Sponsored Content
The Lounge War Stories Why am I persistent to be WRONG! Post 302667661 by zer0sig on Friday 6th of July 2012 03:54:10 PM
Old 07-06-2012
animesharma,
A lot of us who may be strong in terms of the quality or speed of technical work that we do are better at handling that than understanding the nuances of office culture. As someone with Tourette Syndrome (fairly mild, but I often am a little bit "twitchy", I have been misunderstood on many occasions, but since getting into IT/Telecom, my experience and interest have often left me handling more "difficult" work than my peers. Still, it is not uncommon for standouts to find themselves at the business end of disdain and eventual disrespect from people who are different from them. It's unfortunately cost me some great jobs, and I have found myself getting to know folks in positions i start who ask me what I'm doing in the positions because I have a broader deeper experience and understanding of certain things, and I know that sometimes folks just don't like me, despite acting as though they do. However, I have gotten much better at interacting with people, and always find folks who are genuine and even pleasant to work with. While I'd love to find myself in a position where I am understood and appreciated by everyone, the truth is that it doesn't always work out that way. Still, I've had some great experiences, and learned a lot by trying to branch out when possible (and some of those folks I've worked for are willing to give me great references, which always helps). If you feel like this situation is getting more uncomfortable, and like you are less appreciated/understood as time goes on, figure out who you can get a reliable reference from, spruce your resume up, and get your name out there, because it's not worth relying on the goodwill of people that you are not clicking with. More experience will probably help when it comes to making allies and positive business relationships, but if you really do good work and don't look down on people who aren't as technically inclined (and open to learning new skills) you will be able to find better matches for you, whether under different management, in a different location or department, or for another employer.
This User Gave Thanks to zer0sig For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Linux - Persistent routes not working

Hello, I'm having problems with persistent routes. I have the route added to route-eth1. But when I run the 'route' command to display the routes, it does not show the newly added route. I did restart the network service. That did not help. I also rebooted the server, but still did not... (1 Reply)
Discussion started by: hemangjani
1 Replies

2. Shell Programming and Scripting

Persistent variable

I found a way to make a numeric variable persistent for a script : #!/bin/bash function Persist() { # 1:Expression like VARIABLE=Value (numeric) local V=${1%=*} eval "$1" sed -i "s/^$V=*/$1/" $(which $(basename $0)) || return 1 }And how to use itAA=12 read -p "Enter a... (2 Replies)
Discussion started by: frans
2 Replies

3. AIX

HACMP Persistent IP blacklisted

Hi, I want to use the service IP incase for any network activity rather than the persistent IP as the Persistent IP is blacklisted in our network. Is there any way to make the service ip as LPARs default IP to be used as the lpars source IP incase it pings anything or acceses any external... (6 Replies)
Discussion started by: aixromeo
6 Replies

4. AIX

Unable to add persistent IP

i am trying to make HACMP but when i add a persistent ip, error shows unable to determine address for 'UPIDGIS1_pers' pls help me out AIX - 5.3 HACMP -5.4 thanks (2 Replies)
Discussion started by: reply.ravi
2 Replies

5. AIX

PowerHA, same subnet for persistent and service ip

I am new in AIX and please forgive my poor english. I know that AIX allow same subnet IPs for different interfaces, which result in multipath routing / route striping. My question is, is there any best practice for the persistent and service IP with same subnet to stay on same interface, or... (5 Replies)
Discussion started by: skeyeung
5 Replies

6. Solaris

aggr not persistent after a reboot

All, I hope someone can help me on my problem with an aggregate, as I am a Solaris noob. I tried doing this according to the official documentation from Oracle (unfortunately, as a new user to the forum, I may not post URLs...) and also googled a lot around, but have not found any solution yet.... (15 Replies)
Discussion started by: Captainquark
15 Replies

7. Shell Programming and Scripting

Why result is wrong here ? whether break statement is wrong ?

Hi ! all I am just trying to check range in my datafile pls tell me why its resulting wrong admin@IEEE:~/Desktop$ cat test.txt 0 28.4 5 28.4 10 28.4 15 28.5 20 28.5 25 28.6 30 28.6 35 28.7 40 28.7 45 28.7 50 28.8 55 28.8 60 28.8 65 28.1... (2 Replies)
Discussion started by: Akshay Hegde
2 Replies

8. Programming

Python Request Persistent

I noticed that when attempting to download videos from the url, I receive a 403 forbidden when I get through to a certain point in my downloads. I can download a third of the videos but will error: Retrieving file 'blah-video.f4v'... Traceback (most recent call last): ... (0 Replies)
Discussion started by: metallica1973
0 Replies

9. AIX

BootIP vs Persistent IP in HACMP

I have done other clusters (HP MC/Service Guard and oracle Clusters, and RHEL Cluster services), and have good idea about hacmp (a little older knowledge). However the term "Boot IP" for some reason is messing with my head. Have not done HACMP since the 4.1.2.X days. Is the Bootip the... (1 Reply)
Discussion started by: mrmurdock
1 Replies
PERSISTENT-KEYRING(7)					     Linux Programmer's Manual					     PERSISTENT-KEYRING(7)

NAME
persistent-keyring - per-user persistent keyring DESCRIPTION
The persistent keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own persistent keyring that is shared between all threads owned by that UID. The persistent keyring has a name (description) of the form _persistent.<UID> where <UID> is the user ID of the corresponding user. The persistent keyring may not be accessed directly, even by processes with the appropriate UID. Instead, it must first be linked to one of a process's keyrings, before that keyring can access the persistent keyring by virtue of its possessor permits. This linking is done with the keyctl_get_persistent(3) function. If a persistent keyring does not exist when it is accessed by the keyctl_get_persistent(3) operation, it will be automatically created. Each time the keyctl_get_persistent(3) operation is performed, the persistent key's expiration timer is reset to the value in: /proc/sys/kernel/keys/persistent_keyring_expiry Should the timeout be reached, the persistent keyring will be removed and everything it pins can then be garbage collected. The key will then be re-created on a subsequent call to keyctl_get_persistent(3). The persistent keyring is not directly searched by request_key(2); it is searched only if it is linked into one of the keyrings that is searched by request_key(2). The persistent keyring is independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2). It persists until its expiration timer triggers, at which point it is garbage collected. This allows the persistent keyring to carry keys beyond the life of the kernel's record of the corresponding UID (the destruction of which results in the destruction of the user-keyring(7) and the user-session-keyring(7)). The persistent keyring can thus be used to hold authentication tokens for processes that run without user interaction, such as programs started by cron(8). The persistent keyring is used to store UID-specific objects that themselves have limited lifetimes (e.g., kerberos tokens). If those tokens cease to be used (i.e., the persistent keyring is not accessed), then the timeout of the persistent keyring ensures that the corre- sponding objects are automatically discarded. Special operations The keyutils library provides the keyctl_get_persistent(3) function for manipulating persistent keyrings. (This function is an interface to the keyctl(2) KEYCTL_GET_PERSISTENT operation.) This operation allows the calling thread to get the persistent keyring corresponding to its own UID or, if the thread has the CAP_SETUID capability, the persistent keyring corresponding to some other UID in the same user names- pace. NOTES
Each user namespace owns a keyring called .persistent_register that contains links to all of the persistent keys in that namespace. (The .persistent_register keyring can be seen when reading the contents of the /proc/keys file for the UID 0 in the namespace.) The keyctl_get_persistent(3) operation looks for a key with a name of the form _persistent.<UID> in that keyring, creates the key if it does not exist, and links it into the keyring. SEE ALSO
keyctl(1), keyctl(3), keyctl_get_persistent(3), keyrings(7), process-keyring(7), session-keyring(7), thread-keyring(7), user-keyring(7), user-session-keyring(7) Linux 2017-03-13 PERSISTENT-KEYRING(7)
All times are GMT -4. The time now is 05:10 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy