Skip to main content

IT公司面试时所说的文化,其实就是白人nerd的"僞大师"文化。


IT公司面试时所说的文化,其实就是白人nerd的"僞大师"文化。

IT公司,你总能看到一群人(白人居多),这些人把coding看做生命的一部分,每天把
"some really smart people did xxx" 挂在嘴边。然后写个板砖的活还自以为很了不
起没事儿就来一句"cool!"。其实干的都是没技术含量的活,也就是把人家的recipe拿
来然后最多加点自己的小trick。这些人,非常浮躁,以为自己写几行代码就可以改变
世界,然后一天憋球的喜欢给人耍宝来慰藉自己的存在感。这些人最多算个码工但是总
觉得自己是大师。真正的大师是发明recipe的人,而不是follow 或者小改recipe的人。

为什么IT公司这种干着低贱没技术含量的活,但是以为自己很了不起的人很多呢?个人
认为其实和计算机的特性有关。所有的工程类项目,只有软件开发能够独立完成并且立
即见效(编译成功,运行成功),所以这些人就可以完全活在自己的计算世界里面为所
欲为:只要敲几行代码,我就可以让计算机如何如何,发号施令,做trick,感觉就是
一个god,所以很容易让这些人产生幻想认为自己就是世界的主宰。

IT公司到处充斥的这种computer nerd(白人居多)。对于雇主来说当然是一件好事,
他们放任这群Nerd自我感觉是"大师",什么事情都不想活在虚幻的世界里为雇主卖命,
所以这种所以这种文化在IT公司里面非常受欢迎。本质上其实就看你是不是一个活在自
己世界
里的苦力。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...