Skip to main content

再论“勤奋”


首先我上一篇帖子说“勤奋”的罪恶, 并不是说我不支持勤奋。 我自己就是一个很勤
奋的人。

我只是更加深刻的反思了这个世界, 得出了以下的结论:

1. 勤奋是我们改变我们命运的手段。 但不是什么“美德”。和道德无关。
2. 憎恶勤奋是所有种族都有的。 其实我们中华民族对勤奋的憎恶不逊于其它种族。
   比如: 青梅煮酒论英雄。 曹操是憎恶刘备的勤奋的, 所以刘备要假装自己俗人一
个。
          我们的领导提拔的都是听话的人, 不是勤奋工作的人。 相反, 一个一直
努力向上爬的人会得到领导和同事的敌视。
          岳飞。

其实我们在这个世界上, 就是一个博弈的过程。勤奋, 但是要表现出不勤奋的样子,
才是人生勇往无前的法宝吧。 否则前进的阻力非常大。 AA 就是一个例子。努力开餐
馆赚钱但是表现低调吃救济又是一个反向的例子。

如何在奋力向前的过程中不要让周围的人感受到威胁,恐怕就是艺术了。 做到了这一
点, 比那些单知道勤奋的人, 可是事半功倍啊。 永远不要忘了这个世界上有很多人
是非常讨厌你的勤奋的。虽然我们还是要一如既往的勤奋。

其实: “争做人上人”, 已经很明显的说出了勤奋遭人厌恶的原因。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...