Skip to main content

标 题: 我个人学cs的经历

发信人: DreamChaser0 (光辉岁月), 信区: JobHunting
标  题: 我个人学cs的经历
发信站: BBS 未名空间站 (Wed Oct 11 06:08:06 2017, 美东)

我从开始学计算机到现在应该是接近2年半的时间。
来之后的第二学期选了一门数据结构与算法,觉得很感兴趣。
14年第一年的暑假没找到实习就开始自学编程。
入门的语言是 Udacity 的 intro to java programming。然后是python in action。
然后第三学期上了数据库,AI,模式识别。一知半解。
第四学期学的算法几何,机器学习,数据挖掘。很用心。
第五学期,大数据,一个跟视觉相关的课。
最后一学期,刷题&准备毕业。
到现在 lc + poj 一共刷了500题。
所有我能搜到的对找工作有帮助的培训我都上过,九章,直通硅谷,包子,太阁,
laioffer。
我所有计算机本科的课程的书我都浏览过,知道对找工作没用,也不大有动力学。
还有一堆,github,博客,youtube视频,公开课,网课的网站我知道十多个。
跑酒吧跟白人黑人networking,跟印度同学混过,让教授帮忙找工作过,招聘会也跑过
,实习也有,学校的硕士博士,教授导师,所有我能接触到的,全部谈话一遍。
一共有10个公司联系,几个OA挂,几个hr轮挂,2个电面挂,onsite 1家。
我也知道自己水平马马虎虎,但是时间和经济上的限制也不能忽视对不对?
中国高考每年考生700万人,美国h1b去年8万的名额7000给了大陆出生的人。
那这件事是不怎么容易。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...