Skip to main content

想转CS的,下决心很重要


俺当年的决心就很大,和PHD的老板彻底掰了,连奖学金都搞没了,后来半工半读拿下
CS的master。当时先交了两个学期的学费,生活费要靠打工来挣,后来有了半奖,不用
打工了,学习的劲头更足。

现在回头看,和老板闹翻有点伤人品,经济层面损失很大,虽然当时奖学金也没多少,
但对穷学生而言,就是唯一的收入,但转CS的决定还是明智,当年不吃苦,现在可能更
苦。

现如今国人有钱了,读自费不会像当年那么费劲,让烂专业的PHD见鬼去吧,读了没出
路,除了浪费时间,没有任何意义。

----------


不是说贱。  中国人就是爱敢潮流。  现在CS hot了, 中国人就一大批的进来。  以
前, 好像什么international business也红过。。。 根本就没想过, 自己喜欢做什
么。。。 我觉得我和很多猥琐男一样, 对CS谈不上喜欢不喜欢。。。 这几年, 做多
了, 就有点厌了。  所以, 换行业,别看着这板上的这些报offer的, 然后想, 我
要转CS。。 CS是hot, 但也不是那么容易, 工资也不是那么的高。 要天天盯着电脑
吗code, 还是要谨慎

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...