Skip to main content

读Ph.d


读Ph.d要看专业,有的Ph.d越读发展越窄,像生物一类一般出来只有
做postdoc,Faculty.有的读了你没啥损失,但损失时间和可能的工作
机会,像EE, CS.

当然读Ph.D给你的training确实今后一辈子再也找不到了。往往中间
是比较痛苦的,最后就是除了想毕业什么都不想。当然你qualify毕业
的时候,对于写作,Presentation,思考问题的能力确实有很大的提
高,终身受益。基本能够对以后要进入的方向会把握的很好。

但不是说你Ph.D毕业就能找到很好的职位,而且如果你不喜欢跟R&D相
关的位置的话,或者不想做技术门槛比较搞的startup的话,做的
Research的Training基本上没用到,但其他方面像writing,
presentation, analysis ability还是会很有用的。

就看你是否想提升自己,想牺牲几年后长期发展。还是想找个稳当的位
子,安安稳稳的拿钱。

要是为了绿卡读Ph.d就可笑了,等你绿卡拿到Ph.d也不一定毕业。还
有绝大多数Ph.d毕业后的文章的citation是不能办EB1的。你要是能
Qualify的话,你的动力绝不是绿卡,基本证明你很喜欢research才
能做的这么好。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...