Skip to main content

标 题: 中日对比来说说中国还需要多少年才能崛起

http://gengwg.blogspot.com/发信人: mitbbs2715 (好吃不懒做), 信区: Military2
标  题: 中日对比来说说中国还需要多少年才能崛起
发信站: BBS 未名空间站 (Fri Apr 18 18:05:34 2014, 美东)

所有世界强国都是山寨起家的,亚洲强国,日本也不例外。 有些人从感觉上认为中国
山寨时间也太长了点,但这是他们自己的感性认识, 和实际的情况有很大差异。

日本从1820年开始正式进入全面工业化的时代,而中国起码到1950年才开始。日本经过
100年,到了1830年才能开始对外输出工业品,而且还不如中国规模大。到1980年才有
第一个流行全球的创新产品。

韩国和台湾都是在日据时期就开始工业化,也就是1910-1945年和1895-1945年。比中国
早多了。中国
最早也是推广到二战前1930年代的伪满,但那是战争时期,日本人对中国教化基本没有
发生,工业化水平也低。


上图可以看出日本的著名公司都是山寨起家的,几十年如一日的山寨,才有几个创新公
司出现。
比较来看现在大陆还处在粗放型山寨阶段,也就是日本1930年时期,这时候因为对老市
场霸主地位的侵蚀,和世界上矛盾是最深最广的阶段。处在需要走出去抢市场抢原料,
但是不被人待见的时期。日本就是在这时候一步步走上军国主义道路。

战后日本山寨水平更上一个台阶,开始山寨当时的标志着大规模精密制造水平的高端民
用产品。文化上直到到70年之前还在赤裸裸山寨美国。这时候日本仍然是不受待见的劣
等民族。直到80年代日本索尼的walkman才和日本漫画一起开始让全球对日本人有改观
。现在日本的PS,游戏,动漫已经入侵到世界的每一个角落,日本人成为全世界最受欢
迎的民族之一。

从这里可以看到,中国距离文化创新还有很长的路要走,首先是商品上要创新,然后才
谈得上文化创新。

--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec