Skip to main content

标 题: 很多人的误区,是用自己的经验来推广

 发信人: hci (海螺子), 信区: Programming
标  题: 很多人的误区,是用自己的经验来推广
发信站: BBS 未名空间站 (Fri Apr 30 14:37:41 2021, 美东)

自己是搞技术的,觉得自己靠技术,单打独斗,就可以吃上饭,就觉得这条路是最好的
。其实不知道这条路是在一个非常特定的条件下产生的一个蹊径,其实不是啥阳光大道。

你自己的小孩,有你那些条件么?其实并没有。但很多人认识不到这个,这就是第一代
于第二代相互不能理解的原因。

什么条件?

1. 天生能力。你能吃技术饭,是因为你从千万人中被选出来的。你娃很大可能没有这
个条件。为啥,mean reversion, return to the mean, 这是客观规律。

2. 外部环境。中国与美国完全是不同是社会,有不同的价值观和文化。你得以搞技术
的土壤在美国是不存在的。比如,在中国,你成绩好,老师就喜欢,同学就认可。在美
国,你就是个nerd,没人喜欢你。设身处地为你小孩想想,如果你在中国,你成绩好反
而被打压,你会读书读到现在么?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...