Skip to main content

教授是社会的大脑


本次争论的实质是一帮毫无社会地位,朝不保夕,吃青春饭,随时可能被layoff的码工
,为了掩盖自己的自卑心理,上网查烂校或者烂专业的教授工资然后嘲笑教授这个行业。

你个码工,整天就写一些垃圾code, 对社会和人类进步有个三明治的贡献。被老板喝来
喝去象孙子一样,还有大把光阴耗在买买提上。这是一种何等可耻可悲的生活。萎缩成
这样了,还有脸攻击教授。

其实教授只要干得不是太差,收入都不错。我知道的教授的收入,都比网上可查到的九
个月基本工资高很多,另外还有很多福利和隐形收入。

社会对教授的尊敬也非码工可比。基本上社会上的每一个人,听到教授的名头,立马刮
目相看。这种体验,码工琐男们做梦也体会不到吧。

教授是社会的大脑,灵魂,良心,和脊梁。他们的名利双收是一个现代社会重视教育和
科技的正常体现。他们拥有美国唯一的铁饭碗是合理的。

当然,乞丐也有嘲笑皇帝的自由。我居然不淡定地发帖回应了,也是我自降身份,修养
不够的体现。这是我关于此话题的最后一贴。同学们,再见!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...