Skip to main content

发篇荔枝帖---其实幸运是一种能力

山中伸弥刚刚得了诺贝尔生理学医学奖。
2006年他在Cell上发了个特别NB的paper之后,国内外所有奖都得遍了。
要是科学界也有大满贯一说的话,他就是。

这位大叔是个励志版。
其实也不是特别大叔,50岁,跟他一起得奖的John B. Gurdon爵士相比,至少还有20年
的奔头。神户大学本科,大阪市立大学博士,写在简历上其实挺一般,或者说是特别一
般的。

有人问日本NB的医学生在哪?东京大学理科三系呀!!!
他本科毕业做过实习医生,而且是整形医生。
博士毕业以后他去了美国做博后,UCSF的Gladstone研究所,这才是他人生轨迹的转变。
他彻底改行做病理了。

后来回国,他很悲催的搞不到科研经费,研究停滞,直到去了奈良先端科学技术大学院
大学(据说这学校很好),一发不可收拾,升了教授,研究大有前途,直接被京都大学
挖走了。
话说他发大牛paper的时候在京大才两年,虽然京大很NB,但在这件事情上绝对是学校
跟着他沾光。那之后就是得奖,各种得奖。

这个大叔的经历告诉我们:
1. 不管你的简历有多难看,你都有机会变成大牛;
2. 不管你是干什么的,你都可以改行而且变成大牛;--这个版上大牛Niggy就是现实版
3. 不管你多大岁数,你都来得及变身成为大牛;

同时你需要神马?
1。相信自己能变成大牛
2。想法(在别人都试图分离干细胞的时候,他试图把成熟细胞再转回干细胞)
3。行动(废话)

都说Fortune is kind of ability.幸运是一种能力,就是这个道理。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...