Skip to main content

坐在面试台的另一端

发信人: silang (思朗蒜蓉鸡香餅), 信区: JobHunting
标  题: 坐在面试台的另一端
发信站: BBS 未名空间站 (Wed May 23 02:00:21 2007)

最近公司正在积极招人,虽然还是新手,但也被拉去参加了几回面试。有一个职位是要
经常和我精诚合作的,所以欧的意见还很重要。跟大家谈一下我的感想,希望会对找工
作的人有用。

坐在面试台的另一端就觉得那些面试红宝书说的都是金玉良言。比如要准时,比如握手
要稳重,比如对自己的简历一定要熟悉,比如英语不好一定要准备答案。整个过程你的
精神面貌,你对自己的信心,都反映在你的一言一行中。公司招人的最怕找个人品不端
的,一颗老鼠屎坏一锅汤。咱们老中,这方面都不错,但是你必须让对方相信,表现的
诚信很重要。

坐在面试台的另一端的心态其实都是很兴奋的:好想这个人就是我们要找的人。如果谈
得好,整个team得人心情就会好得不得了。你不必怕,或者紧张,但必须有备而来,而
且表现出你对工作的热情。稍微过一点不要紧,但是不能不够。

真有不写follow up letter的。我推荐了一个graduate school的同学,面试完什么回
音都没有。三天后给了一句话:Hi, xx, just want to follow up to see any
decision has been made.Thanks. xxx. 这封信是给我们的decision maker的。我看了
cc的信后气了个倒仰。 这个老兄我还以为他其实不感兴趣,后来才知道他其实找工作
都快疯了。。。所以,你写了follow up letter,礼貌热情,就比这个老兄有戏。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...