Skip to main content

标  题: 开始上班以后大家都怎么给自己充电?

http://gengwg.blogspot.com/发信人: altima007 (缴枪投翔), 信区: Working
标  题: 开始上班以后大家都怎么给自己充电?
发信站: BBS 未名空间站 (Sun May 24 09:15:09 2015, 美东)

1. Hard skills:就是工作相关的专业知识了,首先应该是把自己学过的东西再老老实
实的过一遍(不能毕业就都还给老师了),查漏补缺(大部分PHD都是“专精”,知识
面并不广),把专业知识的广度展开多一些;另外就是要积累行业经验,这个急不得,
除了这两点,还要应该怎么充电呢?

2. Soft skills:没钱估计也没时间上MBA,就想在网上自己学学得了,有没有好的推
荐的课程?另外在单位都是做人大于做事,跟老美扯淡肯定得懂体育,但是大部分PhD
(包括我)估计这方面都较差,有没有什么好的方法可以快速弥补一下,橄榄球篮球棒
球冰球,起码能跟老美砍上10分钟的那种。

3. Other techniques/tricks: 比如如何lead/manage一个project,如何做一个优秀的
teamplayer等等吧,烂七八糟的小技巧但是都很重要,这些该如何提高呢?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...