Skip to main content

今天三观完全被毁了

http://gengwg.blogspot.com/发信人: Tianzi (Sun Scracher), 信区: Biology
标  题: 今天三观完全被毁了 (转载)
发信站: BBS 未名空间站 (Tue Apr 15 18:36:06 2014, 美东)

发信人: westwooddog (小土狗), 信区: PhotoGear
标  题: 今天三观完全被毁了
发信站: BBS 未名空间站 (Mon Apr 14 21:32:19 2014, 美东)

实验室之前有个三哥,在老板这里混了三年,各种遊手好闲胡搞乱搞,啥数据都没做出
来,连阴性数据都没有,老板不能忍了去年把他开了,据说是老板人生中开除的第一个
人。然后把他的课题给了我,这9个月来我把整个课题都重做了因为他做过的东西简直
是奇葩的集合,科研的经典反面教材,都无法一一描述......总之就是你能够想象的胡
编数据乱搞data混日子的典范,还耽误了这个课题三年时间(而且这人满嘴跑火车,第
一次和我聊天,张口就撒谎把别人的工作说成他自己的)....

这三哥被开以后在老板的介绍下去了竞争对手实验室(汗......),听说也是没做出来啥
,前一阵还听说要回印度了....结果人家今天回来告诉我们,他拿到了某很好的大
学的助理教授职位!!!四年博后,别说一篇文章没有,连数据都没有这样也行?!(
他之前还告诉过我说他找不到任何工业界的工作,因为几年博后啥数据也没有,人家都
问他干啥了来着....)

后来听知情人八卦,三哥还在我们这里时去开会,偶遇一位大牛,然后就一通忽悠,那
位大牛被这位青年三哥的“睿智”折服,深深记住了他,后来大牛去了一个系当系主任
,急需招募自己人,于是就联系了他.......这可不是个烂校,因为同时间我还知道另
一个拿到这个学校教职并且接受了的女孩,她有两篇一作Cell.........熟悉我们这个
领域的人都知道现在干我们生物千老的,一篇文章没有连像样数据都没有还能空手套白
狼到不错AP position的简直是神人.....

然后我手贱查了一下,发现这个被青年三哥“才华”折服而念念不忘的大牛系主任也是
位三哥......当你看到了结局,竟然就猜到了开始.....

--
不漏言,不妄语
下笔如刻金铁
眼过必留心底
做一个经得起历史考验的围观党~

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...