有系统运行主流的应用软件。

  虽然推崇Linux的人士可能不满,但专家表示,这种并存的方式很有道理。

  “过去,人们看待选择操作系统的方式,就好像这是一场宗教战争。”最著名的开放源数据库软件供应商MySQL营销副总裁扎克#尤劳克(Zack Urlocker)这样说。

  “但现在我们看到操作系统能够并存,这种并存的趋势对开放源非常重要。”

  芝加哥市政府崇尚并存,其实是没有太多的选择。

  芝加哥使用的一些应用程序还没有被认定为能与Linux系统兼容,因此它不得不继续在专有的Sun Solaris系统上运行这些程序。不过,芝加哥有望在18个月之内在Linux系统上运行其余的应用程序。

  芝加哥市政府首个开放源项目是一个车辆许可证申请程序,此前这个程序在一个老化的大型主机上运行。

  尼尔斯巴赫女士估计,在这个例子中,选择Linux代替Solaris仅在硬件成本上就节省了15万多美元。现在,这项应用程序在惠普(HP)提供的廉价英特尔技术服务器上运行,不再使用昂贵的太阳微系统公司的服务器。除了更便宜以外,惠普服务器功能也更为强大,因此需要的数量就更少。这相当于每台服务器在软件使用权方面节了一大笔钱。

  虽然Linux常常在新闻报道占据头条位置,但是开放源不仅仅意味着操作系统。还有一些其它类型开放源替代程序,包括应用程序服务器(Jboss),数据库(mySQL)和网络服务器(Apache)。

  这些程序共同构成了“堆栈(Stack)”,即操作系统之上,但应用软件之下的程序集。

  许多专家认为开放源软件现在已经相当成熟和稳定,可以考虑在堆栈上使用。红帽子工程部门执行副总裁保罗#科米尔(Paul Cormier)说:“我看未来几年内整个堆栈都将变成开放源。”

  最近,转而支持开放源的惠普公司,在推出主流专有产品的同时,也支持诸如Jboss或mySQL等开放源产品,并提供24小时支持。

  惠普开放源营销部门主管埃弗雷恩·洛维拉(Efrain Rovira)表示,“吸引企业的不仅仅是较低的成本,同时还有质量。”

  处于领先地位的数据库供应商甲骨文(Oracle)和专营应用程序服务器BEA系统(BEA Systems)等公司则辩称,那些替代其专有产品的开放源产品太不成熟,不值得认真考虑,这并不令人感到意外。对产品进行评估的机构也倾向于这一观点。

  当前开放源的开发着眼于应用软件。至少有两种开放源产品可以替代微软办公软件(Microsoft Office)。这篇文章就是用其中之一602 PC Suite写成的。

  开放源产品亦在客户关系管理软件(SugarCRM)和库存管理软件(OpenMFG)方面与SAP和希柏(Siebel)等巨头形成竞争。

  几乎没有人认为这些尚不够成熟的产品将很快对主流专有产品构成真正的挑战。但当初谈到Linux时,他们也说过同样的话。

    注:更多内容请登陆FT中文网-FTChinese.com  

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
MySQL String Types: Storage, Performance, and Best PracticesMySQL String Types: Storage, Performance, and Best PracticesMay 10, 2025 am 12:02 AM

MySQLstringtypesimpactstorageandperformanceasfollows:1)CHARisfixed-length,alwaysusingthesamestoragespace,whichcanbefasterbutlessspace-efficient.2)VARCHARisvariable-length,morespace-efficientbutpotentiallyslower.3)TEXTisforlargetext,storedoutsiderows,

Understanding MySQL String Types: VARCHAR, TEXT, CHAR, and MoreUnderstanding MySQL String Types: VARCHAR, TEXT, CHAR, and MoreMay 10, 2025 am 12:02 AM

MySQLstringtypesincludeVARCHAR,TEXT,CHAR,ENUM,andSET.1)VARCHARisversatileforvariable-lengthstringsuptoaspecifiedlimit.2)TEXTisidealforlargetextstoragewithoutadefinedlength.3)CHARisfixed-length,suitableforconsistentdatalikecodes.4)ENUMenforcesdatainte

What are the String Data Types in MySQL?What are the String Data Types in MySQL?May 10, 2025 am 12:01 AM

MySQLoffersvariousstringdatatypes:1)CHARforfixed-lengthstrings,2)VARCHARforvariable-lengthtext,3)BINARYandVARBINARYforbinarydata,4)BLOBandTEXTforlargedata,and5)ENUMandSETforcontrolledinput.Eachtypehasspecificusesandperformancecharacteristics,sochoose

How to Grant Permissions to New MySQL UsersHow to Grant Permissions to New MySQL UsersMay 09, 2025 am 12:16 AM

TograntpermissionstonewMySQLusers,followthesesteps:1)AccessMySQLasauserwithsufficientprivileges,2)CreateanewuserwiththeCREATEUSERcommand,3)UsetheGRANTcommandtospecifypermissionslikeSELECT,INSERT,UPDATE,orALLPRIVILEGESonspecificdatabasesortables,and4)

How to Add Users in MySQL: A Step-by-Step GuideHow to Add Users in MySQL: A Step-by-Step GuideMay 09, 2025 am 12:14 AM

ToaddusersinMySQLeffectivelyandsecurely,followthesesteps:1)UsetheCREATEUSERstatementtoaddanewuser,specifyingthehostandastrongpassword.2)GrantnecessaryprivilegesusingtheGRANTstatement,adheringtotheprincipleofleastprivilege.3)Implementsecuritymeasuresl

MySQL: Adding a new user with complex permissionsMySQL: Adding a new user with complex permissionsMay 09, 2025 am 12:09 AM

ToaddanewuserwithcomplexpermissionsinMySQL,followthesesteps:1)CreatetheuserwithCREATEUSER'newuser'@'localhost'IDENTIFIEDBY'password';.2)Grantreadaccesstoalltablesin'mydatabase'withGRANTSELECTONmydatabase.TO'newuser'@'localhost';.3)Grantwriteaccessto'

MySQL: String Data Types and CollationsMySQL: String Data Types and CollationsMay 09, 2025 am 12:08 AM

The string data types in MySQL include CHAR, VARCHAR, BINARY, VARBINARY, BLOB, and TEXT. The collations determine the comparison and sorting of strings. 1.CHAR is suitable for fixed-length strings, VARCHAR is suitable for variable-length strings. 2.BINARY and VARBINARY are used for binary data, and BLOB and TEXT are used for large object data. 3. Sorting rules such as utf8mb4_unicode_ci ignores upper and lower case and is suitable for user names; utf8mb4_bin is case sensitive and is suitable for fields that require precise comparison.

MySQL: What length should I use for VARCHARs?MySQL: What length should I use for VARCHARs?May 09, 2025 am 12:06 AM

The best MySQLVARCHAR column length selection should be based on data analysis, consider future growth, evaluate performance impacts, and character set requirements. 1) Analyze the data to determine typical lengths; 2) Reserve future expansion space; 3) Pay attention to the impact of large lengths on performance; 4) Consider the impact of character sets on storage. Through these steps, the efficiency and scalability of the database can be optimized.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software