Skip to main content

说一下宏观常识

发信人: guvest (我爱你老婆Anna), 信区: Stock
标  题: [bssd]说一下宏观常识
发信站: BBS 未名空间站 (Wed Sep 12 13:05:59 2018, 美东)

第一,世界上只有美国和俄国有战略核均势。五常里其他国家,以及印度这种。均不被
允许拥有和美俄平齐的核均势。
这是个百年尺度的问题。
第二,美国,俄国,中国,在绝大多数自然资源项目里,都排名前列。是世界自然资源
最丰富的第一档次国家。
其他国家远远落后。这是个千年尺度的问题。
第三,床铺炒得压根不是什么关税。他炒的是波动。通过和其他各国的关系振荡取利。
这就好比你做股票,
他做option。然后你被拉过去和他option的游戏。中国完全没有ready。这是个10年尺
度的问题。
第四,FBI会逐步和拿政府资金(NIH,NSF,。。。)的各研究机构谈话,商议知识产
权,研究人员和外国联系问题。
这是个5年尺度的问题。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...