Skip to main content

另外请推荐提高职场情商


发信人: pzlife2014 (pzlife2014), 信区: JobHunting
标  题: 大妈再就业了,另外请推荐提高职场情商
发信站: BBS 未名空间站 (Wed May  7 21:46:25 2014, 美东)

博士毕业后,在一个中型公司干了3年多,大约1个月前被裁员,
因为公司不景气,但其
实不难发现,被裁的几个人都是每个小组里最差的、最可有可无的人。这话不是我自己
想的,是在裁员后,头儿说的,就是xxx不错,就是对小组的影响力比较小。(说白了
,就是没什么用。)

回想自己这3年,思想上确实很懒惰,就满足于把交给我的任务完成了,就完事儿了,
从来也不争取表现一下自己,也不努力提高自己的技术。我一直以为我们公司奖金少,
现在我才从一些渠道知道,其实只是我的奖金少,我同组同事就有人比我多不少,我被
裁后,同组同事还升了职。我不是妒忌人家,我就是觉得自己挺失败的,至少这过去的
3年挺失败的。自己还一直没有意识到,其实自己早就危险了。

因为没有身份问题,所以容易很多,最近很幸运的找到一个小公司,就算是成功再就业
了,工资还涨了一点儿,但还是不高,先就业,再继续努力吧。

这段时间找工作,我把那些八卦网站、电视剧什么的都戒掉了,每天学习新技术、刷题
,发现很多热门的技术我都不会,确实看到自己的不足。立志从现在起努力。

除了补习新技术,我的职场情商也要提高,其实我们头儿早就看不上我了,只是因为他
表现的很客气,我就一直没看出来。现在回想,其实还是有很多提示的。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec