Skip to main content

无人驾驶很有可能在中国先登上市场

发信人: sanshi29 (坨坨), 信区: Stock
标  题: 无人驾驶很有可能在中国先登上市场
发信站: BBS 未名空间站 (Tue Sep 20 01:39:40 2016, 美东)

中国现在有不少公司从硅谷挖了不少人做无人驾驶

而且中国政府相对于无人驾驶更加宽容,政策法规更加偏向于新科技的发展

所以搞不好上海北京等地马上会有滴滴的无人驾驶出租车
大家还记得吗,几个月前,苹果刚向滴滴投资10亿美元,苹果不像fb或google,很少大
手笔投资
苹果肯定是知道什么了。不过苹果占滴滴的股份并不多,我觉得苹果应该加快投资中国
的it公司

如果是这样的话,uber和tsla将完败,而且更有可能是中国it领域超越美国的开始,为
什么?要知道阿里巴巴占有滴滴10%的股份,如果阿里巴巴以后通过滴滴无人驾驶来发
货,阿里巴巴和滴滴的市值还得翻几倍。不仅uber和tsla完败,amzn也将跟着崩盘,阿
里巴巴现在应该讲触角伸向美国,和amzn对干,不就是烧钱吗?阿里比amzn有钱多了。
阿里现在烧的钱以后将加倍取回

另外通过无人驾驶,很多客户的出行数据将以几何级的速度被收集,fb也将遭到很大的
挑战,毕竟social network需要movement来扩展

美国如果还想保持it的领先地位,google必须再进一步,uber要跟google和amzn合作,
共同对抗滴滴和阿里巴巴,最关键的是政府的态度,政府一定要开明,大力鼓舞无人驾
驶,尽快完善法规制度

最终,无人驾驶还会增加区域城市的人口高密度化,以后硅谷,上海一类的地方人口将
越来越多,买房永远不亏

行了,该说的我都说了,未来10甚至20年的发财机会我都给你指明了,别再错过了:

无人驾驶,大数据,移动化的社交网络,顶尖城市人口高密度化

这些都将是未来投资的热点,至于具体投资方式和投资股票,请私下联系

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...