Skip to main content

具体的方向或技术


cloud,mobile等应该没错,不过这是大方向,其中还包括很多sub direction以及一些
传统的技术。大家心中有没有具体的方向或技术,说说。

先抛块砖吧:
我觉得security总是不可少的,不过好像很难“大火”一把。


实质是ml
【 在 susy11 (susy1) 的大作中提到: 】
: 有很多牛人说big data火的是概念


NLP也很hot吧。


big data我觉得主要还是工具的应用,如果考虑big data理论方面内容的话。其实理论
方面还是用到很多存在的传统技术。


security不可能。
robot, sensing, intelligence将是下一个热点。或者至少是android 吧。

web 2.0 is done. big data as common definition, such as recommendation
engine, etc, is almost over.

facebook's life maybe less than 10 years from now.


太多的统计的人在big data,不知道计算机在那上面有那些优势

所有mobile的东西都是云计算,云计算必然涉及big data,big data必然要用search
engine, search engine必然要用ML/DM, ML/DM必然要定制,定制必然要有
recommendation



唉,以前搞的啥je22struts,play一出来都傻b了。幸亏没好好学sql,nosql一出来又
得傻b。哈哈

我觉得cloud, mobile过段时间就没用了,cloud中国好多免费的,mobile应用有自身的
局限性,不如直接用网站方便。


web自身的发展也很缓慢
政治斗争太多了
你看html5这么久还是那个模样就可以感觉出来了
发展明显滞后,主要是各个巨头为了自身利益
互相牵制,三个和尚没水喝
所以到现在frontend都难堪大任
还不如去搞app来得划算
至少app里面各种功能都可以很容易实现,用高级语言
如果用脚本的话,那各种痛苦就来了

groovy是java的简化版
scala是java的复杂版
所以对于简化的部分你要上多线程框架?
那还叫简化么?grail就行了,剩下的去用java


先转统计
统计+编程-》ml
爽吧?











Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...