Skip to main content

我被王博士的视频彻底震撼了

 发信人: shot (清泉石上), 信区: Military
标  题: 我被王博士的视频彻底震撼了
发信站: BBS 未名空间站 (Sat Jan 22 23:08:01 2022, 美东)


我真切理解了美国社会残酷和绝望的一面。
丈夫是博士状元,大学教授,妻子是在国内公安局端铁饭碗的。
结果在美国叫天天不应,叫地地不灵。美国绿卡真害人啊。
实际上,谁都有可能陷入王博士的困境里,特别是移民。
美国是这样一个社会,当你顺利的时候,一切都会更加顺利。
但当你困难的时候,更多的困难会向你涌来。
比如你一时破产,租不起房子。那么你就再也找不到工作了。
因为美国任何工作都要求你有地址。没有地址不会给你机会。
你有工作和现金,也未必能找到房子住。因为房东会查你的信用。
在美国,一旦陷入困境,就像进入黑洞,再也没机会爬出来。
有人就因为生了一场大病,有人就因为一次错误的投资,
结果就被打入地狱,再也无法翻身。
住豪宅涮羊肉火锅的耗子,跟穷困潦倒的王博士,只是一线之隔。
当人到了50岁,身体不好了,病来了,工作机会少了,
谁都会随时变成另一个王博士。
人到了50岁,大脑退化,会变得偏执,精神容易障碍。
这时候应对危机的能力也会大大下降。
危机也会加速一个人大脑的退化。
陷在困境里的岁数比较大的人,很容易会被人当成精神病对待。
这就是真实的世界。许多人未来的宿命。

Comments

  1. 好多人都误解了,觉得高学历都是书呆子,其实不是,学校自有一套生存法则,斤斤计较的人最后会寸步难行。

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...