Skip to main content

postdoc和老板有矛盾,要不要跟老板通气?

http://gengwg.blogspot.com/标  题: postdoc和老板有矛盾,要不要跟老板通气?
发信站: BBS 未名空间站 (Mon Nov  3 21:11:30 2014, 美东)

一个同事,postdoc,最近被老板催得很厉害,每周都要update manuscript并且和老板
讨论,而且不管这一周postdoc是不是有一个4天的学术会议,也不管这个postdoc还要
帮collaborator做一些工作。

这个postdoc人很好,编程也很牛,曾经是码工,不过年纪比老板还大,做事比较追求
完美,也有点固执。现在他整天收到老板的push和criticism,他说自己整天几乎不干
别的,老板还是很多地方不满意,他心情很不爽,还说老板这是骚扰,要去学校举报。
我建议他去和老板谈谈,他坚信就算谈了老板还是不满意。

老板人很好,就是几乎不说鼓励性的话,评价工作的时候,就只说哪里不好。而且催你
的时候,从来不管你手头上有多少事情,经常一段时间不管不问,问起来就要求第二天
把结果发给他。另外,老板想法经常变来变去,今天让你用这种方法做,一个星期以后
反问你为什么不换个方法,往往变个两三次才稳定下来,但每次学生都得认真做。最近
对这个postdoc变得更push了,猜测老板的初衷是希望postdoc快点干活,因为他明年二
三月份合同就到期了,到现在还没文章(只有一篇马上要投),顺便确保他做的工作方
向正确。老板在过去的一年多里从没有push这么狠。有次和老板吃饭,老板自己说不知
道拿这个postdoc怎么办。

现在这个postdoc跟我讲他要quit,我觉得这样对他、对老板都没有好处,因此想帮他
。我应不应该跟老板讲一下postdoc的情况,说明严重性,并且建议老板少push他一下

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...