Skip to main content

为什么目标很重要

 


1.为什么说目标这个东西很重要?我举个例子。比如说我问你一个问题:人占据什么位置才最有利?直觉的想法可能是:占据最显眼的位置。这当然不对。很多显眼位置都很有危险。

2.比如说,第一次世界大战之前,德国就流传过一个嘲笑威廉二世皇帝的笑话,说威廉二世这个人,想在一切场合当主角,在每次狩猎中他想当那头鹿,在每次婚礼中他要当那个新娘,在每次葬礼中他想当那个尸体。

3.那反过来,占据不显眼的位置好不好呢?这当然更不对。什么情况下都低调,会失去很多机会。所以你看,很多鸡汤文的问题就在这:只要是静态地看问题,没有目标,怎么行动都不对。

4.还是这个问题:占据什么位置有利呢?带目标的正确答案是这样的:占据让自己接下来的行动的选择变多的位置最有利。有了这个目标,就好做选择了。你品品。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...