Skip to main content

说说中美可能发生的

 发信人: cellcycle (vacoule), 信区: USANews
标  题: 就Biden上台后,说说中美可能发生的
发信站: BBS 未名空间站 (Sun Dec  6 12:26:28 2020, 美东)

1, 四年后中美经济体量基本接近,华尔街的生意在中国很兴隆,

2, 华为 基本超过 三星,硬件指标超过 苹果,但软件生态还是差一点;5g 不好说,
因为社会应用方面还没铺开,但华为5g 没有“死”, 活的很好;加上小米等等,手机
业务市场基本中国独大,

3, 中芯国际进入芯片产业前三,除了每年最高端的芯片,其它基本可以满足供应。

4, 中国在南海 完全站稳,已对台湾行成某种“和围”,且trump 期间卖的武器,大部
分没有到位,台湾在美训练的F35飞行员已成鸡肋。

5, 中美文化,科技人员交流顺畅,大陆游客和美华都来去自由,。。。

6, 不完全确定的是 习大2022是否“退位”, 估计6成 继续干,4成 仿效老姜,依旧
控制局面。。

7, 中美高层多次互访,biden 被人民日报多次称为 中国人民的老朋友,总之,未来四
年,国际经济形势应该不错,有中美两个领头,全世界也基本从新冠恢复。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...