Skip to main content

分享一下印度大叔传授的职场经验


标  题: 分享一下印度大叔传授的职场经验
发信站: BBS 未名空间站 (Sun Mar 16 15:14:06 2014, 美东)

学校里出来职场了混了几年了,换过工作,一直不太顺利。组里有个编程的阿三大叔,
一般闷着不吭声,这周一个晚上闲聊的时候,他突然问我,长期有什么打算。我回答既
然有这份工作,那么就接着干吧。
没想到大叔开始滔滔不绝,对我说道,你是个很好的人,你的工作质量和能力一点问题
都没有,但是你在别的方面按我观察,如果这样下去的话,你在做一个losing battle.
下面是几点你没做到的地方

1.公司里最后都是relationship,最后就是要看别人挺不挺你。别人怎么说你比你做了
什么更重要。你把个别人弄不开心了,开始有负面的谣言,最后会传得很远。这会让你
在一家公司里很难走.最后很多都是嘴里传得Propaganda,而不是你究竟做了什么。所
以一定要首先把relationship经营好

2.人需要有take the shit的心态。公司里不如意不公平的事太多了,你心生不满一点
帮助也没有,尤其是年轻人在公司里没有地位,很多时候就需要take the shit。很多
人都在被利用。你表现的高高兴兴地,对情况也有好处。你要表现出不满,只会让处境
更艰难。

3.要让你的team和领导dependent on you.你必须手上要有东西,让你的经理离不开你
,比如每次开会都能拿出一点人家不知道的东西。

4.要主动去和上面的高层经理交流,要让别人feel like a god.上层的经理是不会主动
来找你的,但是你要主动去找人家,说你在职场发展的愿望和需求,需要别人的帮助和
建议。和上层的经理也建立关系

没想到平时不说话的印度大叔,在职场上心得体会比我深多了

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...