Skip to main content

标 题: Re: 新手弱问一下关于RSU

发信人: dfyx (dfyx), 信区: JobHunting
标  题: Re: 新手弱问一下关于RSU
发信站: BBS 未名空间站 (Wed Jul  5 19:03:25 2017, 美东)

RSU和现金差别不大,最大的区别在于第一年,现金自然立刻到手,RSU一般要满了一年
才给你(看合同)。
大多情况都是分N年拿(多数情况N=4),第一年满了以后给你1/N的RSU(像amazon第一年
给1/20的另说),之后每个月或者每个quarter按比例给,这时候和现金没多大区别了
。RSU到手的时候类似现金,税也已经扣除了,例如规定给你100股,到手可能只有60股
,其中40股为税。会有一个当前的执行价格,当你卖RSU的时候会有盈利和亏损(相对
执行价格),卖的那年要对这部分盈利亏损要报税。

一般情况下,Offer合同的RSU不会拿不到,就算PIP也能拿,除非合同有特殊条款。之
后根据Performance奖励的RSU是没保障的,不过一旦给了,和起始合同里面的也没区别。

--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...