Skip to main content

要分析人们的可信度,以评估其观点正确的可能性

虽然开放的心态会创造很大价值,但你必须有辨别能力。要知道,你的生活质量将取决于你在追求目标过程中所做决策的质量。做出正确决策的最佳途径,就是知道如何与其他更博学的人探讨并参考他们的意见。所以,你要明辨应参考谁的意见,并且有效地去执行。


你将面临的困境在于,你既要找出事实从而有效决策,同时又要知道你听到的很多建议毫无价值,包括你自己的。你要衡量人们的可信度,这取决于他们的能力和是否乐意说出其想法。同时也要考虑到他们过往的表现。



While it pays to be open-minded, you also have to be discerning. Remember that the quality of the life you get will depend largely on the quality of the decisions that you make as you pursue your goals. The best way to make great decisions is to know how to triangulate with other, more knowledgeable people. So be discerning about whom you triangulate with and skilled in the way you do it.

The dilemma you face is trying to understand as accurately as you can what’s true in order to make decisions effectively while realizing many of the opinions you will hear won’t be worth much, including your own. Think about people’s believability, which is a function of their capabilities and their willingness to say what they think. Keep their track records in mind

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...