Skip to main content

标  题: 最近跟着领导学了react,的确不错

发信人: hitmantb (hitmantb), 信区: Programming
标  题: 最近跟着领导学了react,的确不错
发信站: BBS 未名空间站 (Fri Apr  7 22:10:46 2017, 美东)

领导的mentor推荐她学习react涨收入,我也跟风看了看。

感觉谷歌angular 1到2升级实在太失策了,完全推倒重来,在indeed上面工作数量现在
和react一下子拉进了很多。react native也很火,有几个相当规模的app开始用了。

react组件这个思路真的不愧是mvc之后一大创新。  HTML和js在一个文档里开始不习惯
,但适应以后的确非常make sense。 每个文档相当于产品一个部件,不需要同时打开
几个文档看不同逻辑。 HTML直接写在javascript里面看多了也顺眼了。  angular 2其
实抄袭了很多react的理念。

虽然工作title是产品经理的位置,能写简单poc给高层看看拉拉资源还是不错的。 个
人ppt实力碾压同部门的阿三,但真的能使用的半成品还是强很多。  交给程序员之前
就能把界面逻辑,数据库model理顺了,事半功倍。  而且很多设计在mockup上看很好
,真的用起来完全不是一回事。算法性能什么的不是我的强项,但poc来说真心简单粗
暴。不知道如何优化算法?  没问题咱提前写个简单script把数据的summary算出来再
显示。 真的production的系统还得让北大大牛操刀啊。

记得二十年前第一份工作是在银行里做ppt。  那时候的banker都是手写ppt然后由我们
排版。  如今大家都是自己ppt了。  当时候高中学写c++在屏幕上现实一个图片就激动
无比。  如今随便下个node/express/mssql就从现有数据库读出数据显示在界面里了。
写一些轻量的poc,真的是非常享受。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...