Skip to main content

说谎被捉到了,面临丢工作,求建议


发信人: arowa (bufffly), 信区: Dreamer
标  题: 说谎被捉到了,面临丢工作,求建议
发信站: BBS 未名空间站 (Sat Sep  6 04:23:53 2014, 美东)

新换小老板,不摸底。最近数月,出了几次状况,
1. 某日突然大老板找我谈话,说有人汇报我和某人上班吵架。(基本是小老板说的)
事后调查,无此事;
2,另一日,小孩生病,在家,我要赶一个项目,email小老板,我在家工作。她连发三
四封信,问我做什么项目,计划多少时间,然后说,计划外,都算病假;
3,我们工作要出去见客户,小老板要求我share canlendar, 还要把每个会的内容,
都邀请她参加。详细列明情况。

星期四,终于出事了。星期三我熬夜干工作,晚上没睡好。第二天上午,觉得累,想下
午早些回来,就在日历上写了两点外出开会。这个会本来有,但是我不是必须参加。小
领导马上追问会议详情,内容,然后表示要派个人跟着我去。我一看架势不对,就跟她
说客户打电话来取消了会议。
没料到的事情出现了。周五,今天,小领导竟然在数据库里找到了客户的名字,打电话
过去核实有没有跟我周四通电话。然后报告了大老板,大老板跟我谈话前,竟然把这件
事escalate到了大大老板那里。和老板下班前meet 了,我没承认。大老板要求我周一
把详细情况按时间顺序写了周一交。
现在事情严重了,我有email证明这周本来有会。但是时间不明。但是她抓住我说客户
打电话取消这个事情做文章。求建议。http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...