Skip to main content

说到骗,科研比吸血的华尔街更残忍

发信人: lunchbreak (考不上印度理工,才到麻省理工来), 信区: Biology
标  题: 说到骗,科研比吸血的华尔街更残忍
发信站: BBS 未名空间站 (Mon Jun  9 00:35:10 2014, 美东)

科研需要大量有热情、有能力、有干劲的年轻人彻底牺牲他们的青春和前途,把最美好
、最有创造力的20-40岁的黄金年代奉献给科研事业,过了40岁他们就是所谓的薄厚药
渣了。他们没有稳定的家庭,收入微薄,频繁搬家无法稳定,要么单身,要么拉着配偶
吃苦,甚至连累后代。这其中有极少数(大约8%),最终媳妇熬成了婆,成为了下一代
的diablo。

而PI们,没办法,或者不愿意给年轻的科研工作者合理的酬劳。PI们靠什么维持科研这
种的高消耗、高浪费、高风险、超低产出的活动?靠的就是吹、骗、空头支票、泡沫、
庞氏骗局。针对下一代,各种科学馆、各种科学家的形象公关、各种兴趣班、夏令营、
各种支教,极尽能事地引导,以开发潜在奴工。

有人说华尔街骗钱、插管吸血。依我看,科研是比华尔街更加血腥残忍的活人祭祀。http://gengwg.blogspot.com/



没错,风险投资而已,人类的进步就是靠风险投资,但是风险在那里,你可以不选择。

我有时候很迷惑,如果真有上帝,为什么他要造出如此庞大而个体渺小的人群,用高风
险的变异来换取人类的进步。对人类个体来说,你可以飞黄腾达,也可以悲惨至极,也
可以选择用自己的智商和小心翼翼和随机应变来过一个平庸但安稳的人生(所以我选了
码工,因为为了我的亲人,我输不起)。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...