Twelve Points to Leave Off Your Resume - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Twelve Points to Leave Off Your Resume-9 Next

Now that our wars are being fought from video consoles in windowless warehouses in crummy industrial parks, everyone wants to show their video skills. If you must put something on your resume, go for the more complicated and serious stuff like multi-user universes or complex battle simulations. Mastering Angry Birds just serves to underline that gap between your second and third jobs.

The first hurdle in any job hunt is building your resume. Ultimately, your first draft is a template for something that you are going to tailor based on each opportunity (if you’re serious about the job). Pulling it together is a painful process of learning how to see yourself from the outside. Writing for Glassdoor.com, John Sumser, founder and editor-in-chief of HRExaminer, offers a few guidelines for items you should definitely not include in your resume.

More Slideshows:


Best Practices for Securely Leveraging Social Networking Sites in Business Processes Tips for balancing the benefits of leveraging social networking sites in business with the security and liability risks that can result.

Why Embedded BI Use Is Accelerating Embedded BI is providing end-users with a better understanding of their corporate and customer data.

Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.