Skip to main content

标  题: 少壮不努力老大徒伤悲

http://gengwg.blogspot.com/发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 少壮不努力老大徒伤悲
发信站: BBS 未名空间站 (Fri Apr 17 23:10:15 2015, 美东)

我从小就把这句话作为座右铭
所以村里的我考上985了

没想到最后我自己栽倒在这句话上面

如果说高考时候不懂专业,可以原谅
那至少,你应该努力,入学之后努力转系,可是你没有

如果说转系很难,可以原谅
那至少,你应该本科毕业的时候就转系考研
可是你没有,你选择了最轻松的保研

读了研究生,你已经意识到这个专业不好了
你至少可以研究生毕业就工作,毕竟是985,去个外企不成问题
可是你没有,你选择了最容易的路,出国读博

读博士期间,你已经意识到最后找不到工作,很多师兄师姐都是当博后了
你至少可以选择拿个master毕业,转行读统计CS
可是你没有,你还傻傻的以为自己会当上faculty

终于,毕业了,傻逼了
其他专业的室友、朋友,一起开着东方不败的猥琐男好基友,都找到工作了
你当博后去了,更加傻逼了,终于意识到自己做不了faculty
去找工作吧,彻底傻逼了


————“少壮不努力老大徒伤悲”
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...