Skip to main content

标 题: Re: 讲讲中崩的原理和含义

发信人: fireroad (地狱之路), 信区: Stock
标  题: Re: 讲讲中崩的原理和含义
发信站: BBS 未名空间站 (Thu Jan  7 11:11:50 2016, 美东)

捣乱的很多。那就讲讲主要的吧。过去二十来年世界经济发展的主线有两个,副线有一
个。
主线是全球化和信贷扩张。副线是互联网革命。
全球化本质上是生产要素全球配置,总需求不能单独因此获得大幅提高。互联网革命长
远来看意义深远。但到现在为止的主要作用还限于提升各行各业效率。
那么推动需求大幅增加,进而创造所谓“经济增长”的只剩下信贷扩张。这和美联储实
行的宽松货币的货币政策有关。所以你才看到从纽约到莫斯科,从圣保罗到巴塞罗那,
全世界房价大涨。由此可见,美联储的政策是阀门。美国实行资本主义二百多年,基本
各种情况都遇到过,货币宽松政策之后是什么?中国人都凭直觉认为是通货膨胀呗?错
了。
中国政府因为集权的原因,把这个美元信贷带来的好处归因于自己的英明领导,或称“
中国模式”,并十倍百倍放大之。

所以才会有中崩,或称不作死就不会死。中崩的含义是以中国本土资产泡沫破灭为代表
的全球广大华人对资产投资(房地产)的盲目迷信的崩溃。当然,真正崩溃的绝不只是
中国资产。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...