Skip to main content

几句话快评FB

 


FB很适合成长,也是适合当跳板,但比较费心。所以有Google Offer的别来,现在需要PERM的别来,纯想划水的别来,不知道该不该来的可以来看看;


FB里面要学会躲坑,躲坑人、坑组、坑project、坑方向;


FB的文化比较独特,有牛逼之处,也有很傻的地方,没必要一棍子打死或是吹捧;挺开眼界的倒是;


现在FB是肯定走下坡路的;大环境不好,公司有瓶颈,所以指望太大成长尤其是大包裹不太现实;


但FB门槛低、容易面,糊里糊涂进来的人太多,所以是个好机会,无论NG还是Industry Hire;


说到底就是:进FB你想获得什么?跳板?包裹?经验?技术?级别?赛道?短还是长期的工作?


总体来说,在FB我个人提升还是挺快的,主要是眼界和级别。这玩意离开FB也有用。


 
但是我不是一味地给FB洗地

我就是打工的,我没有归属感

就是懒得跳槽,并不是对现状就满意

所以也没必要说我什么码农视角

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...