Skip to main content

标  题: 在美国混大公司(四)

http://gengwg.blogspot.com/发信人: helloguys (Skywalker), 信区: Working
标  题: 在美国混大公司(四)
发信站: BBS 未名空间站 (Fri Jul 10 18:47:36 2015, 美东)

在工作中有时会遇到一些棘手的项目。老板通常都会很客气地问有没有Volunteer。如
果没有人 volunteer,老板就帮你“volunteer”了。

老中,尤其是搞技术的老中,通常没有十拿九稳都不太乐意去接。怕项目搞砸了,会累
及自己,想明哲保身。

明哲保身是没错,但不能一直这样保身。如果一直这样保身,给人的印象就是挑肥拣瘦
、工作不积极、没有 leadership。

在大公司,有的是资源,多数情况下是集体负责制,不需要过分担心会被项目拖累。挑
肥拣瘦是每个人的天性,但偶尔也需要“挺身而出”,让老板觉得你有担当。

把项目接下来,可以问公司要资源。上天很公平,愿意做 leader 的,通常都不会是最
吃力的那个。

接一些没人愿接的项目,也是刷存在感(stay relevant)的一种方法。大公司常说的
high visibility,或者 spotlight 就是说这些。

曾经有个员工,由于可计工作量(billable hours)不足,被放上了裁员名单。大公司
比较人道,提前30天通知。这员工当然要垂死挣扎,不断向上申诉,说他负责的项目如
何如何重要。

其实他负责的项目,并没有给公司带来多少利润,可计工作量又不足,平常没有人愿意
去做。正因为平常没有人愿意去做,刹那间要找个人接手却也不容易。偏偏又是政府客
户,利润虽少,但却不好得罪。最后折腾了两三个礼拜,由 director 写了个
justification,把他从裁员名单上拿下来。

大公司一次裁员几千人,多几个、少几个都不是什么事儿。一个项目多赚几个点、少赚
几个点,都足够养你到退休了。如何能让相关领导给你写个 justification,那才是值
得钻研的事。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...