Skip to main content

标  题: 大公司浪费资源/拖沓, 其实绝不是因为无能

发信人: hitmantb (hitmantb), 信区: Programming
标  题: 大公司浪费资源/拖沓, 其实绝不是因为无能
发信站: BBS 未名空间站 (Fri Aug 26 16:56:09 2016, 美东)

最近天天加班,不是因为目前的项目无法完成,不是因为客户需求无法满足,而是冥思
苦想怎么样画2017的大饼来占用人力资源。

今年年初接了公司一个非常高visibility的项目,政治斗争结束以后就势如破竹,我在
business,我哥们在程序员里应外合,完美合作刷刷刷发挥糙快猛到极致,无论同级别
的白人还是三哥都直接碾压。  上面非常满意,给我的资源越来越多,韩信点兵,多多
益善。

然后问题来了,我们的设计是最精简最实际的,没有一丝多余的功能,这个项目一完成
,我就进入维护模式了,我的人力资源就会大量流失。

我现有的人员真的是来之不易,任何人从我手上抢人我都恨的牙痒痒。 我的几个项目
其中一个重要性没那么高,一个白人business的人和他的阿三程序员看出来这一点,立
刻从我手上挖了两个程序员来做一个"emergency"的项目。

大公司产品为什么那么臃肿?  为什么各种毫无意义的重写?  为什么加那么多毫无意
义的qa?  说到底,还是因为所有人都在试图吃下最多人力资源来巩固自己,打压竞争
对手。  那个白人的business的人和我是一个队,但实际上我和他是竞争关系,谁的
portfolio强,谁的项目重要,谁就能吃掉对手资源,边缘化对手。

所以星期五的夜晚,我在做自己最不齿的事情,想想怎么样多加些功能进去,怎么样夸
大这些功能,如何在内耗里胜出。

我们的设计真的非常精简,其实就是现有的功能也足够在公司内部芝麻开花节节高了,
但为了占地盘,没办法。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...