Skip to main content

标  题: 在FB呆的好郁闷

http://gengwg.blogspot.com/发信人: fengzhongdi (fzd), 信区: JobHunting
标  题: 在FB呆的好郁闷
发信站: BBS 未名空间站 (Fri Apr 17 19:32:50 2015, 美东)

关键是被糊弄当了data engineer,感觉工资比同级别的SDE差了好多。干的也不是喜欢
的东西, 进组半年了,一天到晚写又臭又长的 hive query,学不到什么有用的东西。

上一份工作是SDE,干得不错而且学到了很多东西,但是FB一挑拨就不淡定了,说是
general hiring,但是面好了发现只能在DE这里选组,扎进了每天写sql的泥潭。

在这里的国人同事也在抱怨管理层,FB的国人势力应该是很强悍的,但是整个DE,国人
就没有一个出头到manager level的,都被三哥压抑得好惨。

上份工作140都快下来了跳到这里,现在重新开始办绿卡起码两年走不了,干的不是自
己喜欢的东西,又觉得工资low ball, 又被压抑得好惨,好郁闷。

想转SDE也不方便,一年后才能转组,而且要manager同意,转组又要从头开始面试而且
会得罪老板。。。现在想的就是熬过两年镀个金,然后再跳到其他地方去了。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...