Skip to main content

标 题: Re: 码工人到中年转做javascript之类的是个好主意吗

 发信人: dathinker (思考者), 信区: Programming
标  题: Re: 码工人到中年转做javascript之类的是个好主意吗
发信站: BBS 未名空间站 (Mon Mar 22 14:58:07 2021, 美东)



我现在的组,就是只有我一个中国人,其余全是印度人。大家相互之间也没什么冲突和
歧视。我本人当初加入也是很想在他们的文化圈子里好好学学他们的长处。

但主要就是比较累。他们的文化结构不仅是对我如此,他们对自己人也如此。基本都拿
技术做marketing来做,不在细节上放资源。所以真正做事的人就比较辛苦,因为大家
只在乎行不行,过不过,具体执行没人care,你自己搞定。有点小成绩都在向上讨好。
现在发现全组都是演说家胜过工程师,全都是lead想着法子告诉别人该怎么做。大家也
不是扯谎之类的,但就是都在说说说说,现在有了agile,更不需要文档,怎么做大家
开个会讲讲。讲不明白再讲,这样大家看起来都很忙,好像很有干劲。


这样下去,如果哪里都如此,恐怕在IT业也干不动了啊。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...