Skip to main content

MCP還是在繼續燒錢。還可燒一段時間,錢燒光了怎麽辦?


錢快要燒光時,它就用老辦法:發新股籌錢。這個老辦法讓它避免破產。當然,不斷發新股籌錢,讓股本不斷稀釋,使老的持股人 的不斷賠錢,賠得很慘,但這總比Bankrupt歸零要好一點。我認為MCP破產的可能性很小,因為MCP的最大投資公司MOLYMET不太會放棄 MCP,MOLYMET是金屬行業的老手,它投資了很多公司,都是賺錢的,只有MCP是虧錢,但它還是這樣撐著MCP,我想總有其道理。稀土是未來最重要 的資源,MCP畢竟是世界上除中國以外的最大稀土生產商。只要它能活下去,它就前途無量。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...