Is it unemployed? Do you know why?

xiaoxiao2021-03-06  119

A very good friend returned to China, prompting me to decide to write this article. I think if there is no smart person to indicate the direction of you, there will be more and more people who have been forced to return to the country after their visa limit. This article will be divided into several parts due to the busy work and academic business.

On the distant African grassland, a lion is thinking tomorrow morning I have to grab a ran the fastest antelope; an antelope is thinking tomorrow morning I have to escape the fastest lion. The next morning, whether it is a lion or antelope, the first thing is - run! This is the classic school motto of the New Oriental. Every student who goes to the New Oriental pilgrimage knows it. As the opening of this paragraph, it is because the survival struggle of humans seems to be competition in the distant African grassland, but it also distins. The new Oriental only teaches everyone to have a cuddling run. How many people know if the rules behind run? Even if you run the fastest antelope, you can't get rid of the destiny that is eaten by the lion, right? China has cultivated too many lack of heads, less wisdom antelopes. Their running has to bring rolling rolls like this organization like the New Oriental, there is no value, and will eventually be eaten by the lion.

When I came to the United States to read finance, it was .com in the US crazy. As long as you learn a computer, you have not found a job. But I have four or five children's master class, because of the extrachriage of the bed, plus production exercise, so I can't understand the for loop, and I will not clear the difference between MEMORY and HARD DISK. In I think it is possible to distinguish Memory and Hard Disk is the standard of identifying computer ordinary users and computer idiots. A few days ago, there was a "Beijing famous college students to collude with the high-drying children. 38 million", there is a piece of content on formatting the computer, which can prove that the article is a computer idiot. But my sisters of these teachers are holding TOP 10 College Computer Science Master Degree. Due to some special machines, I helped a computer idiochemical teacher forge a resume and trained how she answered questions in front of her, making her got a DBA position. From this, I have contacted a batch of computer idiots, computer ordinary users, Recruiter, Personnel Manager and project manager, helping to have hundreds of computer idiots or ordinary users to find work. Even when the US unemployment rate reaches a high historical high, I can still make computer idiots into the best software.

Are you unemployed? Do you know why?

1. Cognition rules

China has cultivated too many antelopes that will only run, but there are very few antelopes to study the rules of this survival game. In North America, I think more than half of Chinese students are learning computer, but I want to know how many people know what computer is? Most people waste youth on For loop or Select FROM, this is the main reason for most people unemployed. Let me tell you what computer is. Computers are 0, 1 and a rule. Your 99.99999% of the time should be used to study this rule, and the remaining time is used to arrange 01 sequences to pass this rule. If your 01 sequence passes this rule, you will find that this world is working for you. But most people are using 99.99999% to construct small number of rules of fewers in 0 and 1. Does anyone understand what I said? I said the popularity, the high and low levels of your home Cable finally become 0 and 1, because you don't have a rule, you can't see it. For this rule, you pay $ 40- $ 80 every month to buy this rule. You always have to call back China's greetings and beautiful MM, you found that your phone bill is more than two hundred and even close to three hundred months. Some people have learned that a rule will be lost to the telephone company per month, and the telephone bill is only fifteen less than 10 months. Of course, you can also use Calling Card. If you collect the Calling Card you always pay attention to the number above. When you collected the fifteenth sheet, if your college's line-related mathematics is not bad, pay attention to listening to the listener when you are in class; if you care about the lessons, you don't have the homework because of the MM's bed, I want to complete the homework. Even if a fool should also know its rules. Looking for a job is a series of rules: how to distribute from write resumes to resume; how to save the mistakes in the face after seeing the face. I have helped hundreds of computer idiots to find work and help them sit stabilize. I have helped their revised resumes to get more faceful, because I know that each word that can stimulate the visual nerve of Recruiter and personnel department. I told them that when I said, I can eliminate the faster antelope running. For finding work, running is not too important. Without a "emperor's new clothes" can verify that you are suitable for this position, no personnel managers know. They can only evaluate according to the information you have, such as your academic qualifications, background and work experience. Only people yourself and you are familiar with you. Commenting my experience "ignorant is no harmonious", the more computer idiots can have excellent performance in the face.

I often help some friends and classmates to deal with their computer problems, but I don't recommend everyone to do this. I will mention it below this. Once helped a friend to deal with his Dell computer question: He has already given the technical support of Dell, technical support, may be pre-installed killiviral software has expired, is a problem caused by viruses, it is recommended that he buy a set of kill virus software I bought a killing of virus software, and the problem is still not solved, so I am looking for me to help. His computer hard drive is broken, and you can hear the sound of the hard disk. I want him to call DELL to Ram Number and retreat to buy the killivirus software. I want to tell you if you are a competent technical support engineer, you will diagnose problems, replace the hard drive for customers, causing losses to the company; if you are a computer idiot, you will let customers buy a set Kill virus software for the company's profit. My friend will not report Dell's technical support engineers because of this, and his manager will not know. Instead, his performance is better than other competent technical support engineers because he is profitable for the company. The market is no longer running quickly as the rules of life competition, the opposite is, running, will be easier to be eliminated.

Therefore, there are two current competition rules that are neglected by everyone. First, courage, must have the courage to cure the deafness into dumb. The general computer is a good computer, and the antelope examined Certification in the computer training school has lost this courage. If someone asks: "Can a computer can boil coffee?" Never hesitate, immediately answer: "Don't say coffee, even stewed chicken." 2 is Bull ????, my friend is also learning computer Can let the people who learn a computer, the hard drive is broken, and go to the virus software. In addition to courage, there must be a certain amount. I suggest that the student of the science and engineering goes to the MBA course, it is the theory and entry course of Bull ????. For an instance of an MBA course: a pound melon can sell 2 beautiful rounds, no matter how deep, a pound melon is also sold for 10 mines. How to make a pound melon sold 10,000 yuan? The answer is this: a pound melon seed is at least 100, take each melon peeling, the melon is free Bonus, the melon shell is placed in a beautiful small box, and there is a sense of art; The spirit of the melon shell artwork gives people to the mega seeds to bring the material to people. This process, every melon seed calculates the labor costs of 100 cubs in one hour, a total of 10,000 yuan. This example has two main points: one is to abandon the original think of valuable things (melon seed), the second is to establish a new value concept - the beautiful melon shell artwork gives people to the melon seeds The material enjoyment is much larger, this is to rely on BULL ????. This is not a joke, every day in life is happening. Taking computer products as an example, ON Sale, you can buy a printer $ 19.9; buy a computer can send you a printer. But how much is a pair of black and color ink cartridges - $ 59.99, and the ink cartridge in the new printer is not full, just enough for you to test the page. The rules of the market have changed, the original melon seed (printer) is not worth money. When P4 is just listed, Intel's formulation standard is RDRAM because only 800MHz memory can give full play to P4 performance. Due to the problem, some small vendors are still formulated on the P4 system. Dell once condemned this is the behavior of deception users. With the upgrade of the price war, Dell also starts selling the P4 system for SDRAM. The sound of condemnation becomes "We can provide customers with the system of cost-effective system". " At present, various manufacturers have generally used DDR SDRAM to work in 266 MHz, and there is still a big distance from Intel's formulation standards. No one questioned "whether the spirit of melon seeds enjoys the spirit of people who bring the material to the material to enjoy the substance", because it is the industry's standard.

I want to tell you that this market has never been a quick slowdown for running, because only your own and familiar you know who is running fast. Just like only few people know, SDRAM, DDR SDRAM, RDRAM. So, you have to find your own selling point, and use Bull ???? to touch the manager manager. This is when it is good at running antelopes, I can make almost no running antelope to enter the key to the first-class computer company.

Recognize the market rules and do things that help to create jobs for yourself. I have called on all Chinese in Literature City to call the sales call to my home, and the credit card company doesn't want to set it up. Even if you speak very well, you can take MM in other countries like me. Also said to them: "I'm Not Good at English Chinese?" These companies have a Call Center, and each phone will be placed into the Help Desk database and analyzed. This method is at least Will add thousands of Chinese working opportunities. But many friends doing is in cutting your own opportunities. As mentioned earlier, I often help some friends and classmates to deal with their computer problems, but I don't recommend doing this. why? North America is a service market, which has a high value in North America, which is different from China. Dell will calculate the price of the service in every computer, almost all Dell computers provide the first year's live service. If you let Dell's engineers run a trip one day, I dare to guarantee this month, and Dell will recruit a lot of support engineers. A friend's company wants to connect several computers to share DSL, they invite you to eat, give you hundreds of dollars, you do it. If a friend's company invites a web company to do this, at least two fees for design and wiring. Of course, there may be server configuration, network security, remote entry, web hosting, email service ... I have seen Sales chopped a company to get somewhere. The last job may still be done by you, the network company will only ask you to eat meals, give you a hundred dollars. They will give you a job.

The reason why I often destroy this rule, one, I work in the financial field, and I never destroy the rules in my field; I want to use almost not running antelope to replace an antelope, this, I The second part will be described in detail in the second part.

This is the first chapter of previous post, and I respond to some questions. Some people suspect that if we ask Dell's engineers a day, Dell's computer has risen to a high price. Exactly, absolutely will not. You know who HP is the main spearhead after HP merger COMPAQ? After HP and Compaq integrate, the production cost of the microcomputer may be reduced, but Dell Direct is a minimum cost architecture of the industry. Dell may rise a price, but due to HP, Compaq, Gateway, Sony competition, its price increase space Very limited. Possible approach is the price of Dell refine service, such as how much is it checked? How much is replaced for a hardware? Instead of a year's overall price.

I am here to discuss some smart and creative things with friends who are laid-off and willing, how to reverse the situation in adversity. I appreciate HP CEO CARLY Fiorina, this old teacher used the LUCENT Global Customer Department, keen insights made her exactly before the Lucent stock price. Although the HP is not profitable, it is flat to merge with Compaq. In the case of most opposition mergers in HP shareholders, it has contributed to a merger. HP and Compaq product line repeats more, and will not bring about new growth to HP after the merger, and can only reduce costs in scale. This old sister has spoke to the bottom of Dell, while Dell's direct sales is the industry's recognized minimum cost architecture. HP has always been a model for creating channel sales. Although HP will die very badly in HP and Dell, but as long as it can keep the next year's income and don't hesitate. Compaq has increased turning by IPAQ handheld electronic products before merged, but it has to make more layoffs. From the brothers who are laid off in Compaq, I know that you are very embarrassed, your laid-off is just because some people want to keep their own billion income. Carly fiorina's reputation is very good. She is a phoenix corner of the woman in this location, which is a model of professional women. It is easy to do, but it is necessary to make a profession in the realm of people who are praised by people. I don't object to use some despicable means to preserve my own position. I will explain some despreadable means in the third part. I hope that the online pseudo-trail is not a brick because of the despication of these means, I encourage you to provide more despicable or more art. In addition, I don't quite agreement with the development of the country, you are not necessarily a good future. The recession of the IT industry is global, and China's market is always a slow half of the world. You go back to the market that is catching up with China. The ancients know how to rely on other forces to balance their opponents when they are weak, how to induce other forces to fight each other from Sino-Dependence, to get the throne, do not hesitate to destroy dad, and so on. Can the cultures deposed in five thousand years cannot help you keep a position of 屈? Make a brain, you have to know that Carly Fiorina should keep up with hundreds of millions of food every year than you keep a bowl of porrivities.

2. Good at control

The status of a person in society depends on his control capabilities for social resources. The concept of control is that the lion and antelope on the African grasslands are not, and the new oriental cannot teach you. I think life is a cultivation, cultivate your ability to control the external environment. However, most people have terminated cultivation, keeping in the lion and antelope status for survival; only a very few people cultivate into a fine or have to be a fairy (continue to see, I am an idiotic).

Most international students studying computers in the United States will start from programmers. Learning to control computer language to complete various functions, near and reach control of a program, constantly develop control of a system. But have you truly do it? If you have learned the computer program design, you should know that OOP (Object Oriented Programming), this method is slightly derived, so that the code has its own recognition capabilities. It means that the ability to identify itself is that the code knows itself and features, who controls and controls who. Make your code like a cell, through a "inheritance" to join new features to construct a variety of organizations. If you can really be good at control, your code will only listen to your instructions. Regardless of the Internet, from the LAN, it is afraid that the accidental overflow of a system will reach the master's command. Once the code becomes EXE, DLL, VBX, and OCX, no one knows what is written in it. New programmers even if they have a chance to read the original code base, they are more loyal to the API manual. The Internet has created a good environment for your update and modifying these dynamic link libraries. Of course, this practice will have some provisions or law limit you. Be sure to recognize these provisions or laws just to prevent you from getting higher control. Each successful software company includes Microsoft, Oracle, CA once or is doing this. Law or provisions are like locks in daily life, is something that prevents gentleness does not prevent small people. Don't break it because it is still used to prevent gentlemen. Give it, just like policy in the Windows system, a floppy disk is not within its control; just like dealing with the company's Proxy Server, indicate one: Do not logging I access the light butt mm website; just like payment There are firewall systems, do not take nails and are subject to prosecutive suspension bridges; swim in the moisture river, not only the internal system of the fortress, including firewalls. As I mentioned in the first part, I have to know these rules. When you know them, can you write 01 Continued to see how you improve your own combat power. The ultimate goal of controlling the program in your hand is to control your location. Similarly, we do other work. If you are still in a position, don't ask if you have completed its task. Be sure to ask if he controls this position. This control is like a tree tightly tightened (company). If the tree is winding, the vines can't find another tree, and you will die immediately. If the vines control the tree, the vines should not have a crisis unless the tree is down. Of course, the program that controls your hands is a narrow control. Below I tell you how to control your location at a higher level.

I once asked an idiots who worked for two years in a company. How did their company make money? He didn't know. He only knows the for loop code on his hand on time. I really like such an employee, because when I cut them, I will not give the company what troubles and losses. If you want to cut an understanding of the company's operation, you can understand that the company's insider can be more troublesome. Understanding the company is the foundation of you controlling it. Do you know how it makes money? Who is making money? What can I earn? What kind of business and means make money? What role is your department play in the process of making money? Which departments are its core sector? To get this, you need to start from a few aspects.

More contacts, more understand.

In your work, you will have to come into contact with other departments and help them as much as possible and provide them with convenience. In the process of helping them, they are infiltrated into their departments in the work between or in the department. Through this process, you will learn about the operation of the surrounding department more to understand the role of your department; through this process, you will know more people, the people will be strong; through this process, you will learn other fields.

I suggest that you have elective second or third profession under time and effort. If you are not proficient in knowledge, you can't get deeper control capabilities. Once you have learned a few fields, you will find that your control will become a geometric magnitude growth. I used to help some idiots into Wall Street on Trade Floor to make programmers or system analysts. Said that they are idiot not to say they are computer idiots, and they are more good programmers. Their work is more like a porter or a wooden, which is to move the modular code from one place; re-riding according to the requirements. Said that they are idiots because they don't know how valuable data elapsed through the rules they have. Sometimes five minutes of data can retire them in advance. Once you have learned a few fields, you will look at things from the height of philosophy. I have seen a copy of Wu Qing chain written on China's stock market is a gamble of the country. Think carefully, is the United States? They are all gang of people who control more social resources to play a part of the social resources. In China, social resources are more decentralization, in the United States, social resources are more resilience. I don't know if you have foreign currency trading, there are many free training courses in Wall Street. Blowing the gods, "foreign currency rises, you can make money", "I don't earn 200,000 a year, you are loser". In fact, the foreign currency market is a clear gamble of the large financial institution. On the one hand, you will borrow you margin on the one: 100 let you gamble, on the one hand, secretly control the message resources. Any big rising declines they will get news in advance. I want to have friends working on Chase or Citi Bank, of course, don't be Clerk. If your position has not yet you know the level of these messages in advance, you can understand some of the company's data in some aspects, it is not a difficult thing.

Start with the things of interest

I remind everyone to use the things I introduced below, once inadvertently, there will be several people who meet your behavior on www.fbi.gov sites. I am here just to explain the radiance of the atom, as for you to use it to do hydrogen-reactive stacks or atomic bombs, it is your business. In addition, you must remember what I said earlier: "Any law or provisions are just to prevent you from getting higher control skills." Before I started, I would like to tell North America to learn computer friends: "You know your hands." What a fierce weapon is held? Its energy is not more than the atomic pop. "

I have a few more interested in a new location, such as: How much is the colleague with my same position? How much is my head last year? Understanding the company from a thing of interest, you can be free. You will find that you will be willing to work overtime.

Before you understand the company, you have to know that the company has set up many rules to control you. The best way to get control is to set the rules to let others go abide by; if you want to improve your own control capabilities, you must first leave the rules set by others. The company will have two systems to limit your behavior, electronic access control systems and computer systems. Let's talk about computer systems first. Because you want to get rid of the electronic access control system, you must have some knowledge of computer systems.

The computer system is divided into two parts: control and limit, first talk about the control section. General company's computer needs to be logged in, reuse. The system controls the permissions you use according to the user's level. If you get the username and password of the system administrator or CEO, the system thinks you is an administrator or CEO, you can do anything you want to do in the system. People who have learned Windows 2000 or Cisco should know IPsec, meaning IP security. The source of this concept is that the data transmitted in the computer network is clear, it is unsafe. If you use the UNIX system, the snoop command allows you to see the content transmitted in your computer network, including the username and password. You can write a shell ???? only store the username and password. The new version of the Windows system encrypts the username and password, but you can use some SNIFFER or network protocol monitors and do some processing, and you can still get the username and password. The more wonderful way is to use the POLICY that will be described later to clean the Windows system to encrypt the username and password. Of course, this premise is that your company uses an old-fashioned bus type network system, that is, a computer issued a packet, and other computers can receive, only according to the address, is determined whether it should be received. If your company is more money or new companies, they will use the switched network system, that is, a computer issued a packet, only the recipient can be received. In a switched network system, the network switch (Switch) is generally intelligent, that is, it can be controlled. You can set all packets sent to the Server port all pass the way (only the beginning of each packet, including the username and password); do not use the full-copy method, large data The traffic will block your port. If your company has money, there is no place to flow, like Bloomberg, put the LCD on the floor. They will put some NetWork Sensors or NetWork Scanners in the network. This device defines conventional network access in Profile, most of your behavior belongs to unconventional network access, will be discovered by NetWork Sensors / Scanners, record and notify the network administrator. NetWork Sensors / Scanners records unconventional networks based on computer IP addresses or MAC addresses. IP addresses are generally assigned by DHCP Server, and the company has an allocation principle when using IP addresses, such as: 1-20, assigned to network devices, 21-50, assigned to resource equipment, 51-200, as DHCP allocation pool After 200 reasons. There will be an empty IP address between each paragraph, for example only 10 network devices, then the 11-20 address is empty. You can find these definitions in Network Administrator documents on Network Sensors, Domain Server, or File Server, or use the ping command to check patiently, and X-ray, Satan and other software can help you. The MAC address is a computer network card hardware address, which is a single identity address. There are many ways to deal with NetWork Sensors / Scanners: If you just want to escape the control temporary use, manually set your computer IP address as the empty address assigned to the network, so that NetWork Sensors / Scanners can't confirm who is using this IP; or in the company Use your own laptop. I have always been doing this, my boss always thinks that I am a big public, and the company is the behavior of the company. This approach is not suitable for a few people's environment, because you know that you are in the ghost, but in a small environment, it is generally used in NetWork Sensors.

Whether it is a change IP or changing computer, they can also find you through the address positioning method, the most fundamental method is to modify the Profile on Network Sensors / Scanners, you already have the highest authority username and password, so you can make this . In the PROFILE, the final plus, roughly: approve any to any, different devices are different. On the Access-List or Profile of many network devices, there will be approve any to any or deny any to any. Because of the definition of various devices, this two sentences are always confused. Anyway, there will always be such a sentence, as long as the network access is smooth, the administrator will not deliberate access to Access-List or Profile. Even if they go to check, a network-managed old bird also takes a minimum 15 minutes to think that it should be correct, and want to change it and need an approval process. Approve Any To Any Definition on Network Sensors / Scanners is that unconventional networks other than definitions are not tracked. Remember: Clear the log file when leaving. There are also some companies that use more boring devices, Proxy clusters, SMS or OpenView. I think that the internal system of protecting the company is like protecting a castle. These equipment is like a cannon for the castle. Some are only intimidated effects, and they can be remotely controlled. If you know this cannon more than the network administrator, you can also manipulate this gun toward the castle. Network scanners can also help you SCAN username and password. In an open information environment, we can find its operating instructions on any device / software operation on the Internet. So master it is not a difficult thing. If you work, you are bored to use token Card, fingerprint identification, and sound recognition devices. That's more government agencies that spend taxes, then you don't have to do anything. Relief, you won't be lays off.

With the development of E-Business or E-Commerce, many companies are in Qihaikou, how security is in their system, they have VPN, SSL, and encryption key of 256bits. Sometimes people who have received higher education are lie to more shameless, like our genes and buy brain gold, cerebral gold and brain diamond guys, it is said that this guy may be on this year's Forbes. SSL is Secure Sockets Layer, which is a protocol for managing data Internet transfers, and VPN is a method of generating an encrypted channel between Router and Router. They just transmit data on the Internet (Internet). Once these data enters the enterprise, it turns into a clear code. Even if the encryption key has 1024bits, it does not work. Still our Mao's head, "Fortress is the easiest to attack" internally. " The correct way is to implement IPsec internally, i.e. any data transfer is encrypted. But this is a big problem, and the data encryption will waste a lot of computer resources, not only the Server end, the Client side is the same. So few companies do this.

There are also some companies to hire old birds to guard their companies, dealing with this old bird, check whether their salary exceeds 200,000. If the salary is less than this number, most of this old bird is fake. Because the real old bird is very small, if they open the company, it is more than this number. My financial institutions buy a Business Risk Management at 3 million years. Unfortunately, 3 million hit a water drift. Insensus network system is innate, like a fish net, the vulnerability is as much as the sieve. It's really few people who can make it complete. Browse a famous computer company you know. Great Microsoft, has always propagated its most secure, so that we have got pirated before any new product; great intel, who once opened a employee, when he called the company More than 800 computers are considering the password of the senior management personnel, and he found that he dug a hole on Intel's aircraft wall and took the confidential data from the company for a long time. In fact, the password of the employee decrypt senior management person is no longer twice, but I have been discovered that the time is negligent. I forgot to turn off the password decryption software before going to work, causing more than 800 computers of the company to decline a lot. He is not arrested, it is negligent. Great Cisco, has always been able to buy a pound melon seed to 10,000 companies. Do you know how much is Pentium Pro 200 and PII350's computer now can buy the highest price? This configuration is still not necessarily to have someone on the street. Cisco PIX 515 and 520 uses these two CPUs plus a restricted share software modification version, you can buy more than 10,000 dollars. What is PIX to do? Is a Cisco boutique aircraft wall. It does not light the unauthorized access of external users, because it can divide the network segment into different levels, or control the internal employee's non-authorization access to confidential data. However, what it may not work. On all routers of Cisco To run an operating system iOS, its new version is much more expensive than Microsoft's operating system. For example, a pirated Windows 2000 doesn't sell much even Datacenter Edition. But pirated iOS Enterprise With FireWall Plus IPsec 56 can sell $ 99 on eBay and also robbed someone, and their business is particularly good. This operating system is generally not available, mostly the internal corrupt molecules. PIX even can't prevent your employees, the market sales is very good. Of course, I will not say that you will never touch the old bird. But in your life, it really touched one, it is really a lottery.

Let's talk about computer system restrictions. Sometimes you will find a lot of features in the company's computer Windows Start menu, such as: Run, Setting ... This is the company's policy restrictions on the implementation of the Windows system. Policy is what the system administrator sets for ordinary users to do, can not do, store it on Server. The user will get POLICY to implement restrictions on the client at a time login. Different from it: find a original Windows system disk. There is a POLICY Editor program in the admin directory, with it to a default policy stored locally. Then, take the POLICY editor of this machine to make the system to use the local storage policy. If you know a friend who works in Microsoft, you can have a detailed description of the Windows system registry, you can also modify itself with regedt32. Sometimes you will find that you can't access the website of the light butt mm or how to unwind the website of the encrypted Word file, if you visit it, you will find it by others. Most of them are equipped with Proxy or Websensor devices, you can apply the change IP described earlier to escape and modify their profile to completely eradicate. Sometimes you will find that you can't find the company's financial statement that makes you unable to access the company's financial statements, mostly it is not in the same network segment or company. You can apply the settings of the modified network switch you introduced earlier to get these data. Electronic access control and monitoring system

Electronic door invisible contact and non-contact, that is, your door card needs to be brushed on the reader. Whether it is a contact or non-contact door card, read an ID and let you enter a password. If you know your ID, enter your ID and password according to the rules when you forget the door card, you can also enter the company. The ID and password are stored in a database on a computer in the network. This computer is mostly in the IP resource device segment. Most of the database is Access and FoxPro, copy the MDB file to the local, and the password is not encrypted after opening. OK! You can now enter any door as anyone in anyone. There is also a monitoring system. If you need me to deal with the monitoring system, then you are really no brain. The easiest way is to break its electricity, either cover your face or its lens with a hat. Of course, you can also do a little hands and feet on the storage device of the monitoring system, making it only a one-minute content without logging new content. In addition, there are also company telephone systems, which is substantially similar to the electronic access control system, ID identification and password, just more accounts.

You can already get rid of any restrictions of the company, do something you want to do. Note that I often read the E-mail of your boss, whether in China or in the United States, always master the leadership intentions for your personal future. In addition, the most effective way to control the company is not based on the above technical methods, the above method only gives you more source of information. Controlling the most effective way to understand and control the company's Core Business. For example, do Accounting, if you know each fake account and black account, it is not far from the position of the financial executive, and it is difficult to cut off.

From the little things

This is a very important quality. Many Chinese students are not doing, and small things don't do. Help a bind mm to go to work, do some Data Entry work, these bored data reflect the company's past and present; pointing to how they use the scanner to increase the input progress of Data Entry; tell them to directly pass the fax The computer is issued, and it is not necessary to print it out to fax. These very little things, every piece is insignificant, but a piece of accumulation can make you set a high position in the company. I have mentioned the Calling Card's password rules in the previous one, who is I already know? Move your pig brain, don't move it, you have to become a pig; I also mentioned the Cable TV decrypted chip problem, have you seen a free full channel now? I also mentioned the problem of the telephone billing system. It may take you more than half a year to learn about the telephone control system and the phone billing system. It takes a short time to take the call to China. It takes a little more worth it. These knowledge can be taken at the Internet. As early as 20 years ago, the current HP senior engineer has made the production of the production of free long-distance circuits in ordinary phones in the university as a pleasure. Today you have a stronger weapon, more smooth information source. Some of the above small things will bring you some benefits, but the nine-shallow is only a theoretical knowledge, I really want to practice into the fire, only "dry". Human control

Go back to our previous discussion of OOP. OOP thinking is to make code know their own roles and functions by making code with their own recognition capabilities, who controls and controls who. This is also suitable for the current management concept of people. People who have learned SAP should know that when the processed product is transferred from one station to another, the middle time is strictly calculated in seconds, ensuring that the overall process is completed within the specified time. Here, it is assumed that workers working on that position should be a robot or robot, and he should not have the ability to function. That's why we don't need to run fast antelope, just as we don't need a programmer with independent programming style. Of course, the constructor's OOP is very difficult because people Class, I don't know how I will generate non-controlled code. If you are a idiot, don't matter, we can teach you. But the generating mechanism to clear non-controlled code is not a church. The generation of non-controlled code is related to the energy level of this person. The higher the energy level, the higher the risk of non-controlled code, that is, the faster the antelope runs, the more the antelope is getting rid of the control, the slower the quarter antelope. People who have helped find their work, they have such a function: 1. Let me know your work and your company's work, I can make you more stable in this position; 2. Always provide company vacancies information, The responsibility of the vacancy and the ability to be required; 3. Do Reference for the follow-up people I provide. In my OOP system, some people finally detached. The energy level in them is high enough to operate itself, but most of them disappear in the wave of layoffs.

If you can't control others, you should know how to be controlled by others. That is to say, if you have no ability to create an system, you should be a Class that helps others create a system. This is a very realistic survival problem. Also why I want to use almost not running antelopes to replace the antelopes of running because they make the entire system stabilize. The Class of the free in the system is not self-operated Class is very dangerous.

Although people's OOP is very difficult, once this system is established, it will have an extraordinary ability. The tide of the US layoffs exceeds a wave. But in my OOP system, you can still succeed.

转载请注明原文地址:https://www.9cbs.com/read-125557.html

New Post(0)