Skip to main content

现在真的是很难招人。

发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 现在真的是很难招人。
发信站: BBS 未名空间站 (Sat Jun 16 00:13:27 2012, 美东)

现在真的是很难招人。

部门里面还有两个位置。就是找不到人。面试了一大堆人。米国人能说但不聪明,中国
人聪明但不能说,三哥又聪明又能说但ATTITUDE又不好。好容易有个不错的吧,OPT又
快用光了。

还有现在的留学生素质真的不咋地。居然好多基本的英语都说不清。各位小朋友就别忙
着在MITBBS混了,先得基本的口语能过关吧?不然哥想帮中国人都帮不上忙啊。

来面试,你总得准备好简历吧?总不能让哥临时跑回去打印,还得给你附带打印一份吧?

米国公寓的热水该是免费供应吧,好歹来之前洗个头,洗个澡吧?搞得哥在HR面前都灰
头土脸的。以为哥把当民工的亲戚给找来了。

自己以前的经验总该讲得出来吧?简历上天花乱坠,面试时一问三不知。

还有国内的简历就不要吹得太过了。你英语磕磕碰碰,非要说自己在国内外企业如何如
何。还有非给HR说自己当RA一年拿6万的(哥还真的找他的教授核实了,那中国人教授
只好说:年轻人不懂事,把(学费+RA的钱)x2折算成了工资了。(因为一周20小
时)


哥也是过来人,真的存心想帮帮中国学生。但是你们也得给哥争口气啊。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...