Skip to main content

postdoc申请总结

发信人: wuxiang (无人相无我相无众生相无寿者相), 信区: Postdoc
标  题: postdoc申请总结
发信站: BBS 未名空间站 (Tue Nov 22 16:55:34 2011, 美东)

自申请以来,得到版上很多热心网友的帮助,为回馈大家,写下自己的一点经验,供后
来人参考。鉴于版上信息已经很丰富,就不再重复

1.选老板。建议查Funding.跟今年拿到Funding的老板套词,要推荐信的概率极高(>50%)
   推荐网站:NIH reporter; www.engrant.com

2.套词信。我是根据sunnyday网友的建议写的,很短,200 word左右。原贴见
  http://www.mitbbs.com/article_t1/Biology/31524197_0_1.html

3.Onsite Presentation 很重要。我准备了四周,目标实验室的背景选择内容。有点失
误的是,跟我不同背景的人听我报告时,有一半完全跟不上。可以找跟目标实验室专业
相同的朋友试听,给意见。

4.提前准备很重要。7月15号开始申请。8月25号跟现在的老板套词,9月3号要推荐信,
9月19号邀请面试,10月26面试,11/19号给offer.过程很长,从发信问到拿到offer隔
了三个月。

5.要有信心。刚开始发了二十多封email,不是没消息就是说没位子;在组里练习
presentation时,被phd老板批评得一无是处,而此时离onsite只有不到两周。

6.换方向申请。只要背景相关都可以试试。

7.推荐信。我的几个推荐人都特别给力。一个推荐人在给我写推荐信时,都特意查看我
要申请实验室的资料,每封都要花一周才写完。可以选择可自己很熟悉的教授,不一定
要是大牛。

最后,也是最重要的,人品。

个人意见,仅供参考。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...