Skip to main content

标 题: Re: 藤校毕业的有50W的收入吗

http://gengwg.blogspot.com/

[ 25 ]
发信人: heli007 (随大流), 信区: Military
标  题: Re: 藤校毕业的有50W的收入吗
发信站: BBS 未名空间站 (Mon Dec  8 00:56:40 2014, 美东)

首先我也是写代码的,马工cash能有20万就很不错了,运气好加股票也远远不到50万,
而且仅限湾区

然后来讲讲我认识的一个藤校医生的收入

开始我不信,但偶然有机会和他一起工作过,才了解

此人一年70%时间看病的收入80万,还不算他的科研收入和行政收入还有各种可支配经费

他不全职看病,是因为不想承受过多压力,还想留名,实现人生价值

每天看病,带学生,做科研,轮转进行

医生有很多科目,最差的出来开诊所也是20万起,最好科目的不封顶,混的好的百万以
上,马工运气好能到40万不错了

这就是差距,不要坐井观天


【 在 swjtuer (灌水和coding都要敲键盘) 的大作中提到: 】
: 把孩子整那么累,就是为了以后收入高。过去高收入的行业无非是医生律师,职业门槛
: 高,但本质上还是靠专业技术吃饭,和码农没区别。
: 现在码农收入一年一个样,牛X点每年收入三四十万没问题,而且本科毕业就开始挣钱
: ,医生律师要苦到三十以后才能出头,欠着一屁股的债,工作压力比码农大多了,还有
: 社会风险。
: 码农的一大好处就是入职门槛低,本科就行,不需要professional school的毕业证,
: 投入小产出大。关键是容易培养小孩的兴趣,可以从小做起,比如去上summer camp。
: 医生律师都是好遥远的事情,为了十年以后才可能兑现的职业,push娃去学一堆课,很
: 残忍。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...