Skip to main content
发信人: qwxqwsean (qiu), 信区: Military
标  题: 在同一个公司打工一年以上的人大多有问题
发信站: BBS 未名空间站 (Sat Jun 14 10:55:23 2014, 美东)

我在三十几个公司工作过, 按我观察和体会, 无一例外, 和每一个老板都合作不
愉快, 即使你一开始热情洋溢地工作, 一二三个月后, 你会发现没法再卖力地做
, 因为你发现你身处一场纠纷中。 结果是你要么像你的同事们一样斗懒怠工, 要
么干脆辞职走人。 

在同一个公司工作一年以上的人, 也就是基本上不跳槽的人, 一般都有问题, 这
个人要么是很笨工作业绩很差, 要么是不笨但故意怠工做怪。

除了长期呆在茅厕里不走还觉得气氛很合适, 说明这个人可能存在思想品德方面的问
题外, 在工资方面, 这个人的收入通常明显高于他的劳动贡献, 他不跳槽的重要
原因之一是, 比如他一个月工资3000元, 他只付出了价值1000元的劳动,
 算算挺合算, 也就不跳槽了。 

啥叫怠工,想想美国大学里拿10元/小时但卖力指导学生的tutors, 和年薪十几万
但混日子不干活的教授。 
发信人: qwxqwsean (qiu), 信区: Military
标  题: Re: 在同一个公司打工一年以上的人大多有问题
发信站: BBS 未名空间站 (Sat Jun 14 11:02:42 2014, 美东)

一般在一个公司干了三五个月就应该辞职了, 这个时候, 经过实践摸索, 你已经
熟悉了你的岗位工作内容, 该学的基本上都学会了, 而你再看看你已经熟悉了的老
板, 上司, 同事, 下属, 大家斗成一锅浆糊, 各个人是如何的可笑可叹, 
你到底还愿意在这个茅厕里继续呆多久?     http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...