Skip to main content

从纽约客的角度来谈谈芝加哥

本人在纽约上海都生活超过5年(腆着脸说自己是纽约客,希望大家睁一眼闭一眼),
出差去过北京大概10次,香港,东京,首尔,巴黎,曼谷,新加坡都拜访过。

美国这旮瘩,去过的城市有洛杉矶,旧金山,达拉斯,休斯顿,费城,波士顿,亚特拉
大,新奥尔良,波士顿等等。

说了一堆,这意思是咱应该不算是个不见世面的乡下人或者外地人了。。。。

芝加哥这个地方我没去之前,以为是个中西部的大土城。去了之后,印象大为改观。

第一感觉这地很象波士顿,去过海军码头的人恐怕都有同感。密西根湖满坑满谷的游艇
跟波士顿的查尔斯河简直如出一辙。

第二感觉这地很象纽约,因为芝加哥河沿岸的各种不同风格的建筑跟曼哈顿非常象。而
且艺术氛围很浓,芝加哥的艺术博物馆藏品极多,本人在里面逛了一天,勉强看完,最
后一幅镇馆之宝a sunday on la grande jatte也只匆匆扫了一眼。与大都会艺术博物
馆完全可以说是在同一个档次。

去芝加哥的时候,本人是住在芝加哥河边上的酒店,窗外就是芝加哥河,稍远处可以看
到密西根湖和游艇。傍晚去酒店的露天健身房锻炼,从阳台看出去,这个skyline确实
相当漂亮,完全可以媲美纽约,东京,上海和香港这些顶级都市的skyline.

以我个人看法,美国大城市纽约第一,芝加哥排第二毫无问题。第三及第三以后不好说
,其他城市都各有千秋吧。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...