Skip to main content

说起老印


也是他妈的我们国人不上进。整天话题就是买房子,贷款,收租子。
要么就是让家里老人出去检点垃圾挣钱。上班就干人家老印上司吩咐
的那点东西,对付过去拉到。赶快回家看着contractor干活要紧。

好不容易有两个能干的,三锥子扎不出个闷屁来,中文都解释不清楚,
英文就更不灵。也不想着学。我他妈的好心帮中国同事整理power point slides
让他们去做presentation,人家还不领情。

老印玩弄权术,不管你多不满,人家没犯法。你要不服,就起来跟他们斗。

头一条, visibility,自己要知道大到公司小到小组的方向,每个项目
和每个任务的轻重缓急,所需要的人力物力要大概有数。只有这样,才能
开始抢任务。才能开始做自己的pet project,还得能把自己做的东西卖出去

第二条,visibility,要让别人知道你的大概工作进度,尤其是在critical
path上的东西。更重要的是你遇到问题的时候,如果进度有可能受影响,一定
要让别人知道。squeaky wheel gets the oil. 任何一个milestone都要让人
知道你又有了一个 achievement.

第三条,visibility,知道别人都在干吗,包括公司里的,甚至是公司外的,
各种各样的工具,framework, etc。首先让自己不要reinvent the wheel。
其次学会leverage别人的成果,达到你的目的。

第四条,还是visibility。present yourself! Sell your work! 利用一切
可利用的机会present yourself。project demo应该是最经常的手段。让更
多的人知道你做的东西有多大impact。注意是impact! 在你了解你们组甚至
整个公司的方向之后,告诉大家你的工作如何让大家朝着既定方向又迈进了
一步。至于你花了多大精力,用的算法多么复杂,nobody cares!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...