Skip to main content

穷得只剩钱的美国华人


某些华人收入是不少,但是政治,移民,司法,媒体,教育,职场等其他方面权益全线
败退。穷得只剩钱了。可惜如果没有其他权力,少部分华人暂时拥有的钱也是一堆废纸。

我们来客观分析一下华人的生存现状:
--------------------
绿卡移民:情况有多糟糕任何在美华人都有切身体会。实质还是Chinese Exclusion
Act的延续。换汤不换药。

司法:执法部门热衷抓华人间谍,犯罪份子喜欢华人做目标,警察对华人受害案件当自
杀结案。 基本就是favorite victim。最好捏的软柿子。

教育:后代被AA严重排挤,自己不抗争,反而却互相恶心竞争,俗不可耐的扎堆学钢琴
。 所谓的高学历阶层嘲笑开中餐馆的杀价恶性竞争,却不知道自己逼娃娃学钢琴也是
一样的行为(剥夺娃娃自由快乐时间==杀价)。

媒体:公开丑话歧视侮辱华人。电影电视丑化华人形象,媒体公开开杀中国人的玩笑。
只有负面新闻,没有任何客观报道的文章。

职业发展:职业天花板不用说了。公司里还被烙印打压。兢兢业业,战战兢兢给烙印打
工。一不小心就被开。
--------------------
华人不自知,还在天天沉醉于捞钱,比富,内斗。 三番版庸俗的贫困县讨论就是典型。

最后觉得:可怜之人必有可恨之处。 Chinese in USA deserve it!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...