Skip to main content

不換工作的理由

h
 托爾斯泰在名著《安娜卡列尼娜》中的開場白一開始就這樣寫著:所有幸福的家庭都是相似的,不幸的家庭卻各自有不幸的理由。
 把這句話拿來套用在換工作上,發現:想換工作的人都各自有想換的理由,但是不想換工作的人的理由都很相似。
 他是這個領域裡的才子,年輕帥氣又有才能,因為學習力強,才進這個行業沒幾年就一路攀升到高階主管;通常到這個階段的人很容易就被挖走,畢竟是這 個行業的現象,而且都愈跳槽官階愈大,讓大家跌破眼鏡的是,這位大帥哥從不跳槽,明明很愛玩的一個人,看起來沒有定性的模樣,大家都以為一兩年後他一定會 跳槽,尤其這個行業加班已經是家常便飯,他竟然可以耐得住性子繼續待下來。
 不換工作的理由嘛,他笑著想了一下,用看破的語氣說:其實是我覺得到哪裡都一樣的累,與其重新開始,不如繼續留在這裡,畢竟我已經在這裡累積成績了。
 我的同事很多都跳槽離開,結果到別的地方也是重新開始,甚至比我更累,因為他們除了要適應新環境外,更要拿更多的力氣來證明自己的價值,很辛苦的。他皺了皺眉說。
 我現在雖然工作很忙,但是身體已經長久習慣這樣的工作軌道了,因為習慣,所以休假時反而可以好好地休假,什麼都不想。他說。
 另一位也是沒換過工作的女性經理人,理由同樣是工作真的很忙,但是已經習慣了,當然也有事業野心,但是她的方式是透過輪調來滿足自己學習的欲望。
 換來換去,還不都是一樣。她用看透的語氣說。

ttp://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...