Skip to main content

不明白为啥全都冲着WEB义无反顾的扎进去

完全看不到有想做底层的人。

WEB的技术更新速度我看着都害怕。说长了两年一代。倒不是不肯学。问题是你现在年
年学,学得起跟得上,十年后呢?二十年后呢?三十年后呢?

就这么确定以后能做到不用写代码的PM甚至director?

我公司工号现在排到差不多两万,通讯录里搜搜1000-2000号的人,九成依然是regular
employee。

相比之下搞底层,系统甚至内核。40年来就没怎么变过。一直都是C。当初UNIX怎么写
的,Linux今天基本上还是怎么写,Linus当初有的地方还得从Unix抄代码。而且这个稳
定性直接绑定在现在整个的计算机构架上。只有把现在的整个硬件体系给推翻了才有可
能动摇。

没错,离利润是远一点,工资低一点,职位少一点。问题是肯做的会做的人只有更少。
而且体系稳定意味着你做的哪怕是debug的工作,花一分时间就是一分的经验,一天一
天积累下去,你的价值自然水涨船高。而且现在整体环境炒WEB,炒高度抽象平台,弱
化硬件概念的情况下,对底层和系统的经验只会越来越稀缺,价值越来越高。这个是
WEB能比的么?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...