Skip to main content

什么是真正的奋斗

 

1.夏鹏老师讲的一段话,我是深有同感。他说,什么叫奋斗?加班,是奋斗吗?拼命往外面跑,是奋斗吗?都算。但最有价值的奋斗,是我们内心的挣扎,就是所谓的“天人交战”

2.我应该怎么怎么做,但我现在做不了,我怎么去调和?我必须要怎么怎么做,但是我不会做,我应该怎么办?别人让我做什么做什么,但是我就是不情愿,我应该怎么办?我现在就想做这件事情,但是我未来可能会因为这件事情而受损,我应该怎么办?

3.这样的天人交战经历多了,一个人才成熟了,才知道在各种微妙的情形下怎么找到内心的平衡。查理芒格讲过一句话:什么是简单?简单就是长期奋斗的结果,那不是起点

4.对,当我们看到一个人做某件事很轻松,讲出来的道理很简单,那是因为他已经把最艰难的平衡和内心的冲突都已经消化掉了。而那些东西是永远也讲不出来的。


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...