Skip to main content

标 题: YouTube将超越脸书成美第二大流量网站,脸书还要跌

发信人: laodaidai (老呆), 信区: Stock
标  题: YouTube将超越脸书成美第二大流量网站,脸书还要跌
发信站: BBS 未名空间站 (Sat Aug 11 11:14:09 2018, 美东)

这是一个看空的帖子。
之前脸书已经创纪录单日跌了上千亿美元了,看来这暴跌不是偶然时间,不说其他问题。
说说访问量。最新研究显示,脸书网络流量在过去两年中下降近一半,而YouTube则在
攀升。根据现在的情况,脸书可能马上要被YouTube超越。
在经济界有一个奇怪的老三规律,就是老大和老二打架,死的一般是老三。
这个规律很诡异,目前没法解释。
现在脸书要是成为老三,这估计也很危险,最重要的是趋势变了,人家的访问量是网上
走,你是往下走,印证了一句话,人心散了队伍不好带了。
所以只要流量往下走,就算脸书虽然现在还是第二,都不如YouTube有发展前景。
当然,我这里不分析YouTube的未来会怎么样。
过去几年,美国访问量最大的五家网站依次是谷歌、脸书、YouTube、雅虎和亚马逊。
狗的访问量一直这么厉害

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...