Skip to main content

单纯的物理硕士不行

 认真回答你,单纯的物理硕士不行。物理不像CS,要么就是本科,

要么就是phd,硕士很尴尬。

取决于你的具体物理的是什么:
. ----
如果你只是想“学习”物理(对物理有兴趣的人里大部分都是这一类),那么读个物理系本科就够了,不要读研究生。物理系本科已经有四大力学课程,在好的物理系甚至有量子场论和广义相对论的本科生课。有足够的课程训练带你手把手推公式,领略现代物理学里的神奇概念和思维方式(马斯克所说的第一性原理)。本科毕业后该转行转行。
. Χ
如果你想“研究”物理,创造新学问,那必须读phd,硕士是远远不够的。美国top物理系绝大部分都没有单独的硕士项目,都是phd program。但研究物理和学习物理是两回事了。我想大部分人对物理的兴趣都起源于基础物理学。真正做研究绝大部分都是和基础物理学无关的方向,搭仪器,写code做计算或模拟,很专很窄,有时甚至琐碎。就基础物理学而言,自两千年起就已经停滞了,博后和教职都很少,phd很多毕业后也得转行。. check 1point3acres for more.
.
所以,劝退一波单独读硕士的想法。如果只是想学习物理,现在网上有很多优秀的课程录像,讲义和作业,想MIT OpenCourse,Susskind minimum,足够楼主学习了。

想任性一把,就争取去申请一个好的phd项目。这个是有先例的,一个学商科的小姑娘曾经无意中走错教室听了一节天体物理的课,打开了新世界大门,去纽约工作后对物理念念不忘,自己买了科普书看,但很多概念看不懂,于是鼓起勇气给哥大某教授写信问问题,结果哥大回信了,说你这样瞎学不行,来我们聊一聊,让她直接学习量子力学教科书。最后零基础的小姑娘成功被哥大物理系录取,好像后来去了普林斯顿做博后,现在还在从事天体物理学研究

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...