Skip to main content

中国的政治体系感觉是一个低水平的程序

高水平的程序,设计结构粗看比较繁琐,效率低,一层一层的interface, abstract
class, 各种各样framework, design pattern。 搞得你实际的code在哪里都找不到。
打一个hello world 都要绕几层看似没什么用的abstract interface 和 logic。 烦

了。

然后一个初学者,感到,这几个功能,需要这么多乱七八糟的东西来实现吗?我几个if
, else, 几个 while loop 就可以了。

然后他就这么写了,确实这个功能实现了,程序看上去也挺简单,才10行。比起那个”
高手“罗哩罗嗦写了50行,分了好几个class , 简单多了,效率高多了。

慢慢问题就来了,用户要加个功能,要修改一个东西。那不简单,再加个if statement
就行了。过了一段时间,也没什么问题。

后来,用户要加两个功能,修改两个东西。要再加3个if statement, 在while loop 里
再加两个while loop。 那也没什么,虽然有点麻烦了。

再后来,流量增加了5倍,有两个新的product set要support。。。。

慢慢,慢慢,程序就成了一团浆糊了。

而反观那个高手写的东西,这些要求几个简单修改,甚至不用修改source code就可以
实现。轻松多了。慢慢才感觉出来那些复杂罗嗦空空洞洞的framework, design
pattern,真的他妈的是有用的。

杀鸡的时候中国的那套简单粗暴的系统确实比那牛刀效率更高,可惜你以后会碰到牛,
碰到虎的。

另外一种比喻,就是金庸小说里说的,少林寺的徒弟和一般江湖上二流帮派比武,头十
年,少林寺的徒弟打不过那些帮派的徒弟。为什么?少林寺从叫你扎扎实实练内功,练
拳术,一开始一点实用性没有。那些帮派弟子一开始就上18半武艺,什么实用,什么上
手快来什么。

十年以后,那些帮派弟子就不是少林派对手了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...