Skip to main content

标  题: 创业:知道路应该怎么走,和自己把路走一遍是完全的二回事。

http://gengwg.blogspot.com/发信人: pker (骂客.咱刻薄=Mark Zuckerberg), 信区: Working
标  题: 创业:知道路应该怎么走,和自己把路走一遍是完全的二回事。
发信站: BBS 未名空间站 (Mon May  4 22:18:03 2015, 美东)

投资人太黑,要40%的股份,钱才给一点点。
直接踢飞,自己拿钱做。

现在感慨一下,
之前把马云的视频当笑话看。
现在自己做了,才知道其中很多是真话。

其中有一段:
大概意思是,我们之所以能成功,是因为我们刚开始没钱,
所以什么都要想着最节约的方式做好的效果,

以前拿投资人钱做的时候,什么都是靠钱砸。
不行了再砸。
现在一点微小的差别,都要重新反复测试N遍,
尽可能的一分钱掰成2半花。

我一边做一边和团队的人开玩笑说,
这尼玛一轮做下来,就算这项目不成,
弄个consultant公司,专门帮人省钱也不错,哈哈。

创业这事情其实有点像吸毒(虽然我没吸过毒)
开始很兴奋,然后很痛苦,
然后再兴奋和痛苦中交替,
承受比日常工作至少100倍的压力,
一旦进入状态后,连路上看到一只狗,都拿你自己的那套方案往上套。
然后就习惯了这种压力和交替,

然后慢慢的那些每天想着升官发财的同事,
在你眼里渐渐变成了一只一只的猪。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...