Skip to main content

換工作下一個工作決不是從天下掉下來的

http://gengwg.blogspot.com/
   很多人尋找下一個工作,通常都是在打算辭職的時候,才開始認真思索。但是,機會不是說來就來的,平常如果沒有留心經營,真的打算要換工作時,就會開始陷入一團迷惑中:下一個工作在哪裡?我還要繼續待在這個領域嗎? 
 尤其是負氣離開工作時,很容易會陷入情緒化地找工作方式;換言之,就是隨便抓住一個工作機會,先求有再說。
 那麼,該如何準備?除非你決定死守這家公司,否則,時就要思考自己的下一個工作在哪裡。
 首先,如果眼前這份工作不是你希望做久長的,卻又不知道自己下一個方向在哪裡,平常就要思考自己感興趣的工作究竟是什麼?這些工作平常都在做些什麼事?如果有認識的人在那個領域,不妨也把他約出來聊聊,詢問他平常的工作生活,這有助於讓你下定決心到底要不要跳過去。
 其次,你也可以列出一個清單,列出你對那些公司感興趣,隨時掌握這些公司的資訊與動態,等到真正要換工作時,就可以氣定神閒在面試時說出你對這家公司的長期觀察,讓面試官驚豔。
 第三,當然是擦亮自己的招牌,在想著將來要換工作的同時,記得也要活在當下,把自己的工作做出成績來,將來才有成績可以帶著走。
 最後,好好經營你的社群網站吧,因為現在的面試官在通知你面試之前,早就先在社群網站將你的歷程好好地看過一遍,你想給面試官怎樣的印象,取決於你在社群網站上如何經營。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...