Skip to main content

[职场感言] Stack Ranking 就是飲鸩止渴 |只看干货

 Stack Ranking (SR) 其实早就上个世纪流行过,不是什么新玩意儿。 SR 可以在很短的时间把 coasters 赶走,来个大清洗,但最大问题就是之后会找不到人,或是找到的人比赶走的人还差。

近的例子就是 Amazon 的 pip。砍人的时候上层主管很观乐,觉得能待下来的都是 TT,结果就是没人要来 interview。 Amazon 破局的方法是花大钱,代价是人事成本大增,股价大跌。
. Χ
远一点的例子是 Steve Ballmer 的 Microsoft。大家都来玩阴的,找到的新人一定不能比自己好,工作上找一堆不那么重要但有表现的来作,只要我 (或是我的部门) 不要排到最后就好。结果就是当 Google 出现,把真正的人才真接吸走。 Satya Nadella 在 Microsoft 待了很久,深知这个问题,当了 CEO 就直接废了 SR,之后 Microsoft 慢慢变好。 ..
.--
SR 就是饮鸩止渴。如果公司是自己的,肯定不想这样作,但如果 CEO 也只是打工的,那就很合理 -- 反正这大概是我的最后一份工作,多待一天是一天,如果喝了毒酒可以再拿个一二年的钱,何乐不为?如果能撑到我退休,那就太完美。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...