Skip to main content

国人弱的原因就是leadership不行



这个主题讨论还是不错的,很有道理。领导力的建立首先是领导认同的建立,要相信自
己能够做有效的领导。其次,要消除认为有职位才是有领导人的观点。再次,中国人也
要正确理解"中庸"在中国文化中的意思,很多人认为中庸就是默默无为,没有自己的
观点是错误的。中国人过于看重数理工程教育,而不鸲重视人文管理方面之教育,也许
会成为一个不错的专业技术人士,却不易变成独挡一面的领导人物,这一点有小孩的要
注意培养。最后,领导力是可以培养的,在工作中,在社会中,大学也有这方面的培训
和学位教育。总之,国人的确要重祝领导力,因为这是极其重要的竞争优势。
【 在 lovesunny123 (lovesunny123) 的大作中提到: 】
: 看到好多帖子都在呼吁大牛出来组织一下,可是一旦有人组织了,又好多人不服气。说
: 白了就是名族缺乏领导力,被奴役,被压迫习惯了,好比咱们国歌里唱的一样,只是还
: 没有完全起来,就认定了自己是被奴役了。
: 黑人被奴役了那么久,人家现在注重leadership的培养,出了总统在内的那么多政治家
: ,忽悠家。不得不佩服啊,看看公司里学校里的黑女各个抢尽风头博出位,wsn只能默
: 默的翘翘代码,报报offer求自慰。人家要杀光你了,还是默默的在mitbbs上水一贴。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec