Twelve Points to Leave Off Your Resume - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Twelve Points to Leave Off Your Resume-6 Next

Some of the greatest leaders of our time have had, um, experimental patches during their 20s. George W. Bush ran it well into his 30s. You can rest assured that Bill Clinton’s ‘once’ was ‘once over a period of many, many years’. That said, your prior life as an enterprising capitalist probably won’t sit all that well with the team who is going to interview you.

The first hurdle in any job hunt is building your resume. Ultimately, your first draft is a template for something that you are going to tailor based on each opportunity (if you’re serious about the job). Pulling it together is a painful process of learning how to see yourself from the outside. Writing for Glassdoor.com, John Sumser, founder and editor-in-chief of HRExaminer, offers a few guidelines for items you should definitely not include in your resume.

More Slideshows:


Best Practices for Securely Leveraging Social Networking Sites in Business Processes Tips for balancing the benefits of leveraging social networking sites in business with the security and liability risks that can result.

Why Embedded BI Use Is Accelerating Embedded BI is providing end-users with a better understanding of their corporate and customer data.

Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.