Skip to main content

标  题: Re: 我也凑热闹说说我知道的pip

[ 10 ]
发信人: synaesthesia (Pirate), 信区: JobHunting
标  题: Re: 我也凑热闹说说我知道的pip
发信站: BBS 未名空间站 (Sat Oct  8 15:30:12 2016, 美东)


你老当年的事情,至今还在这里发这种幼稚的牢骚,也是白混了。

要我说这是多么好的一个机会啊:
1. 你老板是 senior director,意味着在他手下有充分的上升空间。
2. 你老板已经明确告诉你可以给你提供资源,你马上就可以要求当lead甚至做manager。
3. 我老在公司混了这么多年,可以负责任的告诉你:公司里没有不能做的项目。项目
成功与否在于你如何定义它的起点和终点和如何定制它的审核标准。另外就在于你投
入多少人力物力。难不是问题,问题是你要让你老板、你老板的老板、你老板的老板
的老板都知道它很难很难非常难,但是你能做而且只有你能做,但是你一个人做不了
需要一个足够大的团队配合你做。

至于最后做出来的是什么东西,trust me, nobody gives it a shit.

你的印度老板曾经给你了一个很好的晋升的机会,你没有去把握。你去HR那里把他
告了,然后到今天还以为自己做了件很硬气的事情。我如果是你老板,也只能摇头
苦笑了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec