Skip to main content

还是要有背景的好


一小朋友问一富翁:叔叔你为什么这么有钱。 富翁摸摸小朋友的头说:小时候,我和
你一样穷,什么也没有,爸爸给我一个苹果,我没有吃,而是把这个苹果卖了,用赚到
的钱买两个苹果,然后又卖了,再买四个苹果…。 小朋友若有所思的说哦…叔叔,我
好像懂了。 富翁说:“你懂个屁啊,后来我爸死了,我继承了他的财产……”。    
                 
这笑话告诉我们:不要痴迷于从阅读成功人士的传记,从中寻找经验,这些书大部分经
过了精致的包装,很多重要的事实不会告诉你。
1、盖茨的书不会告诉你他母亲是IBM 董事,是她给儿子促成了第一单大生意。
2、巴菲特的书只会告诉你他8岁就知道去参观纽交所,但不会告诉你他国会议员的父亲
带他去的,是高盛的董事接待的。
3、王石的那些自传更不会告诉你,他的前老丈人是当年的广东省委副书记。
4、华为的任正非不会告诉你其岳父曾任四川省副省长。
5、马化腾不会告诉你他的父亲是盐田港上市公司董事,腾讯的第一笔投资来自李泽楷
,李泽楷与盐田港母公司啥关系无需多说。
6、任志强不会告诉你他父亲是曾经的商业部副部长。
7、潘石屹不会告诉你他的发迹是和女富豪张欣结婚后开 始的。
这些事情告诉我们一个最朴素的真理:没有人能够随随便便成功!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...