Skip to main content

罗胖60秒:理性和感性,哪个更重要?


1.最近我看到了一个非常简洁的决策模型,叫小事儿抄作业,大事儿凭感觉所谓的小事,就是指今天穿哪套衣服、中午点什么外卖,做这类决策的方法,就是抄作业,别人怎么弄咱就怎么弄,不值得费心。那大事呢,比如说怎么选行业、怎么选伴侣,怎么决策?要相信感觉,问自己喜欢不喜欢,而不是算计。

2.你可能会说,这里面怎么都没有理性的空间呢?对,下面我看到的这句话很精彩:人类的理性不是凌驾在感性之上的,而是为感性买单的。什么意思?

3.你根据自己的热爱,也就是用感性做了选择,一旦将来遇到了挫折,理性就会第一时间跳出来解决问题。反过来,如果最初的选择过于理性,一旦遇到了问题,你的感性就会跳出来拖后腿

4.所以你看,跟我们的直觉不太一样,人类有理性当然很珍贵,但是在决策的时候,感性比理性重要。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...