Skip to main content

标 题: 哥做个好事,科普一下马云为什么能成功

发信人: nickmit (上海老姜), 信区: Military
标  题: 哥做个好事,科普一下马云为什么能成功
发信站: BBS 未名空间站 (Sat Sep 20 17:36:42 2014, 美东)

版上一堆人佩服马云,另一堆人不佩服。其实佩服不佩服无所谓,首先要弄清为啥他会
成功,不然自我膨胀最后一败涂地。

马云的起家,首先是用免费打败易趣。免费没问题,大家都喜欢,关键怎么赚钱。这个
阶段,说实话他自己也没整明白,无非就是靠商家广告。

运气好了挡不住,国内的互联网建设蓬勃发展,物流行业也是欣欣向荣,这两点都促进
了电商的发展。好事他妈还生了个双胞胎,支付宝这种俨然就是一个小银行的东西,共
匪居然还不剿灭,于是马云开始印堂飘红了。低价竞争、对规则的模糊利用,可以说马
云是深度了解国情,也是他成功的最重要因素。

与其说马云走对了方向,不如说撞了大运。谁也没想到房地产会炒这么高(废话,知道
能炒这么高,早不做什么淘宝了,大家都去买房子了)。房地产的兴盛,直接导致制造
业产能过剩的同时,营销成本急剧增加,一个地段稍微好点的门店动则几万的房租,一
般小厂小业主是无法承受的,更何况他们的利润本来就极低。网店还有一个极大的好处
,可以逃税,这点也是至关重要。

于是一个配套的商业模型出现了:微小制造业 -> 就业困难的小店主 -> 电商平台 ->
极低的物流成本 -> 收入微薄的消费者。淘宝由于占位比较早,垄断了这个产业链中的
一个重要环节,终于走向成功。

概括一下成功的要素:
1、接地气的经营策略
2、过剩的制造业
3、飞涨的房地产
4、大量低收入人群
5、政策监管的缺失

各位将军,您打算 C-c C-v 一下 Jack Ma 吗?
--http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...