Skip to main content

标  题: 职场上不可软弱可欺

发信人: onlyrichme (就是有钱), 信区: Working
标  题: 职场上不可软弱可欺
发信站: BBS 未名空间站 (Fri Oct 20 03:45:55 2017, 美东)

人善被人欺,马善被人骑、一个人善良到了软弱的地步,往往成为大家的笑柄。由此人
无论在职场,还是在人生的其他方面,都不要做一个过于善良和软弱的人。使自己变得
强悍起来,这种心态很重要。

在职场上,首先要掌握大量的业务知识,不能让同行和同事,觉得你在业务上太差劲。
比如大学里的教授,如果专业课教的不好,论文质量太差,就会被同事们笑话。尽管能
当上教授很不容易,但是在教授内部也分三六九等。所以在职场上,要比别人懂得更多
,这样别人就不会嘲笑你,也不敢再欺负你了。
其次,在职场上要善于结交朋友,以朋友的威势壮大自身。使人觉得你的路子很多,实
力很强。这样大家就不敢小看你。再说,一个善于交友的人,也能够化敌为友,当身边
全是朋友,还有谁能够欺负你呢?巴结讨好你都来不急。

再者,职场上要得到上司的重用,这样那些想对你不敬的人,就会知道你惹不起。因为
上司都看好你,所以他们对你也不敢鸡蛋碰石头。背后有上司做老虎,其他的各种心怀
鬼胎的动物,还不落荒而逃。

最后,自己也要注意自己的言行。不能让人抓住辫子和把柄。因为是我们自己教会别人
怎么对待我们的。如果生活中,自己都不自爱,不敢于为自己做争取,不敢自己维护自
己的尊严和形象。表现出一副可以欺负的挨打像,那么欺负你的人就不会心慈手软。

所以说话办事要斩钉截铁,不能犹犹豫豫,不能畏畏缩缩。敢于对人说不,敢于指责别
人打断了你的讲话,敢于对惹你生气的人说出你的不满。敢于对盛气凌人的人以牙还牙
。还要敢于争锋相对,不怕产生冲突。总之,这些都有助于我们从气质上改进过于懦弱
可欺的形象,由此改变整个人生。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...