Skip to main content

[职场感言] 目前来说meta是不是相对安全一些? |只看干货

  内部人员认为很可能有第二波裁员,当然不会有13%这个体量了,预计如果发生会是在2-5%,但是多次进行
. From 1point 3acres bbs
这个过程就类似挤干水分的过程:
.google  и
第一步先每个组的都无脑砍掉一部分,把完全不重要的组整个干掉,然后开始re-org合并
.google  и
第二步审计合并以后的项目,把相比之下不重要的项目全部干掉,只留必须做的事情

第三步在重要项目定好以后,审计做这些事情的人员需求.1point3acres
.1point3acres
第四步根据人员需求情况,把多余的人砍掉

第五步明年PSC再把low perf干掉一部分

第六步明年Q1结束以后,根据市场和项目进行情况,再来一波2-4
.1point3acres
我觉得Meta可能app和infra这边会逐步回到疫情前大概四万人的规模,至于小扎的愿景项目(pet project),再加两万人吧。

23年年底Meta应该会精简到6万人左右

忘了说,目前裁完一波还有7.9万人,马上回8万了。

 

  个人感觉到年底不会再裁了,不过公司应该在重新给每个org/team 定priority和hc,有的组估计还会裁,剩下的就等psc 再把一部分low-performance的pip了,这样就到明年年底公司就差不多瘦身成功了

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...