Skip to main content

国内富人都是如何产生的

http://gengwg.blogspot.com/发信人: Yardbird (newbie), 信区: Military
标  题: 国内富人都是如何产生的?zt
发信站: BBS 未名空间站 (Sat Jan  3 19:14:19 2015, 美东)



第1波
1980年代,当时暴发户主要是“倒爷”,靠特权批出内部低价商品,转手到市场高价卖
出,小到肥皂,中到电视,大到钢铁汽车。其巅峰是1989年牟其中从俄罗斯倒来一架图
154飞机,转手卖给了四川航空,这让他成为中国最大的“倒爷”,原因在于信息的不
对称,因为他知道俄罗斯飞机卖不出去,却急需轻工业产品。据他后来自称从中赚了
8000万到一亿元。

第2波
1990年代,主要靠四种模式:
1、民营制造业,比如广东顺德的美的、科龙、格兰仕等,始创是乡镇企业,后转为私
企;
2、海南房地产泡沫使著名的“私奔帝”投资家王功权们淘得第一桶金;
3、股市坐庄暴富。1990年A股开启后,坐庄操纵盛行,大批亿万富豪涌现,以德隆系的
唐氏兄弟最著名,在21世纪初股市低迷中,大多数被打回原形,唐氏兄弟也破产入狱;
4、走私。如厦门远华案的赖昌星,规模上百亿,将大批高官拖下水,最后逃到加拿大
也难躲牢狱之灾。那时,10亿元资产者算是大佬了。有极少数近百亿级的,都是昙花一
现,被大浪拍在了岸上。

第3波
2000 年至今。国内百亿级、千亿级富豪层出不穷,这来自于三个历史性的机遇。
一是“世界工厂”。国际资本与中国廉价劳动力结合,西方市场向中国打开,很多民营
制造业老板抓住这个机遇,由此身家十倍增长,成为亿万富豪;
二是“房地产市场化和矿产私有化”。地方政府和房地产商创造了一种敛财模式,把原
本属于全民的土地,以招拍挂制度将价格推到了中国普通居民承受力的极限,这个超级
泡沫背后的财富再分配造就了一个人类空前的富豪集群。如今中国亿万富豪中近一半是
房产商,身家最高的如王健林如今已经超过1000亿元;
三是“人民币升值引发国际热钱投机中国”,助推了2007年的超级A股大泡沫顶峰、
2011年创业板造富顶峰、2013年楼市顶峰。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...