Skip to main content

标 题: Re: 老板说我disappoint him,因为我工作太努力了

发信人: onetiemyshoe (onetiemyshoe), 信区: Working
标  题: Re: 老板说我disappoint him,因为我工作太努力了
发信站: BBS 未名空间站 (Sun May 18 10:28:44 2014, 美东)


赞你这干活的好孩子。
这老板说的对,是个好老板。

1.  你跟老板沟通不够, 争取一天一次,
问feedback,聊你面临的问题, 说
好朋友同事的好话。

2。  你跟同事沟通不够,要有联盟。
至少3个(可以不同组). 多学说好话,
赞美别人的技巧。
逢人就多吹吹你的朋友们,老板。

再把大人物说的好话,建议反映
给你的老板,朋友们。  你给人
带good news, 自然大家都喜欢你。

3。  你缺visibility, 向老板
争取presentation的机会。  一半时间
去做presentation/hiring

4。  老中喜欢埋头苦干,一个人
干3个人的活。  这样以为就可以
拿3个人的工资了。  不是这样的。
你的职责替老板培养3个心腹, 一起
去打天下, 不管在本公司还是外面。
你把3个人的活都干了,老板想扩充
都找不着接口。   然后你burnout,
去当房屋贷款去了。  老板
啥都捞不到。 能不disappoint吗?

老中这情商, 学学【合集] 烙印情商交流青云直上的妙计 (转载)
http://www.mitbbs.com/clubarticle_t2/ITRelief/31108509.html

办公室里没小事之一 : 和群 (转载)
http://www.mitbbs.com/article_t/JobHunting/32696971.html

办公室里没小事之二: 礼貌 (转载)
http://www.mitbbs.com/article_t/JobHunting/32696973.html

http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...