Skip to main content

标 题: 叔当年经历的一件小事,从此决定远离学术界

 发信人: DaDaNiu (大大牛), 信区: Military
标  题: 叔当年经历的一件小事,从此决定远离学术界
发信站: BBS 未名空间站 (Tue Oct 27 16:23:30 2020, 美东)

叔当年在某农村大学城读书的时候,学校里有时有seminar,有免费的饮料和pizza,所
以我们索南索女们都喜欢去蹭点吃的,即使对报告的内容毫无兴趣,那时候就是这么人
穷志短

有一次所在的系招聘assistant professor,请candidates来作报告,于是先后来了两
个千老,一个三十七岁,另一个三十九岁。seminar的通知上肯定不会写报告人的年龄
的,当时我是怎么知道的他们的年龄,早已回忆不起来了,也许是根据他们的履历推算
,也许是听同系的索南千老里碰巧认识他们的人八卦的吧。但是37和39这两个数字,至
今却还记得格外清楚

吃着免费pizza听报告的时候,我就看着报告人陷入了沉思。年近四十岁的人,还在卑
微地寻找人生的第一份正式工作,穿着那身与自己的猥琐气质并不协调的笔挺西装,站
在台上战战兢兢地努力表现,只为了求坐在台下第一排的老教授们施舍一份工作,一份
工资比千老高一些但好像也高不了多少的工作,一份让他们搬来我们这个偏远落后的农
村小镇并且人生后半截都烂在这里发霉的工作

那一刻,我突然真正领悟了学术界的career path是什么样子。我不想在他们身上,看
到自己将来的影子

后来我在那里读完书,找了一份公司的工作,搬离了那个偏远农村的大学城,当然从此
也与学术界绝缘

直到现在,我有时喝着碳酸饮料吃pizza的时候,脑海里还是会回忆起那段青葱岁月,
浮现出那两张沧桑的面容

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...