Lecture Notes on Resume and a Summary
Previous Lecture Notes
⇑ Up
Next Lecture Notes ⇒

Summary
MENU

1. Resume

A resume (formally spelled résumé) is a concise summary of skills, experience and education.
A resume should be one page.
A curriculum vitae (CV for short) is an extensively detailed description of educational and academic backgrounds as well as teaching and research experience, awards, honors, affiliations, relevant skills, publications, presentations, and other details.
The word "vita" is often used for a CV in conversation or casual written communication,
although it is not correct grammatically.

A resume is expected when you apply for a job.
On the other hand, a CV is expected
when you apply for an academic, education, scientific, or research position,
when you apply for admission to a graduate program,
or when you apply for a scholarship, fellowship or grant.

It is traditionally common to submit a cover letter together with a resume.
A cover letter introduces you to a prospective employer, explains why you are interested in a job and what your qualifications are, and highlights a few achievements relevant to the job.
When you submit a resume to a prospective employer by email, a cover letter may be embedded into a message body of the email.

Examples of a cover letters are posted by career services of Virginia Tech.

What to Be Written in a Resume

  1. Name and Contact Information:
    Your residential address is most appropriate, especially if you do not want your current employer to know that you are looking for another job.
  2. Objective:
    A brief description of specific jobs that you are looking for.
  3. Qualifications [Optional]:
    A summary of qualifications that make you a good candidate for the job you are applying for.
  4. Education:
    A list of your degrees or certifications together with the names of educational institutions or programs and awarded years.
  5. Work Experience:
    A list of names of the companies or organizations that you have worked for, the location of each company, the dates worked, your job title, and duties performed in reverse chronological order.
  6. Relevant Skills:
    A list of skills related to a job that you are looking for.
    This may be combined with the qualifications listed above.
  7. References [Optional]:
    A list of references that a prospective employer may contact or request a letter of recommendation about you.

How to Write a Resume

Styles and formats of resumes are commonly classified into the following 4 types.

The following are tips on writing a resume.

Example 1.1:
A Resume for an IT Specialist Position

Example 1.2:
An Example Resume Template for a New Graduate

Example 1.3:
Example Resumes for New Graduates

Review 1.1:
Assume that you apply for admission to an MS program in Computer Science of EECS Department at the University of California at Berkeley.
Write a resume for applying for a research assistantship.

2. A Summary

There are many occasions in which information must concisely be summarized for a variety of purposes and anticipated readers.
Example occasions are:

Procedure for Writing a Summary
  1. Determine who are anticipated readers of a summary.
  2. Collect information that those readers may be interested in and/or relevant to.
  3. Skim the information from a viewpoint of the readers.
  4. Prioritize the remaining information and delete information of low priorities by applying the principle of minimalism.
  5. Organize the information with a selected style & format.
  6. Proofread and revise a draft at least a few times.

Components of a Summary

Example 2.1:
An Executive Summary of Application Software Design Guidelines

Example 2.2:
The following is an abstract of a paper entitled "Secure Routing for Mobile Ad hoc Networks"
presented at SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002).
Channel routing plays a central role in the physical design of VLSI chips. For two-layer dogleg-free channel routing, d max and vmax are the two traditional lower bounds. In this paper, we present two efficient algorithms for computing a tighter lower bound for the channel routing problem. Our algorithms successfully compute a lower bound of 26 for Deutsch's Difficult Example (DDE). The experiment on some large-scale randomly generated channel routing problems shows that our lower bound algorithms are much tighter than the traditional lower bounds, and are much more efficient than Pals' algorithm while obtaining similar (sometimes better) results.

Example 2.3:
Example Summary, Paraphrase, and Quotation posted by Purdue University

Example 2.4:
Good and Poor Examples of Executive Summaries posted by the University of Wollongong, Australia

Review 2.1:
Write an exerpt of the following paragraph
that is part of The Biggest Security Threats We'll Face in 2015 by Wired.
" In the last decade there have been numerous high-profile breaches involving the theft of data from millions of bank cards—TJX, Barnes and Noble, Target and Home Depot to name a few. Some of these involved hacking the point-of-sale systems inside a store to steal card data as it traversed a retailer's network; others, like the Barnes and Noble hack, involved skimmers installed on card readers to siphon card data as soon as the card was swiped. Card issuers and retailers are moving to adopt more secure EMV or chip-`n'-PIN cards and readers, which use an embedded microchip that generates a one-time transaction code on in-store purchases and a customer-entered PIN that makes stolen data less useful to card thieves. As a result, card breaches like this are expected to decline. But it will take a while for chip-`n'-PIN systems to be widely adopted. "

Review 2.2:
Read 6 example summaries of the same article.
Then, compare them, write critiques on them, choose the best summary, and describe your justification on the choice.

Review 2.3:
Try to comprehend the student sample 2 in Sample Executive Summary.
Then, by employing critical thinking (that has been emphasized in U.S. academia and job market), write critiques on the summary.

3. Exercises

  1. Assume that you apply for a software engineer position of a company that develops and manufactures embedded systems such as vending machines, ATMs, self-service ticket machines, and digital signages.
    Write a cover letter and a resume for applying for the position.

  2. Assume that you apply for admission to an MS program of Computer Science Department at Princeton University.
    Write a cover letter and a resume for applying for admission to the MS program.

  3. Assume that you apply for an software engineering internship of Google.
    Write a cover letter and a resume for applying for the internship.

  4. Write a one-page summary of the article entitled Experts pick the top 5 security threats for 2015.

  5. Read the 3rd section with the heading "Develop A Crowdfunding Campaign" in the article entitled A Wearables Startup Playbook.
    Write its summary in a single paragraph.
    Then, read the entire article and write its abstract with 100 ~ 200 words.

  6. Watch the video titled "Oracle Data Discovery: The Visual Face of Hadoop" provided on data analytics (so-called big data).
    Write a one-page executive summary of the video.