Skip to main content

做自己尊重的人

在祝福裹着告诫呼啸而来的毕业季,请原谅我不敢祝愿每一位毕业生都成功、都幸福;因为历史不幸地记载着:有人的成功代价是丧失良知;有人的幸福代价是损害他人。
从物理学来说,无机的原子逆热力学第二定律出现生物是奇迹;
从生物学来说,按进化规律产生遗传信息指导组装人类是奇迹。
超越化学反应结果的每一位毕业生都是值得珍惜的奇迹;
超越动物欲望总和的每一位毕业生都应做自己尊重的人。
过去、现在、将来,能够完全知道个人行为和思想的只有自己;
世界很多文化借助宗教信仰来指导人们生活的信念和世俗行为;
而对无神论者——也就是大多数中国人——来说,自我尊重是重要的正道。
在你们加入社会后看到各种离奇现象,知道自己更多弱点和缺陷,可能还遇到小难大灾后,如何在诱惑和艰难中保持人性的尊严、赢得自己的尊重并非易事,却很值得。
这不是
自恋、自大、自负、自夸、自欺、自闭、自缚、自怜;
而是
自信、自豪、自量、自知、自省、自赎、自勉、自强。
自尊支撑自由的精神、自主的工作、自在的生活
我祝愿:
退休之日,你觉得职业中的自己值得尊重;
迟暮之年,你感到生活中的自己值得尊重
不要问我如何做到,50年后返校时告诉母校你如何做到在你所含全部原子再度按热力学第二定律回归自然之前,它们
既经历过物性的神奇,
也产生过人性的可爱。

北大教授畢業典禮致辭:做自己尊重的人近日,北大本科生畢業典禮上,饒毅教授的致辭語出驚人:“請原諒我不敢祝願每一位畢業生都成功都幸福。有人的成功代價是喪失良知,有人的幸福代價是損害他人...”,而他祝願:“退休之日,你覺得職業中的自己值得尊重;遲暮之年,你感到生活中的自己值得尊重。”演講僅500餘字,時間不到4分鐘,卻贏得9次掌聲。

Posted by CCTV 中文 on Wednesday, July 22, 2015

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...