Skip to main content

其实大家不要瞧不起三线公司

发信人: dynkin (化神奇为腐朽), 信区: JobHunting
标  题: Re: 拿到个Offer,该不该接
发信站: BBS 未名空间站 (Sun Mar 12 16:54:06 2017, 美东)

其实大家不要瞧不起三线公司。一个公司从创业公司变成行业第一,一般要经历两次大
的转型。第一是从创业公司变成成长型公司,第二个是从成长型公司变成行业领袖。所
谓的行业领袖,可能就是大家所谓的三四线公司。

每个人当然可以希望能尽早挤进一个创业公司,但是必须经历的两次大的转型其实不见
得比换工作的变化小,甚至于说换工作以后工作日常的内容变化更小。

以至于你常常可以看到某技术牛突然就换组换公司或者找到新方向了,甚至于重返学术
界,其实也是没捱过转型干得不爽的原因。其实技术牛归根结底可能都有些创业洁癖。

三线公司的缺点是体量大转型慢,所以碰到普通经济周期也死不掉,但是碰到行业更替
说不定就不行了。不过普通人职业生涯也就30年,如果不是倒霉碰到行业更替应该不会
超过一两次。但是如果去小公司反而换工作的频率更高。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...