Skip to main content

建议group on site 之后的social不要留到最后走

发信人: xingzi410 (xingzi), 信区: Accounting
标  题: 建议group on site 之后的social不要留到最后走
发信站: BBS 未名空间站 (Thu Nov  1 20:07:12 2012, 美东)

今天最后一个离开的candidate被建议直接pass掉了

on site 之后social的时间如果是在下班时间或是下班后的话,建议大家多留意,如果
大人物发话可以离开了,就差不多该一一握手微笑道别吧。

因为大家上了一天班,都累了,想早些结束回家。再个social期间主要看你的性格跟公
司的气氛合不合,聊一轮下来大家都差不多了。那个留到最后的男生我聊过,感觉挺不
错了,可惜就是给了让人觉得有被缠住的错觉,结果被建议pass掉,真可惜。听同事讲
去年最后走的一位也是被建议直接pass掉了。

另外一个挺不错挺可爱的小孩,一出场就拿了啤酒喝,很轻松自在,像是在bar的感觉
,但是太不积极,一直站在一个地方跟别人聊,没有到处走动。也是被建议直接pass了。

找工作运气成分太重要了
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...