Skip to main content

回首我的美国14年,对老婆和孩子充满负疚


1999年,本科毕业,登陆美国南部大学城
2003年底,迎娶爱人
2004年中,爱人辞去国内工作,抛开国内的父母,朋友,千山万水只是为了和我在一起
2005年初,毕业,开着小车两个人奔向北方,我开始博士后生涯。
2006年初,爱人入学读书,我funding出问题; 秋天我开始读另一个热门专业的博士
2007年中,爱人毕业。开始读另一个好找工作的专业。
2008年中,到大城市实习3个月
2009年9月,到实习的大城市参加工作,暂时中断phd 学业
2010年春天,孩子出生,8月爱人顾不得产后要好好休息,回学校答辩。9月初找到
contract工作,孩子只好带回国有岳父母暂时抚养。一家人天各一方。年底,和爱人一
起去旅游胜地玩了几天。
2011年初,我换到东岸大城市工作。爱人找到她所在州的一份permanent工作,3月底,
把孩子从国内接过来。我以每6个星期一次的频率机横穿美国大陆来看望我的娘儿俩;8
月底,岳父母要回国,我辞掉工作,接受另一份可以让我在家暂时工作的job; 从此到
2012年2月底,一家三口在一起。人生中最快乐幸福的那段日子。
2012年3月,搬到我工作所在地,也是爱人公司大分部所在地。准备买房结束飘泊的生
活。整年行业不景气,公司在年底裁掉许多组,我也包括在内。给办的绿卡才到perm,
所以一切清零。
2013年如今,仍在努力寻找工作中,继续我的论文。也因为确实不能控制的原因与一,
两个好机会堪堪错过。爱人每天大着肚子辛苦地奔劳工作。只能告诉自己,扛住。

人到中年,回首这么多年的弯路。你尽可以说我是loser。只能说,我们努力过,尝试
过,过去曾经,现在依然,今后也会认真地生活。只是看着妻子和孩子的睡脸,负疚感
夜夜吞噬着我


在此祝福所有在和我年纪相当,仍在异乡土地上努力流汗的兄弟姐妹们

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...