Skip to main content

为什么逛博物馆容易疲劳

 

1.昨天晚上我做了一场连续四个小时的直播,从晚上八点一直到午夜十二点,迎接刘勃老师的国学课零点上线。这是一个有趣的戏剧结构。

2.对用户来说,直播中我说什么那是不确定的,而又有一个确定的可以期待的元素等在前面。正如有人说的,人最能欣赏的美,其实不是全然的创新。而是在创新中,在一次和一次的不一样中,又有确定的东西。

3.比如说海浪,人面对大海,能痴痴地坐在那里欣赏几个小时不腻味。每一波海浪都不一样,但是又有几乎完全一样的节律。而看博物馆,每一件展品都不一样,但其实人看得特别容易累。有一个词叫“博物馆疲劳综合征”,说的就是这个现象。

4.这么说来,每一个面向用户的活动,都应该具备两个要素,一个是不确定的要素,每次都不一样的东西,还有一个就是坚定不变的,令人有点期待的东西。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...