Skip to main content

为什么别关心自己的缺点

 

1.昨天和人聊到一句话,是英国哲学家罗素说的。罗素说自己“渐渐学会对自己和自己的缺点漠不关心”,说自己“渐渐地把越来越多的注意力放在外界事物上,例如,世界的状况、各式各样的知识、我喜欢的人。

2.你看,这话说得一点都不正知正确:一个人怎么能不关心自己的缺点呢?但是我觉得,我还是挺理解罗素他为什么这么说的。人到了一定的岁数,确实就不能把目光盯在自己身上了。

3.如,我在工作中就经常跟年轻同事讲,你们经常说干某项工作,抱着学习的态度,要学了之后才会干。千万别这么想。都是奔30岁的人了,不是在学校里了。没有什么工作是做了充足的准备然后再上阵去干的,都是干了再说,干成、干败都有收获,这本身就是学习。

4.你看,这就是罗素的态度:别看自己,当你关心世界、知识和人的时候,自己就会越来越好。

Comments


  1. 俄罗斯背后有一套帝国逻辑,如果俄国人不再坚守这套逻辑了,那么现在的俄罗斯也会
    解体。只要俄罗斯人继续坚守他这套逻辑来运行自己的国家,他们和欧洲的矛盾就会继
    续。中美必然会谋求利用这种矛盾从中牟利。

    其实只要中国不sb到和俄国结盟亲自下场,中国肯定是最大赢家。打仗是俄国和欧洲先
    烂,俄罗斯解体了中国白得大量领土。俄罗斯不倒那就要卖资源给中国求中国给他输血
    。反倒是美国有很多可以失去的,却赚不到啥。

    ReplyDelete

  2. 俄罗斯承诺乌克兰领土完整是签了条约。94年布达佩斯条约,英美俄乌四国签条约,乌
    克兰弃核,核力量交给毛子。毛子承诺尊重乌克兰主权和乌克兰领土完整。

    毛子吞并克里米亚是开了二战后大国公然吞并领土的先例。我党也不承认

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...