Skip to main content

招人方的烦恼

发信人: peking2 (ECMA), 信区: JobHunting
标  题: 招人方的烦恼
发信站: BBS 未名空间站 (Fri May 16 11:41:10 2014, 美东)

对于面试者来说,准备面试,刷题很痛苦,其实招人方痛苦也不少,我随便说几句。

招new grads,没有工作经验,不能马上上手干活,需要时间train,所以一般都不会招
太多
招工作经验<=1年的,第一对于忠诚度有一定的怀疑,第二对于工作经验有了一定的
expecation,如果还是new grad的水平,还不如招new grad呢,起码白纸一张
招工作经验2-3年的,很多人在工作就是打杂,没做过什么正经八百的项目,或者工作
经验也不一定对口
招3-5年工作经验的,就要上很多system design了,希望design的能力很强
招5年工作经验以上的,就要另外看有没有leadership了

所以如果大家面试没成功,根据自己的工作年限可以对照一下,看看有没有什么可以改
善一下的。另外面试成功拿到大offer的,也一般是发挥了自己工作经验的优势的。根
据我的观察,能够满足招人方expecation的还是少数。http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec