Skip to main content

码工以后前途无量啊

发信人: yuzhengsheng (俞正声), 信区: Military
标  题: 码工以后前途无量啊
发信站: BBS 未名空间站 (Mon Jun  9 15:01:01 2014, 美东)

我感觉在我们有生之年,会看到计算机的learning超过人。

这个好比当年的马和火车,火车看起来笨拙而慢,但是很快就超过了马。

从最近几年发展来看,人工智能机器人的时代好像快到了。

既会编程,又能用看懂数学公式设计算法的人才以后会很吃香。

国内会编程的不少,但是一旦到了数学公式上大部分程序员就不行了。

美帝这里的猥琐男这点要强一些,毕竟都是当年学习好的,数理基础扎实,既能
写代码,也能看懂矩阵运算。

人的learning能力在遇到复杂情况的时候其实很糟糕,比如一个人妖,人眼看就是女的
。 但是未来的google 眼镜这样的东西应该能从体征的数据分析上一下子就识别出这个
是男的。http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...