Skip to main content

标  题: Re: 感觉python的前途堪忧

Make a Donation
FatWallet Coupons and Deals发信人: zhaoce (米高蜥蜴), 信区: Military
标  题: Re: 感觉python的前途堪忧
发信站: BBS 未名空间站 (Sat Feb  6 04:33:10 2016, 美东)

你们应该区分什么是脚本语言
以及脚本语言所处的环境
为什么要这么做
其实平台就两个
第一级是os和c也就是binary,c经过compile之后在这一级
第二级是jvm和class也就是字节码,java经过compile后在这一级
第三级是script engine和src code,大部分脚本是解释执行的,在这一级
你们说的很多都是第三级的
比如matlab
这个就是一个脚本engine
r也是,其实python也是,还有ruby, sql, js这些都是
groovy什么也是
这些脚本的特点就是解释执行
这肯定比编译后执行要慢,因为有解释这一步
其次,如果这里面有动态类型,which是大多数脚本都具备有的特征
这里会随着规模的上升而逐步变慢
java在一些简单的命令中,也比c慢,这没错
但是c的东西,过于依赖硬件和os,以后分布式是要迅速爆虚拟节点的
所以如果你没有一个统一的标准处理os,那你累死
以后cloud平台上,image里面的linux无数个版本,开发多半是mac/win
难道你挨个编译过去?疯了
所以jvm是必需的,然后网络部分编程也是必需的
c是古汉语,文言文,java是普通话,国语,脚本则是各种方言
所有的脚本都有一个应用范围,脚本都不是general purpose的语言
基本上所有的脚本都针对某一个领域,比如sql针对db,js,ruby针对web
python其实也不例外,当然python拼命否认自己是脚本
但是没啥用,各种特质很像,其实学脚本很容易的
你背背语法就可以开始干活了,而这些语法多数都是crud这些
但是如果你认为,这个世界上,所谓的programming就是crud这么简单
那就大错特错了

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...