Skip to main content

标  题: Tech今年要layoff 33万人

Make a Donation
FatWallet Coupons and Deals发信人: elmo2008 (aaa), 信区: JobHunting
标  题: Tech今年要layoff 33万人
发信站: BBS 未名空间站 (Sun Jan 24 00:17:43 2016, 美东)

有人预测了, 对号入座吧

    EMC: Total Employees: 70,000: Between 15% to 20% layoffs = between 10,
000 and 14,000
    VMWare: Total Employees:17,000: Between 10% and 15% layoffs = between 1,
700 and 2,500
    HP Enterprise (HPE): Total Employees 240,000: about 30% layoffs = about
72,000
    HP Inc (HPQ): Total Employees 287,000: about 30% layoffs = about 86,000
    IBM (IBM): Total Employees 379,000: about 25% layoffs = about 95,000
    Cisco (CSCO): Total Employees 72,000: about 20% layoffs = about 14,000
    Juniper (JNPR): Total Employees 8,800: about 15% layoffs = about 1,300
    Oracle (ORCL): Total Employees 132,000: about 20% layoffs = about 26,000
    Microsoft (MSFT): Total Employees 118,000: about 15% layoffs = about 18,
000 (Microsoft is letting go about 200 to 250 people every week, and none of
these are ever announced)
    Network Appliance (NTAP): Total Employees: 12,800: about 15% layoffs=
about 1,800
    Symantec (SYMC): Total Employees: 19,000: about 15% layoffs = about 2,
800
    F5 Networks (FFIV):Total Employees: 4,500: about 10% layoffs = about 450
    Yahoo (YHOO): Total Employees 12,500: about 30% layoffs = about 3,500
    Yelp (YELP): Total Employees 3,671: about 30% layoffs = about 1,000

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...