Skip to main content

矿工的生存现状

发信人: pangz (zz), 信区: Quant
标  题: 矿工的生存现状
发信站: BBS 未名空间站 (Sun Aug 29 23:21:08 2010, 美东)

下午无聊,看到很多人在quant版问关于转行的事情。联想矿工的现状,发现矿工一词还真是恰如其分,特分析如下:

(1) wall street 跟煤矿一样都属于暴利行业,但最富有的不是矿工,而是矿主。

(2) 矿工们大多过着不见太阳的日子。每天下班后无力做饭,大多在矿上解决。

(3) 矿工是个技术活,每天的工作跟概率有点关系。但最后都是重复式体力活。

(4) 相对其他工种,工资略高,但入门不易。有经验并有身份(非黑工)后,跳矿比较容易。

(5) 矿难是最大的威胁,都是为了生活。

(6) 矿友的友谊是非常真挚的,“一起挖过矿"可以媲美 "一起扛过枪".

(7) 男矿工比女矿工要多的多。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...