Skip to main content

标 题: 事实证明,我鳖搞阿里,绝对是有先见之明

 发信人: Subway4321 (塞百胃), 信区: Military
标  题: 事实证明,我鳖搞阿里,绝对是有先见之明
发信站: BBS 未名空间站 (Tue Jan 12 15:25:51 2021, 美东)

当时我老人家就严正指出
个人判断,阿里的事,不是钱能解决的事儿。现在我鳖需要避免出现那种科幻电影里出
现的那种控制全部国民经济,甚至掌控了政府的那种邪恶公司,腾讯阿里,google和
amazon都有这个趋势。阿里想要过关,必须要明白无误的退出一些关键领域,并且保证
不以任何方式进入。同时马云个人必须以某种方式淡出国民经济。蚂蚁的问题就是给中
央的警钟,他打算绑架整个银行业跟中央对抗,不管是他本人还是背后的金融资本,都
是我鳖打击的对象。蚂蚁上市相当于法轮功去新华门静坐。没得解。

事实证明,这种超大的公司,都是具有原罪的。或者绑定了国民经济以及民生的重要领
域,或者掌握了话语权。尤其是现在,掌握民生的公司还有跟掌握话语权日益绑定的趋
势,比如腾讯和谷歌。这都是当权者最为忌讳的。尤其是你巨分分钟被大媒体流量公司
禁言,形成了事实上的社会性死亡,这还是一国的在任国家元首,还是在以言论最自由
标榜的美国。佩洛西之流封你巨的口一时很爽,回过头来就会自己一身冷汗,发现这些
公司的可怕,相同的待遇同样可以落在自己身上。尘埃落定之后相关的拆分,法律规范
的调整,尤其是官僚集团与这些公司背后的资本的博弈,会持续很长时间。垄断肯定是
最重要的借口,但是,从来没人在乎让资本家赚垄断利益,在乎的就是资本的巨大到可
以颠覆政府的政治影响力。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...