Skip to main content

phd对我的意义


我时常问自己,phd对我的意义~~ 我把我最美好的20岁青春奉献给了phd,留在了一个
安静而沉寂的小村子里,埋没在无穷无尽的郁闷中。这样的付出值得么? 每年都有无
数的人在感怀青春,而我的青春有啥呢,phd?郁闷?
当然对于爱science,爱research的人来说,把青春啊,生命啊,都风险给伟大的科学
,那是值得。可是俺一个打酱油,值得咩??
常常问我自己,如果没有读phd会是怎样~~ 我给自己的答案是,n多的人把phd毫不犹豫
地quit了,而世界上>95%的人都没有这个学位,说明了没有这个学位,其实也没啥。凭
借我对自己的了解,应该不会有啥遗憾~~~ 而我空白的花样年华,在这辈子的回忆中,
都是一个缺憾吧~ 这是人类永恒的主题呢,作为人类,我觉得自己免俗不了。。

俺心里也很清楚,phd对于自己来说就是一个跳板,一个在硕士毕业后的过渡,是在美
国没有身份的无奈, 是已经这样了,就只好这样了的~~ 无奈无奈无奈~~~~

人,如果有选择,就一定要做自己想做的事情,爱做的事情~~ research也是一种,但
可能不是你我的菜~~~ 所以有可能,还是选择自己认为是有意义的事情好吧~~

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...