Skip to main content

学术界的黑是制度性的

这个制度就是mentor制度,实际上和传统手工作坊师傅带徒弟类似,只是不象手工作坊
的徒弟还要兼职当家庭佣人。这个制度催生了推荐信制度,最终导致了和封建农奴制类
似的人身依附关系。而且因为有推荐信制度,这种人身依附关系变成了长时间甚至终身
人身依附。

而当20出头的年轻人刚刚读博士的时候,人生阅历决定了很难作出最佳的选择,所以找
到好导师很大程度上要靠运气了。智商和情商都高的,毕竟非常少,而且情商高的年轻
人大部分也不会喜欢学术。

更黑的是,如果找不到好导师,毕业的时候很难找到好薄厚位置,于是进入恶性循环。

好在有识之士已经意识到了,这种局面发展下去不但对弱势的博士博士后们不利,对整
个学术界发展也不利。已经看到有太多的人品和水平都很有疑问的法考题阻碍下一代人
才的成长了。很多地方正在酝酿改革。比如取消单一导师,至少在薄厚时。但我认为还
很不够。应该建立一个比较客观的衡量指标,对法考题们进行奖惩。比如,如果某法考
题自己是个牛人,经常发牛文,但所有发牛文的薄厚甚至拿了grant的都找不到美国本
土的法考题工作,那这个牛人就是有问题的。还有,应该建立数据库,把所有领过政府
的钱的法考题都列入,追踪他们的博士和薄厚的出路,作为公共信息资源。如果他们的
博士和薄厚都混的很不好,那么就应该警告甚至减少给他们的钱。就是说要建立对法考
题的监督机制,否则某些牛一些的坏法考题都快到了无法无天的地步了,而好法考题却
得不到奖励。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...