Skip to main content

贾扬清被国人“同胞”捅刀子,被迫离开fb

 发信人: fvhaoda (好大), 信区: JobHunting
标  题: 贾扬清被国人“同胞”捅刀子,被迫离开fb
发信站: BBS 未名空间站 (Sat Mar  2 16:21:37 2019, 美东)

据在facebook的朋友透露是贾神离职的主要原因有两个(相互相关),一是贾神领导的
caffe2和onnx基本名存实亡。caffe2的生存空间是被产品团队部署(例如广告),但产
品团队决定开始使用pytorch,所以caffe2团队基本是要换事情做了。同样,onnx使用
有局限,pytorch 1.0 抛弃了onnx,所以facebook也基本抛弃了onnx,估计只有微软和
aws还在推,但可能退出也是迟早的事情。我个人觉得这是公司正常的产品线调整,砍
掉重复的项目,优化人员。

第二个原因比较狗血。贾神在facebook有十多个一手培养的人,但带人辛苦,所以他找
了个中国女director帮他管人。那个女director在弄熟了事情后,突然之间把贾神的人
都闲置了,然后吧她原来团队的人都transfer过来接受各个项目,而且私下联系了
pytorch团队(听说印度人居多,例如发起人soumith就是印度人),通过各种拉拢达成
协议,把原团队各种项目都换掉。例如几个月前TVM conf上facebook的人介绍了他们用
tvm加速广告系统的工作,估计也要被换了。贾神的老板也是中国人VP,但似乎是坐岸
观火,又或者是自身难保(据说还有更大的reorg)。

在贾神不爽的时候,阿里在湾区成立了新部门,给了贾神一个VP职位和承诺了几百人的
团队。塞翁失马,焉知非福。












Caffe的创始人,当年的华人之光,一样也逃不过被某个群体捅刀子的命运。希望他在
阿里一切安好,不会再被back stub拿去给烙印交投名状。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...