Skip to main content

美国企业文化

http://gengwg.blogspot.com/
标  题: 美国企业文化
发信站: BBS 未名空间站 (Mon Nov 17 00:15:41 2014, 美东)

读书的时候,感觉跟国内不一样,可以挑战老板的观点,上课时也可以挑战老师的观点
到公司后,发现美国企业的文化跟国内没啥多大差别,仍然是拍马屁说好话的人吃香,
对老板俨然是封建的那一套,‘主先臣后’,‘主倡臣和’,要顺着老板,拥护老板,
不该你说话要保持沉默,等等,对老板不能挑战,报喜不报忧。老板们和无能里的人忌
才,有点本事不会搞关系的人总是被搞得不爽,最后走人。公司里这个运动那个运动很
多,比如很多change culture的活动,然后HR和老板们组织跟员工对话,跟共产党开小
组思想汇报没啥两样,大家都歌功颂德,实际啥也没有改变。。。哎,这样的公司有人
说会完蛋,这不,公司的股票还噌噌的往上涨。。。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...