Skip to main content

标 题: 国内没铁关系的话还是别做留学的梦想为好.

http://gengwg.blogspot.com/发信人: brucebrucexu (ww), 信区: StartUp
标  题: 国内没铁关系的话还是别做留学的梦想为好.
发信站: BBS 未名空间站 (Sun Oct 30 17:57:37 2011, 美东)

去年开始想尝试的,今年也尝试过短暂的一段时间,虽然国内有比较好的关系,比如,大学
老师就是部委/大学留学部门的,也没有做起来.

网上的一位老大5月份回去轰轰烈烈地搞了留学公司,血本花了不少,不知效果如何,最近
发电子邮件也不见回信,似乎做鸟兽散了.

最近时间又开始多了一点,除了做股票之外,在10月初,10000多点的时候搞了一点,同时
也在反思自己的行为.

留学牵涉面广,但是没有回头客,要心黑手狠才有前途,而且这个行业越来越窄,不是可以
托付终身的事业.

除了留学,还有勤工俭学/夏令营什么的,但是随着美国经济衰退,岗位稀少,而且只能赚取很少的佣金,和打餐馆区别不大.

再有就是MBA什么的,这种都是既得利益阶层在玩,我没有研究过,但是觉得自己不是游戏圈中的人,根本玩不了.

如果各位有美国的生员,我到可以有在国家补助的国内专门给老外读的大学,也就是可以赚点人头费而已.


所以,建议各位老大还是考虑实业为先的好!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...