Skip to main content

说点我的经验吧



email正文就说你是哪个学校的、做什么内容(几句话),申请他们实验室,你大概想
做那个方向(要往宽泛的说)。最后附上一个个人的网页。一般我是在我们学校的服务
器上架一个自己的网页,我觉得效果不错。网页上可以更全面的介绍你的research,图
文并茂,并且列全了所有的publication。就和你看到的教授们的网页一样。

附件里是3个文件,一个是cover letter,我个人到觉得大体写写就行;第二个是CV;
第三个是statement of interest。我申请的也很多,实在是没经历针对每个实验室写
单独的cover和statement,不过好在我申请的大方向都差不多,所以只需要针对具体每
个实验室的情况稍微调整一下内容。


我的经验是教授还是会花个2分钟看一下的材料的;但是能不能满足他的要求,通常就
不满足。多申请是王道,你也不知道哪个教授现在有opening,或者需要你这个背景的
,所以光撒网是必须的。

Comments


  1. 非牛也贡献一下好了,我的email正文就是写了三段:
    第一段,自己是哪个学校哪个实验室的,要申请你们的postdoc
    第二段,概述一下自己的thesis project
    第三段,我postdoc想做什么方向,正好您是大牛blabla,去您实验室想向哪些方向做
    附上cv就行了

    感兴趣的课题和方向:重要性很难说。确定要去的实验室,老板想让我做的和我开始感
    兴趣的八竿子打不着;但另外一个面
    试的实验室,他让我做的和我想做的就正好一样,想要我的原因也是因为需要人接着那
    个课题做。但是如果写的很靠谱的
    话,最起码体现了你是serious的

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...