Skip to main content

标 题: 吐个槽,某些同胞确实挺客观的。

发信人: bjscput (帅哥你好), 信区: JobHunting
标  题: 吐个槽,某些同胞确实挺客观的。
发信站: BBS 未名空间站 (Fri Sep  5 13:28:26 2014, 美东)

俺本人是一向对同胞比较照顾,来intern的学生,都告诉他们,该注意什么,那些话该
说,那些对他们以后career有好处。等等,即使面到同胞,也有所照顾。

这次俺求职,遇到一个挺客观的。

面试一家H开头的hadoop公司,清华毕业的高材生,因为我不刷leetcode,没注意某
个iterator的pattern,给了个Neg。其实本人不觉得有什么了不起的。只是觉得这点东
西也值得报个neg,真是挺客观的。

感谢你给了个neg,我人生有tmd完整了。

我以后会继续尽我所能帮助同胞,但是遇到您,可能要绕道走了。

----------------

想说一句,没别的意思,面试我的哥们如果是为了提携别的华人,我双手赞成。如果是
为了异族,哪对不起,我说你没什么错。

很多人没有意识到一点,也没有危机意识,壮大海外华人的势力是每一个海外华人的责任
和义务。因为我们侨居他乡,别人看你们是一样的都是chinese,内斗只适合于国内资
源严重匮乏的情况。哪一个成功的民族是内斗起来的?不团结,必然是灭亡。没有危机
意识的民族,是没有希望的。

第二个问题:
对于我们海外华人,相互多帮助,相互宽容一点,是对于一个本来 就若是的群体的向
心力。如果面试我的人放了其他国人,我双手赞成。我不是说让我过就是好,本人也没
面的太差好吧。每个人各有知识覆盖面不同。多给别人一个机会,要么别人
别人知道你是谁。这是基本的做人常识。希望面试的人看了也能学到点什么。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...