Skip to main content

[职场感言] 一部西游记,职场万花筒(买它版)

 大唐东土组里很久没有什么大的项目了,director唐太宗很着急。某天唐太宗听说在隔壁的组有个新项目叫做《经》,于是找来手下E6玄奘,让他去隔壁组打探一下《经》是个什么项目,看看能不能把这个项目搞过来(取经)。但是唐太宗没给玄奘任何headcount,只是给封了个虚的tech lead manager (tlm)的title(东土圣僧),就打发唐僧去干活了。
. Χ

与大唐东土组关系比较近的天庭组,director玉皇大帝听说了这件事,也想借机蹭点好处。玉皇大帝手下几个小组里有些low performer,像是外招来的刺头e5孙悟空,天天想着升e6又不听任何人的管。老黄牛e5沙僧,打破了琉璃瓶搞出好大一个sev来。滑头e5猪八戒,甚至还搞sex harrassement,被hr警告。玉皇大帝借花献佛,名义上把这几个人头送给唐僧充headcount,其实唐僧还背上了turn around low performer的expectation,需要时刻的给上面汇报这几个人的动态。

广告

说说这几个ic。e5孙悟空,外招来的,技术功底过硬(72技),从junior一级一级打拼上来。只是不会做人,与上面关系处不好,又天天想着自己有e7之技而不得赏识,几次三番主动要promotion却被老板晾在组的边缘,去负责什么养马这样的小scope,于是变得怨天尤人,最终背了mm的rating。再说e5猪八戒,滑头之极,组里的活从来不主动承担,即使被唐僧分配了任务,也能躲就躲,经常甩给孙悟空。但一旦孙悟空不在,猪八戒就又跳出来在组里呼风唤雨,一副组里我能力最强的气势。最后说说沙僧,老黄牛e5,脏活累活都分给他,明着不说,私下也会抱怨。但因为出过sev,黑案底成了promotion最大的组里,因此也对升职没有期望,彻底躺平在e5这一级。


唐僧带着这几个ic出发去抢scope,一路上困难重重。一些是对方组故意安排的,比如e7观音,表面上和孙悟空有旧交情,时不时出来帮孙悟空一下,但背地里又给唐僧打孙悟空的constructive feedback,记录在系统里,称作紧箍咒,这样孙悟空一有要造反的念头就可以让唐僧拿来挟制他。另一方面观音又放出自己的小弟红孩儿给唐僧一行使拌。另一些就是一些其他毫不相关的妖怪组,听说有个大项目要搞,纷纷要来分scope要吃唐僧肉。这期间一些senior ic妖怪纷纷跳出来,给唐僧一行人加一些人为的阻力,为的就是彰显他们的存在感。有些妖怪是得到了自己老板的授意,因此即使被孙悟空打了回来并escalate到他们老板那里,妖怪们的老板也纷纷护犊把那些妖怪ic收了回去,大事化小小事化了。但另一些愚蠢的妖怪ic,没和自己老板打招呼,甚至是自己单打独斗的就跳了出来,被孙悟空硬怼后就没什么好下场了。


说回唐僧,虽然是e6并给了一个tlm的虚名,但此前没有管理经验,所以有几次与手下的人关系处理的并不好。比如在白虎岭,在女儿国,几次三番碰到其他组的妖怪ic来阻挠使拌,被孙悟空挡了回去,但唐僧却偏偏怪罪孙悟空破坏collaboration relationship,气的孙悟空请pto托辞撒手不管了,最后还是靠组里的其他人或者观音来调和。由此可以看出,没有管理经验的唐僧一上来就带团队,往往是带不好的。幸好的是孙悟空还压得住场子,关键时刻也能逼得猪八戒去抗一些硬活(比如两人时常联手去打妖怪),沙僧还是一如既往的扛着脏活累活,因此队伍也没有散,跌跌撞撞的继续前行。


最终唐僧一行终于和如来的队伍见面了,向如来表达了这次来是抱着交流学习的态度来的。但如来那边的人也精得很,谁知道你们会不会直接把scope抢走自己做了,于是先是给了唐僧他们一个虚无缥缈根本做不出来的东西(无字经),唐僧他们吭哧吭哧了半天,发现是个大坑,于是又回去找如来。最后双方终于达成协议,唐僧可以带经回去,但双方各存有一经,只要两边共同造一样的车轮,谁也不要干预谁,双方都保持自己的scope就好。


于是,中国老板(director唐太宗)与印度老板(director如来)各自保留了scope,即使是一模一样,双方各自造轮子,反正对公司也没什么影响。唐僧,孙悟空,猪八戒,沙僧各得好处,该升级的升级,low performer变high performer,皆大欢喜。

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k