Skip to main content

从学术层面上探讨,在大公司混的道理

 
老中从小受马格斯主义洗脑,入职公司,误以为公司里就是自己家的公司,严格要就自
己,严格要求别人,总谴责自己,谴责他人技术不够,付出不够。
其实,有谁会关心你的技术不高?付出不够?公司里,大家唯一关心的就是自己的利益
。公司每年裁人7%,就算多的了。老中能上大学(美国只有30%的人口有本科学历),
够入职公司,就说明,能力远远在那应该被裁的7%之上。
既然公司裁人7%,那么,你的工作表现,只要达到中等偏下,就远远足够了,但大多数
老中,却要像在学校里一样,努力做到最好的TOP 1%。老中的努力,使公司其他99%人
看起来愚蠢,懒惰,其他99%的人,能不把你看成敌人?   
如果你真的有99%人都没有的“技术”,为何不留给自己开公司呢?为何要贱卖给公司
呢?其实,在公司奉行中庸之道,是最好的策略。 即使是你被公司歧视,被裁了,也
不至于因为你对公司付出的太多,而感到吃太多的亏。
前一段时间,有个在亚马逊工作的老中被裁,网上老中们一片叫好,都说那老中在中国
不是985学校,在美国只读了个计算机硕士,能力不够。 这TMD太傻逼了,亚马逊有多
少员工?130万,看清楚了,130万。 微软有多少员工? 18万员工,谷歌有多少员工?
13万。。。。美国有多少人有计算机硕士文凭呢???够用吗?那个老中被裁,是工
作能力,工作表献不好吗? 应该是因为老是想表现自己比别人聪明,比别人努力,在
公司与99%人敌对,造成的。  
老中思考的时候,能不能多一点理性,多一点数学,科学,而少一点妒嫉,偏见呢?  
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...