Skip to main content

提供服务之前应该想好什么


1. 最近看到一个故事,美国有一家航空公司的飞机上,装上了高速的WiFi。乘客都高兴坏了,居然在万米高空也可以看互联网视频,真是神奇的科技。
但是,过一会儿,WiFi信号断了,大伙就都骂,垃圾,真是垃圾!

2. 讲故事的人就说,哎,人性真是不会知恩图报。几分钟之前,他们还不知道这个东西的存在,几分钟之后,一旦不给他,就好像界欠他的。

3. 但是我得说,作为商业机构,不能这么想问题。既然人性如此,在给予之前,就应该想清楚。
这个世界就这样,提供一项服务,就是在被服务的人的生活中插进了一个外来的东西,就是在驯化出某种依赖性。

4. 如果第一,你不能稳定地提供,第二,你不能迭代提升,你提供的服务迟早就会变成反扑回来的抱怨。
这个世界的天理不是知恩图报,而是一旦有了什么,就再也回不去了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...