Skip to main content

大型财经纪录片【激荡.1978-2008】

第一财经年度巨献——大型财经电视纪录片《激荡。1978-2008》

《激荡。1978-2008》以编年体的形式,重述了中国改革开放1978年到2008年的重大经济事件:1979年看袁庚如何种好蛇口这块改革开放的试验田;1984年173;看王石们如何踏准步点,跨入中国的"公司元年";1990年看中国如何启动证券交易,发展资本市场;1999年看中国如何融入世界,走向新千年;2003年看中国房地产也173;如何一飞冲天,面临考验;直至2008年看中国人民如何跨越新险阻,以回溯与展望进入下一个激荡三十年。为了更好地体现口述历史的节目价值观,精准地还原中国经济史的细节173;,《激荡。1978-2008》采访了诸如参与国家经济政策制定的著名经济学家吴敬琏、1978年随邓小平访日记录开放进程的摄影记者钱嗣杰、质量万里行的组织者、创办者173;,原《经济日报》总编艾丰、著名美籍华人摄影家刘香成、曾与老记者穆青共同采访撰写《风帆起珠江》的"民间智库"王志纲、以连书4篇内参扳倒禹作敏的原《法制日报》天津站173;站长刘林山等"见证者",他们口述亲历的经济事件,以媒体人与学者特有的冷静、客观观察历史真相,并在采访中首次披露大量细节始末,给予观众重现历史的真实感,完成改革开173;放30年中国经济史的宏伟拼图。

  "薪尽火传",第一财经希望通过《激荡。1978-2008》完成中国财经媒体人对改革开放30年的见证。更希望通过管中窥豹,发现更多中国改革开放30年历史中的兴衰与173;荣辱,用"客观、生动、深思、宽容"纪录下一个三十年。


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...