Skip to main content

川普加关税是正确之举

发信人: wayofflying (小破熊), 信区: Military
标  题: Re: 川普加关税是正确之举
发信站: BBS 未名空间站 (Mon May  6 15:09:07 2019, 美东)

1,美国正处在机器人与AI革命的前夜。大量的工业机器人和农业机器人正在逐渐的取
代发展中国家尤其是中国的中低端产业工人。因此从长远上看,中断贸易反倒有利于加
速美国的科技革命,尽快进入到人工智能时代,拉开与中国的技术差距。美国制造在大
批零人权机器人的支撑下,又会开始复兴。

2,中美贸易中断以后,短期内美国的确会有通货膨胀,但是别忘了,美国本来就是一
个非常富有的国家,有巨大的旧货市场可以抵消通货膨胀的短期影响。就是说美国过去
20年全球化过程中给自己添置的大件儿足够多了。即使只买旧货都足够满足生活需求。
所以通货膨胀不会那么严重。

3,美国是中国获取成熟的工业技术的主要来源。一旦中断贸易,这个来源将彻底被切
断,对中共而言是灾难性的。请允许我强调一下“成熟的”这三个字。成熟的工业技术
必须同时能满足高性能、高可靠性、低能耗、低成本和没有假货的要求。这样的技术只
有美国这样的具备成熟的市场经济体制的西方国家能够做的出来。中国因为没有成熟的
市场经济体制,做出来的东西往往是质次、价低、不可靠还假货遍地的代名词。很快两
国的工业技术差距又会重新拉大到中国改革开放前。



结论就是,擅长科技创新的美国会愈加指望和推进科技创新;而擅长低人权优势的中国
会愈加指望和推进低人权优势。结果前者最终迎来下一次科技革命,而后者迎来下一次
六四和朝代更替。这是文明发展的一般规律

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...