Skip to main content

人一周工作60小时的就是比你们一周工作40小时的挣的多

发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 人一周工作60小时的就是比你们一周工作40小时的挣的多
发信站: BBS 未名空间站 (Thu Feb  2 13:09:23 2012, 美东)

一周168小时,人睡56小时,剩下112小时里,人能拿出60小时工作,不是凑时间那种,
而是平均起来工作效果很好的60个小时。

就应该比你一周40小时多挣一半。更何况有赢者通吃效应,实际上可能要2倍3倍不止。

这是算正常情况,你要是懒、抑郁等等,一周工作个2、3个小时的,人就是超你30倍。

人和人看着一样,实际工作能力相差相当巨大。有人1年能积累3000小时的经验,不是
耗时间那种,是实打实效果很好的一小时一小时的工作。有人1年只能积累不到100小时
的工作时间。表面上可能看不出来,但脑力劳动者的绩效就像长跑运动员的能力一样,
都是可以衡量的。

人际、机遇、勇气等等另算。

按照10000小时规则,一个专门的行业,累积投入1万小时,基本可以掌握该领域的“所
有”相关方面。

同样,人和人不一样,有的人5年时间,可以积累15000小时的经验,绝对在领域里游刃
有余,有的人,5年时间,只够差不多500小时的经验,相当于别人8个月的效果。

22岁大学毕业基本成熟算起,到27岁,有的人是领域的精英,有的人,基本废了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...