Skip to main content

聊一聊转行当码农的感想

发信人: playboyying (kyo), 信区: JobHunting
标  题: 聊一聊转行当码农的感想
发信站: BBS 未名空间站 (Wed May 23 22:23:56 2018, 美东)

本人是转行,从erp运维转码农,面了不少公司,没有去面flag, 拿到一个大公司的
offer, 来谈谈感受

不得不感叹, 码农起新真tmd的高, 最后给junior的比我之前senior level的钱都多

刚毕业的,只要是工科的, 算法okay, 机会很大。 文科就pass了。

如果是工作几年的,非相关的, 转码非常难,非常难。

其他要看的,学校名气,学历背景,工作经验等,-》 这些决定了你是否有资格面试

然后,就是面试环节, 如果觉得刷完题就可以了,那是大错特错了

80%公司,包括某些大公司,算法要求不高。easy -> medium水平

80%-95%公司,可能会稍微出点hard题,也不难。

facebook和谷歌,面试要看点运气的,难可以难到爆,但也可能很简单

然后就是各种虐待了, 美国大概考以下几点, 语言基础,ood, system design, 还有
就是语言特性,比如java可以面jvm, 内存管理,多线程, 随便哪一块, 就可以把你
面到崩溃。主要看面试官心情

然后,还会面各种数据库的use case等等,

还有各种实现,比如map, heap,redblacktree等

其他就是看你面哪种sde了,肯定还回问相关的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...