Skip to main content

标 题: Re: golang还有很长的路需要走,需要5年到10年吧

发信人: TeacherWei (TW), 信区: Programming
标  题: Re: golang还有很长的路需要走,需要5年到10年吧
发信站: BBS 未名空间站 (Fri Jan 18 20:35:51 2019, 美东)

当然不全是hype。我不是还在用么?
他们今后5年以内,能把做错的都改过来,就很不错了。
现在这个搞法。至少90%的人其实都用错了。用错了也能work,就是他们不知道正确的
应该咋做而已。
当然,这也不关我的事。我做对了就行了。。。

【 在 cxfcxf (MGM) 的大作中提到: 】
: 有好有坏吧
: golang这个channel的设计应该就是csp的核心
: golang肯定还有段路要走 但是他的确让并发好写很多 想到并发写法 第一个想到的就
: 是golang
: 当然对性能有很高很高很高要求的程序 不一定是个好的选择 但是现在这种物质丰富的
: 情况 没有堆机器解决不了的事 又特别是很多大程序现在都拆成microservice的情况下
:  你只要保证能horizontal scale就可以了
: golang能火也不完全是hype 太好写 阿猫阿狗都能写 就是必须理解一下go的
: concurrent pattern

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...