Skip to main content

标  题: 说一个我知道的国内码农的CASE吧

FatWallet Coupons and Deals发信人: lajixiaoliu2 (lajixiaoliu), 信区: Military
标  题: 说一个我知道的国内码农的CASE吧
发信站: BBS 未名空间站 (Mon Oct 12 15:36:10 2015, 美东)

某著名公司。一老码农,被PM(女)要求改需求。PM对上边一直是笑吟吟的,从来不和
码农说话,只发邮件,也不回邮件。这回改需求催的太紧了,技术上又不好做,根本不
是PM想的那么回事。这哥们发邮件给PM,PM不回,这哥们就去找PM了。

PM说,我很忙没空。这个需求很简单,我不觉得是个问题。
这哥们就在那说,阿这个BLABLA,不是那么简单阿要该DATA MODEL BLABLA,整个系统
要改阿。说了半天,这PM眼睛都没抬起来过。

后来不知道怎么的这个PM突然就怒了。一拍桌子就站起来了,然后就开始吼:

“草拟吗的!让你改个需求是抬举你,你她吗罗洛索索没完没了跟苍蝇似的,公司招你
干什么吃的,草拟吗的废物点心!”吼的整个大办公室里都听得到。

那哥们脸涨的和茄子式的,可能从小到大太久没被这么骂过了,就要还击的样子。立刻
办公室里站起来两三个男的围了过来护花。一个MANAGER指着这哥们鼻子说:滚回去。

后来这哥们没日没夜搞了一周,把需求改好了。然后第二周他被开除了。开除。没有N+
1。

再后来有次和大老板聚餐,大老板说此人”不会做人,认不清自己的位置,去哪里都得
被淘汰“。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...