Skip to main content

烙印已经骑在老中头上拉屎了

发信人: mikeandIily (mike), 信区: JobHunting
标  题: 不要为烙印开脱了,烙印已经骑在老中头上拉屎了
发信站: BBS 未名空间站 (Fri May 16 20:34:05 2014, 美东)

千万不要在自己衣食无忧的时候,抱着所谓的大胸怀,为烙印说几句话。
自己一时意识不到问题严重性就算了,不要还发帖为烙印说好话。
我只想说:烙印黑中国人黑的还不够吗?
凡事都有自己的原因,可是明摆着的黑人还要满怀感激的自我反省吗?
电面第一轮写红黑树插入,O(n)时间判断字符串是否由重复字符串组成,用kmp写
strstr,或者迟到打入电话,不断打断你,不断否定你,不断唉声叹气,不断传来笑声
,提前挂电话,你觉得这些正常吗?
更有甚者,烙印recruiter面试前通知你不要来了,可是硬是去了发现没有这回事,原
来烙印要保护接下来面试的自己人;烙印recruiter生改你的简历,直到迂回被录取,
被hire manager查出来,你们觉得这些还正常吗?
有没有国人会如此黑人的?
相比烙印对烙印,只要能护就护能录就录,你们还觉得正常吗?
老中要觉醒阿,不要再执迷不悟了,不抱团,再强的老虎也都不过群狼。
http://gengwg.blogspot.com/

 发信人: onetiemyshoe (onetiemyshoe), 信区: JobHunting
标  题: Re: 不要为烙印开脱了,烙印已经骑在老中头上拉屎了
发信站: BBS 未名空间站 (Fri May 16 21:07:11 2014, 美东)

那些没有被黑就感恩戴德的人,
想想:
为什么这么多公司只有烙印
老美老中都很少? 
思科,高通,VMWare,Adobe,Ebay
这些曾经都是老美老中烙印的共同天下。

为什么这么多公司高层烙印
云集,提升神速, 老中却很少高层
甚至没有影子? 
谷歌,微软,IBM

为什么有的组几层烙印在上面
一环有一环?

为什么有的组80%烙印?

高通老美旧员工被烙印老板刁难, 80%都是10年以来外国人,多半是烙印:
http://www.sandiegoreader.com/news/2011/mar/09/citylights1-amer

思科/IBM:慢慢砍老美员工, 外包给印度和印度h1b工:
http://www.networkworld.com/news/2009/031209-cisco-downsizing-o

VMWare大换血,老美砍人,印度加人:
http://www.mitbbs.com/clubarticle_t/ITRelief/31112045.html

姑息养奸, 后果自选
http://www.mitbbs.com/clubarticle_t2/ITRelief/31111643.html

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...