Skip to main content

想研究理论物理或纯数学

 发信人: furoci (伊千枝), 信区: Military
标  题: Re: 想研究理论物理或纯数学
发信站: BBS 未名空间站 (Wed Mar  3 14:16:08 2021, 美东)

我昨天早跟牛和娘说过了,牛和娘毕生没从事过高强度的理论研究,根本不知道理论研
究需要什么,对理论研究是有误解的,真以为监狱能干这活。

举个例子,牛和娘你一天内运算草稿纸有没有超过100页?没有的话屁都不是,别对我
说说你用脑子想想就可以了,复杂的推导每个步骤都需要写下了反复校验。

做复杂的理论研究最忌讳的是时间碎片化,比如你在牢里,一会牢头来点名,一会牢友
来唠嗑,一会让你参加活动,这样一来时间变成1小时1小时的碎片,这种情况是没法从
事理论研究的。从事理论研究需要大把的,整块的,连续的空闲时间。

比如当年爱因斯坦在专利局无所事事,每天坐着,就可以研究相对论,要是专利局每天
要写文案,要不断汇报,不断出庭,不断跟客户面谈,完蛋了,根本不可能干正事了。

再比如当年陈景润在88楼锅炉房,别人都在文化大革命,就他吃饱了除了看门外的女人
外无事可干,这样才能做理论研究。

你在监狱这种时间碎片化的地方,根本不能安静地从事复杂的理论研究。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...