Skip to main content

标  题: Re: SRE/devops 这个方向怎么样?

发信人: Niners (四十九人), 信区: JobHunting
标  题: Re: SRE/devops 这个方向怎么样?
发信站: BBS 未名空间站 (Tue Oct 10 16:27:36 2017, 美东)


以在下观察:
1)devops/sre 从事的人一搬年龄不少,大都没头发。
2)资薪比同级同机构SWE高一点,可能是现在供求失衡影响。
3)职位数量比SWE少,大概10:1 比例,主要是production 有一定程度大才正规化,初
创企业不会积极投入。
4)现在比较缺人,因招人门槛也不低,以及new grad大都不愿投身。
5)技术比较偏重ops和救灾经验,能买能用就不会开发。
6)职业发展主要看互联网和手机应用前景,要是不景气,SWE/SRE/Devops工作也一样
难找。
7)现在主流的devops渐渐将借日的dba, sysadmin, network eng,开发工具,SDET,
跟Infrastructure 运维归立于一身,像Google 的 SRE onsite 最少要六面,怕终生学
习的
最好还敬而远之!

发信人: Niners (四十九人), 信区: JobHunting
标  题: Re: SRE/devops 这个方向怎么样?
发信站: BBS 未名空间站 (Tue Oct 10 20:52:52 2017, 美东)

再补充第四点,由于要结合从前五到六个刚位于一身,机构职位又比SWE少 (10比一)
,那怕是已上市的也不能随便招人,小公司就更不能容忍请false positive,除非像
MAGFU大得可以有条件由老人带new grad,没经验的很难拿offer,不像一般硅工转码、
大妈待家数年靠刷题华丽登场、什么女名模网上自学等等。

另外由devops转SWE基本是mission impossible,不是能力问题,是你愿减薪吗?


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...