Skip to main content

标  题: 说说中崩

Make a Donation
FatWallet Coupons and Deals发信人: skybluewei (weilan), 信区: Stock
标  题: 说说中崩
发信站: BBS 未名空间站 (Tue Jan  5 08:02:56 2016, 美东)

版上总是吵个不休,谈谈我的看法
1.中国的发展几年前就进入瓶颈,这是外向型经济的通病,贸易顺差导致本币外升内贬
,劳动力成本不断提高,出口竞争力慢慢下降。
2.中国近几年的发展是靠国家投资拉动的,造房修路,高铁等等,短期避免了衰退,但
长期是不可持续的。
3.现在中国的发展慢慢要反转了,注意,这个过程不是一两天的事儿,也就是不会崩溃
,但长期停滞,不是不可能的,或者说是很可能的。
4.中国的制造能力和效率目前无人能及,但不妨碍反转的过程。罗马不是一天建成的,
同时也不会是一天就能拆除的。这个过程体现在两方面,一是能转移的慢慢或加快转移
到越南等国,二是不能转移的就中国继续造。中国花了30年时间成为世界工厂,但到现
在也不能替代韩国制造和日本制造。
5.中国的经济结构是多样化的,在这个反转过程中,有人收益,有人受损,比如,今年
原油暴跌,炼油厂高兴了,但产油厂活不下去了。同样,失业的做袜子的打工妹也成不
了BAT的码工。但总体来讲产业升级任重道远。
6.中国的无法无天的体制是制约产业升级的主要原因。
7.中国会有亮点公司,但对整体经济转型和提升作用有限。

中国进入平台期或衰退的几率远大于继续高成长的几率。

8.美国公司短期会受影响,但随着其他国家慢慢替代中国,长期来讲影响有限。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...