Skip to main content

说说为什么男马工, 不能找女马工


我们不谈爱情, 就谈钱和逼。。。

先从投资的角度看, 现在告诉你, 你一生, 只能买两个股票, 你要靠这两个股票养
老。  你会去买两个在同样sector的股票么??!! 怎么, 你会去买facebook 和
twitter??!

diversification啊!! 一家两个马工, 你的diversification何在?! 你们都忘了
2000年nasdaq被一半, 好多人都被lay off吧。。。 还有人说现在的马工, 就像60年
代汽车工一样。  那你想想, 到了70, 80年代, 如果一家两个汽车工, 不都要去跳
河算了?!

所以从long term investment角度看, 马工, 要娶的, 就是accounting的女的。 不
但是不同的行业, 而且, accounting绝对是越老越吃香。  你娶了个归婆, 老了,
技术被淘汰了, 学不了了, 工作照样难找。  两个人都搞青春饭, 不他妈的发疯了
么!

谈逼么, 这还用谈么? 马工婆, 天天盯着电脑, 搞的是脑力活。  头发都要掉的多
。  女人头发少, 还会好看?! 然后马工对这电脑, 精子被辐射, 所以只能生女的
。  你以为女马婆, 对着电脑, 卵子不会有问题??!!!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...