Skip to main content

真不觉得phd强到哪里去

发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: Re: 真不觉得phd强到哪里去
发信站: BBS 未名空间站 (Sat Nov  3 14:56:15 2012, 美东)


【 在 Dreamer (不要问我从哪里来) 的大作中提到: 】
: 研究部门大多都是一个大phd带一群小phd,然后每个小phd带一队SDE做事情。不仅限于
: CS,制造行业也是,比如长安,长虹也都是这些。

唉。。。侬去各大公司看看管理层的背景就知道了。
PhD很少的,即便是CTO职位。
英雄不问学历,美国做的不错。

就不说顶级管理层,你去linkedin上看看一般经理的背景,就更能知道这一点了。
phd带小phd,再带sde,听起来好像不错,
可这种架构的科技公司都死很惨:柯达,微软,原来的贝尔实验室,惠普,太多了。

微软有研究院,标标准准你说的这种架构,多少年来扔了无数钱,
产出只有paper,paper,paper,对微软没有任何帮助,所有有点意义的新产品都是后
来收购的。
盖茨自己都说,微软研究院是个给学术界的福利。福利,就是养着的意思,不指望什么。

版上有人鄙视google。可说实话,现在也就Google这类新公司不再上这个当了,
只有很少的纯research人员,phd来了也要面对产品,
这才慢慢有了些不错的新东西。
做出来map reduce, dremel,F1等大规模计算的东西,捎带手的发了好几个paper,
demo都把学术界的人给震了。可看第一二三作者,都是多年工作的小本或master工程师
而已。

哥做interview这么多年,区分好的phd面试者很容易:一看能多快速度写code;二看多
快能formulate一个新问题。

我猜例外就是制药行业,我觉得可能必须是phd才能lead,
因为病毒什么的恐怕要很深的研究才能理解。
其他的如军工,金融,造船,建筑,跟科技公司差不多。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...