Skip to main content

标 题: 现有体制,National Lab远远高于高校tenure-line

 发信人: minyeon (敏妍 - 轻度抑郁), 信区: Faculty
标  题: 现有体制,National Lab远远高于高校tenure-line
发信站: BBS 未名空间站 (Wed Mar 31 04:32:51 2021, 美东)

1.

NL最快捷进人一般从master program开始挑选
PhD期间跟研究员导师一起完成1-2个国家大项目
读书差不多6-8年搞定
毕业老板也升级到PO,学生进NL做research scientist PI(这一步多数strictly要公
民)
6年后变主任研究员,找高校直接match正教授

这样不过8+6=14年,35-37岁

2.

假设post期间被NL挑进去(这一步可能多数也strictly要公民)
3-5年post发表记录不错,多数只能转staff scientist半独立千老
极少数(个位数)拿了院长奖,老板又不排挤的可以转PI研究员
6年后变主任研究员,找高校直接match正教授

这样8+3+6=17年,40了

3.

第1.2基本是给公民走的路
普通外国人PhD 6-8年,post 2-5年,ttap 6年,to Full 5年
最快6+2+6+5=19年,慢则8+5+6+5=24年
年龄介于42-47之间,这已经是很理想的情况,稍微坎坷一下就又拖几年;所以高校里
上正教授基本都是50往上了
多数学校教学任务很重非常影响科研,所以卡在associate终老的也为数相当不少

可见对青椒来讲高校位置远不如NL值钱,升title困难被压得很厉害,只有外国移民没
办法才选这条路
NL项目多金额大,才是院长眼里财神爷,所以制度上就要留给自己人,把外国人堵死

国内高教自媒体过于误导了

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...