Skip to main content

追求完美的历程:读乔布斯传有感

发信人: wedidit (we did it!), 信区: LeisureTime
标  题: 追求完美的历程:读乔布斯传有感
关键字: 乔布斯
发信站: BBS 未名空间站 (Tue Nov 29 19:30:23 2011, 美东)

历时两周读完42章,写的非常不错。本人非苹果迷,提取本书精华如下:

1.    选一个让你激动的工作很重要。无论是在苹果还是在Pixar,乔布斯都在做让他
激动的产品,这也是他成功的根本。如果说他当年在苹果的成功是时势造英雄,那么他
重整苹果推出Ipad,Iphone, Ipod 绝非偶然。我等半心半意发Paper灌水的人自叹不
如;

2.    产品包装很重要。乔布斯可以说把这一项做到接近极致;

3.    生命是短暂的。 如果你今年35岁, 预计寿命80岁,朋友们,你还有16425天可
以完成你的愿望,珍惜他们。用一天,少一天。我们很多人有那种每年的日历,其实每
人更应该有一本生历,刹那间,人生蹉跎。

4.    很多时候,媒体在误导我们,也可以说我们在诱导媒体,因为我们总是想看,想
读一些奇特的事情。例如,乔布斯拿一美元年薪的事很多人都知道,但是乔布斯狮子大
开口要2000万股权的事却不流行。

总结:乔布斯一生,算是色彩缤纷,不算英年早逝,很多我们永远不可能经历的事,他
都经历了,只用了56个春秋。愿他安息。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...