Skip to main content

分享一个朋友在亚麻的pip过程

 分享一个朋友在亚麻的pip过程,给亚麻的朋友提个醒。 顺便帮忙问问能不能申诉
Context: 19年9月入职,昨天收到manager pip的告知。
AWS相关组,manager白人,组内印度 国人美国人 差不多,没啥争执的。manager一直
对人挺好的,而且每次1on1都比较positive。朋友代码贡献量,CR提交数量和ticket
handle 量也位居组里前三。最近正好负责一个功能上线,开始参加另一个长期项目,
突然被告知pip。没有任何征兆。
原因:两周前1on1的时候,manager翻出来一张ticket说是朋友代码bug造成的,没有造
成customer impact 因为是在gamma QA test发现的,后来同事及时改正。当时没说啥
,只说下次注意。然后manager突然问朋友有没有转组和跳槽的打算。这时候朋友感觉
不太对。因为之前从来没有出现过代码bug惊动manager。而且朋友一年多没出现过一次
其他代码bug
这周再次1on1的时候manager直接点破说因为代码能力要进入pip。朋友顿时傻眼
请问: 现在能不能找HR申诉或者向大组领导反映。没有超时完成任务的情况并且每周
汇报都有记录。有代码提交量,设计量,各种工作量的截图,决定是组里数一数二的。
而且那个代码的bug没有实际影响,并且CR被5个同事approve通过。
另外朋友想对亚麻的朋友说一句,能早点走还是早点走吧,别像他一样自愿加班工作超
额完成任务还莫名其妙因为i一个bug被pip 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...