Skip to main content

标  题: 在美国混大公司(二)

http://gengwg.blogspot.com/发信人: helloguys (Skywalker), 信区: Working
标  题: 在美国混大公司(二)
发信站: BBS 未名空间站 (Fri Jul  3 15:48:05 2015, 美东)

提到“混大公司”,有的朋友就认为是玩虚的,日子长了会荒废武功。

其实这是“同桌吃饭,各自修行”。武功废不废,取决于自己而不是公司。

楼主是技术控。虽然没有专利,但自己专业的书出版了两本,自己专业的顶级认证也拿
了两个。但楼主从来不张扬,在电邮签名中也是“深藏功与名”,不露山水。有老板甚
至对我说:“为啥不在签名中写上你的认证呢?某某只是初级认证,也写了一大堆。”

楼主并不是谦虚。俗话说“无利不早起”。做一件事要看有什么用处。如果是写简历,
或者求职面试,自然有多大吹多大。但在大公司,龙蛇混杂。一条基本原则是“Do not
volunteer information”。人家不问,你不必说,更不需要写在签名里。一两个认证
,在大公司 P 都不是。反而给别有用心的人用来做弹药--“某某人是XXX认证,这个
工作交给他最合适了”。或者“某某人是XXX认证,居然犯这低级错误”。

又例如,在某次架构重组中,楼主调到另外一个组。工资没变,但却是组中最高的。正
式的 title 是 architect,但楼主把电邮签名写成 engineer。写 architect 除了招
人忌妒、把工作推给你之外,半点实惠也没有。

有人觉得这样很 WS,不能与阿三竞争。我只能说人各有志,不能强求。做总统收入还
比不上许多 P 民。有人选择做总统,有人选择做 P 民。

在公司省下的时间,当然不要浪费。要么接点私活,增加一下收入。要么自己充充电,
技术也好、项目管理也好,不要书到用时方觉少。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...