Skip to main content

标 题: Re: 一个hr1044就可以看出很多华人骨子的卑劣性

发信人: xisanqi (三起), 信区: JobHunting
标  题: Re: 一个hr1044就可以看出很多华人骨子的卑劣性
发信站: BBS 未名空间站 (Wed Jul 17 12:50:42 2019, 美东)

又一个糊涂虫,看你的回信好像是在IT业。任何一个好的产品占领了市场,在美国又有
好的产权保护,基本上可以做吃山空,这叫红利延续效应。我曾经在一个产品上工作过
,这个产品是一帮子老白创建后被收购,在后来的10多年里,这个产品无数的projet基
本上都以失败而告终。但这不妨碍每年30%到40%的营收增长,你告诉我为什么?

微软如果没有office和windows曾经的统治地位,哪里来今天office365云的辉煌?再说
,云这个东西大家都做,我不把这个成绩算在Nadella的身上。还有一个公司好与不好
,领导重要,工程师也很重要。一个傻逼a3 manager招了几个做牛做马的华人工程师,
照样出成绩。

一个企业因为有划时代的产品,比如微软,google,Adobe,不可能一夜之间倒闭,缺
乏创新,只有在有更革命性的产品,才有可能被替代。cisco,juniper(好啦,a3创建
的,看看是个什么熊样),摩托罗拉,ford的信息部门,都是被a3占领的很好的例子。
a3是哪有肉,就像苍蝇和秃鹫蜂拥而至,直到把这个公司的红利吃紧,公司进入平稳期
;当有下一个目标,就立刻弃船逃离到另一个鲜肉上。

好吧,即使你是在IT业界,肯定时间也不长。没有见过资质平庸的a3靠下作卑鄙的手段
,搞走自己的同僚和上司,靠着拉帮结派,a3支只提拔a3的伎俩上位的吧,没看见华人
为了蝇头小利内斗得你死我活吧。

不要做一个像你的名字的人,否则只有两种可能:你就像那些脑满肠肥的议员做一个蠢
驴;你就像被a3操过的婊子,只会为a3呻吟。争论到此为止,对一个装睡的人, 怎么
也叫不醒。


【 在 chefscut (jerk) 的大作中提到: 】
: 所以阿三控制的美国IT界完蛋了吗?阿三CEO把哪些公司搞倒闭了?比如微软肯定已经
: 倒闭很久了吧?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...