Skip to main content

标 题: 我非常讨厌slack

 发信人: newbies0001 (newbies), 信区: JobHunting
标  题: 我非常讨厌slack
发信站: BBS 未名空间站 (Wed Jan 27 13:30:49 2021, 美东)

以前大家用邮件,或者skype什么的,还能给人一个喘息的机会。一个邮件半小时再回
不是什么问题。一条单独的IM回复起来也完全可以handle。现在slack, 五个人恨不能
能拉出来十五个channel, 此起彼伏的notification,这个@完那个@, 有时候@here, 整
个人不得喘息。一天天的,光处理slack里的事情都处理不完。而且这种软件设计的就
是让你立刻马上现在就要有回应。现在居家工作更是如此,上厕所要带着手机,洗澡的
时候旁边也要开着notification。非常疲惫极度厌烦。以前说technology set you
free, 我觉得现在高科技带来了很多低生活。cyberpunk本是一个未来概念,现在提前
了太多太多了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec