Skip to main content

罗胖60秒:什么是“忘他”?

 


1.很小我们就会听到一个词,叫“忘我”。而最近我在王建硕的文章里,看到一个词,叫“忘他”。忘他,不是指这个人自私,而是指这个人进入了一个忘掉他人、独自创造的精神状态。

2.比如说,同样是写文字的,记者必须忘我地投入采访,而作家则必须忘他地投入创作。再比如说,同样是写代码的,程序员和工程师不一样的。通常,程序员是把别人的,比如说产品经理的想法翻译成代码,而代码工程师不一样,他必须“忘他”。他的脑子里得先有一个完整的、逻辑清晰的世界,然后通过代码展示给别人看。

3.我第一次看到忘他这个词,觉得精神一振。过去我们以为做事只需要忘我,因为这样才能理解客户、利用算法、洞察痛点。

4.但是跳出来一看,这个世界上大多数真正有价值的事情,其实是忘他的结果。比如说写一部伟大的小说,或者说创办一家伟大的公司。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...