Skip to main content

罗胖60秒:你是设计师还是工程师?

 


1.最近我看到一种说法,说这个世界的演化,本质上就是工程师和设计师之间的博弈。

2.所谓工程师,就是更多从结构、效率、功能、稳定性的角度出发去构建世界。而所谓设计师,就是更多从人性、体验、愿景和个性的角度去构建世界。
3.比如说,在中国古代,法家就更像工程师,而儒家就更像设计师。在一个组织里,管理者就偏向工程师,而领导者就偏向设计师。在一个产品的诞生过程中,工业时代,往往是工程师说了算,设计师只是锦上添花。而在今天,设计师,比如说乔布斯这样的人,就又占据了主导地位,工程师只是负责实现他们的想法。
4.其实作为我们个人也一样,当我们进入一个新领域的时候,我们先得扮演工程师,学会那些基本的技能和法则,然后就又必须得变成一个设计师,让自己有机会服务于人,创造价值。这两种角色,我们身上都得有啊。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...