Skip to main content

标  题: 总结一下MZ国人事件

Make a Donation
FatWallet Coupons and Deals发信人: azxcazxc15 (haizi), 信区: JobHunting
标  题: 总结一下MZ国人事件
发信站: BBS 未名空间站 (Thu Aug 27 18:07:11 2015, 美东)

总结就是政治斗争的牺牲品,自己也冲动了点。

1. 此人本来是MZ的OP DIRECTOR。MZ OP VP辞职,他顶了一段时间。
2. 此人想转正成为VP,但是公司认为他不合格,空降了一个周姓的VP过来,此周应该
是香港人。MZ很喜欢香港人,里面香港人不少。
3. 周和此人不对付。此人和PLATFORM组的老大提议让他去PLATFORM组带一个新的OP队
伍。当时老大口头同意了。
4. 周得知此事找到PLATFORM组老大,告诉他他们组不需要一个新的OP TEAM,老大同意
了。

这个时候实际上此人已经中套了。

5. 此人以为自己要去别的组带队伍,就和周说自己要离队。周希望他完成手头工作在
说,他同意了。周公开了此人的离队日期。
6. 项目做的差不多的时候,此人去新的组那里做了个PPT,畅想他对于新的组的构想,
结果被当面告知新的组不需要他。这个老大从此也不怎么鸟他了。
7. 与此同时,周开始在自己的组里搞LIMIT EMPLOYEE PLAN。此人觉得要对自己动刀,
向新的组老大求救。老大说:我又不是你老板,关我鸟事。
8. 此人只好会头去找周服软。想要回自己原来的职位,周拒绝。
9. 此人找HR求救,HR说,我们不会再给你单独开一个职位。事已至此,你只能卷铺盖
滚蛋了。

于是,此人莫名其妙就被离职了。然后就是狗血的偷数据要挟遣散费的部分了。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...