Skip to main content

我脚着老中没有老印抱团是有根源的


阿三不会因为对方是个素未谋面的阿三就网开一面,他们在一个锅里吃饭,一间房里睡
觉的buddies都照应不过来呢,还有各种亲戚。阿三一直是大集体,大家庭生活。阿三
的男的,得负责接弟弟妹妹来美国上学,婚嫁,联系工作,一来一窝都来,2~3家住一
个house也很多。有职位第二天小姨子,大舅哥,妹夫全来了。

我们国人喜欢关起门来过小日子,不喜欢没事一帮混在一起。以至于同学,老乡,校友
之间的联系都很寡淡,互相都不很了解,也没有互信,吃饭开趴行,但是大家都小心地
避开实质地交流,多一事不如少一事。我曾经厚着脸皮在一专业的会议上给校友递简历
,后来又厚着脸皮给人家写follow up,人家很礼貌地说简历已经转交给公司HR,就是
没什么特定职位,入数据库的那种,希望我找工顺利,挺友善地就把我打发了。

再说,大环境对我们就是不利。米国人明显敌视华人,新闻媒体里罕见说我们句好话。
别看白人同事嘴上不说,私下里人家就觉得你是个操纵汇率,倾销商品,盗版软件,还
污染加州环境,总之中国人是美国一切不爽之罪魁祸首。阿三是他们阵营的,主仆之分
;我们是敌方阵营的,敌友之分,能一样么。

我们要是不能像日本,韩国那样自强,也就赖在美国受气了,反正在哪里都是受气。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...