Skip to main content

马云:天变了


马云:天变了
2013.01.25


世界在变,天已经变了。


传统零售行业与互联网的竞争,说难听点,就像在机枪面前,太极拳、少林拳是没有区
别的,一枪把你崩了。今天不是来跟大家危言耸听,大家都是朋友,互联网对你的摧毁
是非常之快的。

不是我厉害,是互联网厉害。如果你增加两万名会员,你可能要买100亩地、建商场,
你要建巨大的仓库,我只要一台电脑就够了。所以我们的成本会越来越低,而效益会越
来越强。

“双十一”那天,191亿销售额是一个奇迹,1天1亿笔交易是个奇迹,但最大的奇迹是1
天7800万个包裹居然给运出去了。

我再告诉大家,有些数据没有对外公布,今年9月29日,海尔在我们这里卖出了12000台
洗衣机,一天拉断了海尔的几条流水线,而这只是我们“聚划算”做的一个小项目而已
。可以想见,今后的商场会出现什么结局?

我可以保证二三十年后,我们的孩子是不可能拉着手去逛商场的,不可能!我都不去!
但是他们会去看电影、吃饭、看戏、交流,这是所谓的体验,绝不是买件衣服试一试

中国制造业要发生巨大的变化。今天你还在想“Made in China”,了,因为那个时代
已经过去了,以后叫“Made in Internet”,所有的零部件、采购都在互联网上完成。
刚刚我们的汽车节里,有两个小伙子造了一辆跑车,除了壳是模仿法拉利以外,里面所
有的零部件都是在淘宝上采购的,这辆车破100多迈一点问题都没有,他们还上车展了
,最后以140万人民币卖掉了,叫“Made in Taobao”。

我们今年做到1万亿,3-5年内超越沃尔玛不再是一个奇迹了。对于明年我们公司交易额
有多少,我半点兴趣都没有,因为这已经是保证的事情了。

很多人输就输在,对于新兴事物第一看不见,第二看不起,第三看不懂,第四来不及。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...