Skip to main content

标 题: 美国之前曾消灭过一个黄种人文明,不可小视。

发信人: zhetian (叶凡), 信区: Military
标  题: 美国之前曾消灭过一个黄种人文明,不可小视。
发信站: BBS 未名空间站 (Sun May  5 16:49:15 2019, 美东)

以前消灭了北美土著印第安人,降伏了黄种日本人。现在又要跨海消灭同为黄种人的汉
族人。

5月3日,美国国务院政策规划主任Kiron Skinner说到:苏联是西方大家庭一员,中国
不是白人国家,和苏联的冷战是西方大家庭内部争吵,但(和中国的争端)是和一个不
同文明的,有完全不同的意识形态。美国以前从未经历过这种情况。美国以前也没有遇
到过一个像中国这样的经济竞争对手。苏联是一个拥有核武器和红军但经济落后的国家
。在中国,我们有一个经济上的竞争对手,一个意识形态上的竞争者,一个以我们许多
人在几十年前没有预料到的方法真正寻求全球势力范围的国家。而且我认为,非常令人
震惊的一点是,这是我们第一次和一个非白人列强竞争。(When we think about the
Soviet Union in that competition [the Cold War], in a way, it was a fight
within the Western family.This is a fight with a really different
civilization, and a different ideology, and the United States hasn't had
that before. Nor has it had an economic competitor the way that we have. The
Soviet Union was a country with nuclear weapons and the Red Army but a
backwards economy.  In China we have an economic competitor, we have an
ideological competitor, one that really does seek a kind of global reach
that many of us didn't expect a couple of decades ago. And I think it's also
striking that it's the first time that we will have a great power
competitor that is not Caucasian。)
--

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...