Red Hat 계정으로 회원 프로필, 기본 설정 및 고객 상태에 따라 다음의 서비스에 액세스할 수 있습니다.
아직 등록하지 않으셨습니까? 등록해야 하는 이유:
- 한 곳에서 기술 자료 문서를 탐색하고, 지원 사례와 서브스크립션을 관리하고, 업데이트를 다운로드 할 수 있습니다.
- 조직 내의 사용자를 보고, 계정 정보, 기본 설정 및 권한을 편집할 수 있습니다.
- Red Hat 자격증을 관리하고 시험 내역을 조회하며 자격증 관련 로고 및 문서를 다운로드할 수 있습니다.
Red Hat 계정으로 회원 프로필, 기본 설정 및 자신의 고객 상태에 따른 기타 서비스에 액세스할 수 있습니다.
보안을 위해, 공용 컴퓨터 사용 중에 Red Hat 서비스 이용이 끝난 경우 로그아웃하는 것을 잊지 마십시오.로그아웃
Have you ever experienced buyer’s remorse? Maybe you bought something significant on a whim like a new car or the latest cool gadget, without thinking it completely through, and a few days or weeks later you wonder why you now own something that doesn’t really deliver what you were expecting.
These same experiences can occur in the service provider and telecommunications industries. There’s a lot of hype around the latest technologies saving money, increasing revenues, and expanding wallet share with customers. Meanwhile, are service providers really getting the business benefits they expect from these technologies? As consumers, most of us don’t even think much about these challenges. Instead, we’re focused on finding improvements for our lives and economic well-being by searching for choice both in the goods and services that we consume, and in how we consume them.
While the industry is developing all of these innovative solutions, service providers are looking to open source to give them more vendor choices and enable them to be more agile. However, if we look at the overall hardware and software stack used to deliver our communications and content services, we find that many aspects are not as "open" as one would expect. And this is not a simple challenge that can be solved at once. From the physical hardware--including COTS platforms--through infrastructure software, virtual/containerized network elements, orchestration, automation, data management, and the operational/business systems layers, every element has varying degrees of proprietary implementations and "value-added" modifications or extensions.
So, what does this mean for the service providers, or for that matter any business that selects and deploys proprietary or "modified" technologies, be they software or hardware? In essence, often they are now on their own to support that technology, or they have placed a sizable portion of their business into the hands of a single vendor. These types of choices inevitably add sizable long-term costs to a service providers’ overall business, that can be categorized in many ways, such as:
- Time to revenue: You are spending more time and resources building and merging/integrating which delays bringing your services to market.
- Security: You are now responsible for implementing security patches, which can increase risk to your business.
- Development: More time is spent developing/patching software or hardware systems instead of building new applications and services.
- Maintenance: There’s added responsibility for maintenance updates and release lifecycle management.
- Operational: Increased levels of complexity can take longer to debug issues and make it necessary to retest each update for quality and reliability.
- Downtime: Limited integration testing for interoperability and performance can mean higher risks of potential failures and/or outages.
- Migration: The more patches and/or updates made away from the "mainstream" version, the larger the costs can be to transition back to a supportable version.
The real question at hand is "what business are you really in?" Service providers are striving to deliver innovative new services and applications to their consumer and business customers. However, they often find themselves spending more and more of their resources and time than is desired on development, maintenance, security remediation, testing, validation, and integration efforts.
With these thoughts in mind, there are three key risks worth careful consideration that affect your business when choosing to deploy proprietary technologies:
- Hard lock-in to the support and development pace of a particular vendor
- Creating chaos in your environment if a customized feature or solution does not interact the way you would expect
- Increased technical debt as it takes more effort to maintain and update the proprietary feature than it does to develop it
So back to that buyer’s remorse…. We often see our customers go through the same process: They tinker with customizing new open source projects and proprietary technologies for an initial proof of concept, then realize that it's far too much effort and not their primary business to customize and integrate everything into their own environments, business processes, and tools.
For the success of the next generation of the internet, we need to work together as partners and contribute our ideas freely with an open mindset to accelerate the pace of innovation across all aspects of the ecosystem.
About the authors
Ian is Chief Technologist, Global Service Provider Business at Red Hat, the world’s leading provider of open source technologies. Ian brings more than 30 years of engineering, business, and telecommunications industry leadership to Red Hat. Acting as a catalyst and trusted advisor, Ian brings together a wealth of industry and open source community insight to help our customers flourish in the digital economy.
Rob Wilmoth is a Chief Architect on the Red Hat Americas Service Provider team. He works closely with customers and partners assisting with challenges ranging from regulatory compliance and general IT, to changing their perspectives and approaches towards business problems in the network and content delivery spaces.