Skip to main content

叫‘软件工程师’还是叫‘码工’?

http://gengwg.blogspot.com/发信人: greenlands (sunflower), 信区: SanFrancisco
标  题: 叫‘软件工程师’还是叫‘码工’?
发信站: BBS 未名空间站 (Sun Apr  6 19:03:11 2014, 美东)

在印度,当上工程师是多少男生的梦想,是家庭的荣耀,意味着家庭经济地位社会地位
的彻底翻身!说媒的也会踏破你家门槛。待嫁的女孩都会悄悄盯着你!

听说在国内,你说你是‘搞电脑’的,人家看不大起,他们更喜欢在银行的。在美国,
软件工程师居然有码工码农的外号.开开玩笑也罢了,但是如果真的小看干软件这行的
人,可就是无知了。这也许是出于外人对软件业的缺乏了解,也是有些内行人悲观视野。

当今,世界离不开软件。学软件不容易还要不断进修学习新东西,没有一定的智力和毅
力根本没法干这行。印度软件工程师有的自己创业,当企业家,有的进修商学院,力争
当经理。连美国顶尖的商学院这几年都加大了收理工背景的申请者而不再青睐主修经济
的申请人了呢!
第一次工业革命时,一夜间成首富全是钢铁大王。当代的信息技术革命,多少大大小小
的富豪由‘码工’摇身变成?

社会进步离不开科技,工程师们,骄傲吧!‘FACEBOOK一个元老在自传里面把码工叫做
“攻城狮”。’拍案叫绝!赞他的自信!

轻看科技和科技人才,只能证明他们自己的愚昧!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...