Skip to main content

这是个可拼可躺的公司

 


以我在meta的多年观察,这是个可拼可躺的公司。

小刘在躺平组都能三到五,钱还是比狗软多。老帮菜至少去了就是5,到了躺平组很爽。

以保健我自己的亲身经历,我在非躺平但是能自己定步调的组拿ee,每天开电脑时间5-
6小时,五点之后没开过机,没有oncall任务。



Glassdoor和indeed应该没这种信息。



PS 别私信我问哪个组。一方面我不想暴露自己,一方面我也不想鲶鱼来了把躺平组搞
成内卷组。


真有心直接和老板说自己拖家带口身体不好睡眠差 不拼事业只想稳定做贡献 内卷组老
板也会和你说不合适的。适合的组肯定能找到。

开口exceed闭口promotion那找的组肯定是卷。别忘初心啊。



瞎算了一下 8 年 在脸书比在微软多赚的钱:

       
        meta, msft = 0, 0

In [5]: for year in range(8):
   ...:     meta += 400
   ...:     msft += 240

In [6]: meta - msft
Out[6]: 1280

大概是1.2million

 


是的 所以我觉得脸其实还挺好的

有内卷的机会拿大包
也有躺平的机会拿400k 但还是比软麻oracle多

而且脸最大的好处是开放自由  基本不会出现被老板坑还无可奈何的情况  反抗/脱身
都有很容易的途径

【 在 nostring (尼) 的大作中提到: 】
: 400k 很可以了; 在传统公司是SVP 才能达到的收入级别。

 

 
所以我说的是“基本不会出现”

我没和Qin 接触过,但我周围的同事朋友之中,被搞不爽之后,要么打低分把老板弄走
,要么直接就换组了,最倒霉的leave半年工资全拿,最后老板帮他找新组。综合下来
我觉得没买提上说的那么惨。


当然我可能是幸存者偏差,我没在其他公司工作过。我除了第二年拼了一把,其他大部
分时间都是早十晚五,其他时间不开电脑。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...