Skip to main content

标  题: 最悲剧的无非是中年的时候才后悔自己走了很多的弯路

发信人: wushen (wushen), 信区: Midlife
标  题: 最悲剧的无非是中年的时候才后悔自己走了很多的弯路
发信站: BBS 未名空间站 (Sun Aug 14 01:18:42 2016, 美东)

公司有个同事,今天估计40岁了,现在还是一个小小的程序员,而且是级别很基础的那
种,
没事看到和一群92、93后的年轻人坐在一起开会的时候真心感觉有点别扭,
我们都很好奇,为什么这么大的岁数还这样的落魄,这么大的岁数自己的经历和学习能
力根本就不能和那些年轻人在一起比较了。
后来有机会在一起的吃饭的时候就聊到了这个事情,
这个同事也是无比感慨的说出自己心里的一些想法, 他年轻的时候总是喜欢放荡不羁
的生活,认为工作中的很多琐事和自己的理想生活是完全不相符的,也是这个哥们去追
求自己的理想,这个哥们的理想就是到处的去闲逛,一般旅行一般干着各种各样的兼职
,基本上正好可以满足自己的花费,
就这样的日子足足的过了10年,到自己37岁的时候,才发现自己有点走不动了,以前的
那种生活方式可能已经不适应自己现在的阶段了,
这个时候,这个同事才开始去思考是不是要安定下来找份工作,最后去报了一个计算机
的速成班,然后就来这家公司了,话说这种经验的人找工作的时候真心十分的困难,
有点难过这个同事的经历,最困难的事情就是到了中年的时候才发现之前自己的路都是
弯路。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...