Skip to main content

“资本主义”是什么

“资本主义”首先是个误导的词汇,似乎这样的社会里人关心的只有“资本”,但鉴于
缺乏一个流行的词汇来代替它,暂且沿用。

所谓资本主义,说穿了,就是一种为人民服务的生产体系。事实是,在资本主义发展之
前,生产工具和技能基本都是父子相传师徒相授,所以这种生产体系能够养活的人口是
很有限的。物以稀为贵,难得的稀罕物过去只有贵族有机会享受,而奢侈品的制作者也
只是为这一小撮人服务。

资本主义带来的大规模生产,一下子使得过去产量很少的稀罕物变成了虽然可能质量有
所下降但是数量却极大增长,使得普通家庭也可以享受到以前只有贵族才有机会接触的
产品。

所以贵族特别反感资本主义,他们也有一些道理,以前的精致的手工产品如今变成略显
粗糙的没有特点的大路货。事实上这一点是可以随着技术不断进步而改进,但贵族在趣
味上就和这种服务大众的生产方式格格不入。

大规模生产意味着要招更多的工人,企业家就会用比农村高的多的收入来吸引农民来为
自己做工。这样一来,地主庄园主留不住人,自然就很不满。于是他们散布诸如“羊吃
人”之类的误导性言论。实际上农民是自愿进城做工的,那是个时代的企业家社会地位
不高,根本没有强迫别人的能力。

贵族加上地主,又在缺乏仔细考察的基础上,渲染夸大工人的生活多么“悲惨”。

这些人传播的谣言,就构成了民科马的一些思想的起源。马克思实际是没落贵族的代言
人。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...