Skip to main content

今天close了一个Fremont的condo

 


麻痹的不到1000sqft, 卖了70万, 三年前买才50万。 业主是fb的马工, 湖南农村娃
,一路上中南大学,米国flagship州立博士, 然后fb马工。没有女朋友。被一个变态
的东欧的manager虐,虐出精神毛病了,有被迫害妄想。

20年夏天冒着千难万险回国相亲,对上眼了一个刚毕业的妹纸,本想搬运过来,但现在签证和travel都太麻烦了。 忽然心灰意冷,就quit了工作卖了condo, 打算回去了。
妹纸那边也硕士毕业,去了长沙的一个中学当老师,工资不高但稳定,家里条件不错。 马工fb工作了4年也攒下不少钱,打算回去结婚生娃,休息两年,再慢慢的做点生意,过日子了。

买家是新毕业的印度硕士生,在Intel工作,看上去很decent的一个人。 感觉这就是湾区未来的一个缩影,米华逐渐fade away, 就像几十年前的日本人一样,现在san jose
的日本城,都没有日本人了。 几家sushi店,不是韩国人开的,就是中国人开的。 一
进门いらしゃいませ、一听就是假日本人的腔调。

pic  
 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec