Skip to main content

标 题: 从唐晓琳女士的不幸谈起

发信人: Tianzi (偷月亮的人), 信区: Biology
标  题: 从唐晓琳女士的不幸谈起
发信站: BBS 未名空间站 (Fri Oct 13 08:53:24 2017, 美东)

唐女士这样的女生我见过不少,聪明又勤奋,多数属于工作狂,非常Driven,有些甚至
连男友都不找,没时间出去玩儿去社交,自然遇不到心仪的对象。然而这样一位优秀的
人,却离我们而去,让人唏嘘之余生出兔死狐悲 物伤其类的感觉。

唐女士和很多勤奋的中国学生的勤奋以及深入骨髓。一路学霸走来,承载了家人的厚望
,自己也习惯了两点一线三点一线的生活。勤奋努力,哪怕苦逼,也无可厚非。可是请
注意,这种勤奋有没有价值,在于有没有一个前提,就是你是在为自己努力多还是为别
人努力多。这里的别人,包括父母,导师,博后老板等等。虽然跟老板有共同利益,但
自己的利益和老板的还是不一样。

第二点,现在的学术界很黑很黑,不是努力做好工作就能得到应有的报偿。各种璐璐/
露露能轻松发好文章做发考题的时代,你跟我扯勤奋?公司里也一样,努力工作的底层
人员多了。勤奋的报偿往往是空洞的赞赏和更多的工作。活干的好,不一定能挣到钱,
这是常态。

第三点,勤奋的人要学会休息,学会玩儿。休息好了才能更有效率,才会心理健康身体
健康。

第四点,人越在乎什么,什么就越成为别人拿捏的把柄。如果一开始唐美眉就装成满不
在乎,不行转行拿个骂死他的态度,他老板也就不会压榨那么狠一直不让毕业。几年后
,她做的好,老板仍然不让她毕业,她就应该混日子了,或者努力的去活动,而不是更
加努力地去工作发更多文章来证明自己可以毕业了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...