Skip to main content

为什么印度一代移民可以当当成熟大公司的

 发信人: xisanqi (三起), 信区: JobHunting
标  题: 为什么印度一代移民可以当当成熟大公司的CEO
发信站: BBS 未名空间站 (Sat Dec  4 16:59:01 2021, 美东)

华人和烙印在美国IT业都是有很多优秀的人才。没什么这些发展成熟的大公司都挑选烙
印当ceo,甚至连白人都不选。这个确实是有原因的。如果单单是语言的问题,为什么
不选白人?如果论人数,起初白人的人数没有烙印多?

以下是我的分析,欢迎拍砖!

首先,董事会资本家们要求一个可以信赖的人替他们看好钱。印度人,你如果接触他们
多了,就知道,他们对白人是非常顺服的。这也使我明白了当年印度能被殖民的原因。
印度本身的cast社会制度,使印度人对自己的等级和出身的坚守和服从,从而使得他们
对白人从心底里顺从和崇拜;这和我们华人不同,华人自古以来就有“王侯将相,宁有
种乎”的豪言,我们不相信命运,不会对白人崇拜和顺从,我们要平等。 我可见过印
度人对白人的顺从程度,我承认我不会认为自己低白人一等,把我惹毛了,我会和白人
掀桌子,印度人不会。


其次,很多公司为了节省成本,把大量的产品和服务外包给印度,甚至直接在印度开分
部,所有的工作中的服务器,代码都是互通的。印度的工程师把握了大量的公司资源。
这导致了资本家在考虑人选的时候,要保证两边的有效合作和沟通,印度人作ceo,可
以做到这一点。

第三,印度是所谓的民主国家;他们熟悉这些人知道如何抱团达到自己的利益;所以他
们在公司里和职场里,相互提携,抱团搞政治斗争。对竞争对手比如华人毫不手软。这
也是很多华人抱怨烙印的原因之一。

第四,语言优势和蜜汁自信;印度有些邦英语是官方语言,他们能准确理解白人老板的
意图,沟通毫无gap。

烙印比华人强,没有的事,全是外行人瞎起哄。

要学学苏lisa,上来就把amd一些搞ppt的烙印干掉,这样公司才会有发展。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...