Skip to main content

NIW写作经验谈

发信人: SandR (长耳朵), 信区: Immigration
标  题: NIW写作经验谈
发信站: BBS 未名空间站 (Thu Aug 16 18:04:26 2012, 美东)

版上好多Eb1的经验介绍,模版也多。大家都不屑于介绍NIW的经验。可申NIW应该也不
少吧。想想我当初来问NIW的事经常没人理,现在来提供一点NIW的经验吧。

Eb1a要论证三点达标,然后totality是top percent,并有广泛影响。NIW也是用和Eb1a
类似的evidence,比如paper,citation,只是不要求特别top特别牛。NIW的PL写法和
Eb1很不同,要求论证三大点:

1)第一点也是最重要的:你做的东西对全美的利益(national interest)都有好处,
而不是局限于local area, one institute or one company。常见的模版里有若干论
据,彼此看上去都很类似,好像绕脖子话说了一圈又一圈,其实总体来说都可以归为两
个要点:
a. 强调你的research有什么重大意义,比如对public health、经济发展等,就
是USICS自己列的那10条,但要结合你的research写具体,specific。
b. 你比同领域内有minimal学历和经验的其他人优秀,比如发了paper,有citation,
有advanced degree,有某些技能,review,membership等。这里的evidence要求比Eb1
低得多,我估计有2片paper,20/30的citation都能过。review可以没有,membership
可以是交钱就入的那种。master degree的大多都能符合。

2)阐述因为你比其他人优秀(见第一点)而且从事的工作无比重要(见第一点),象
你这样优秀的人在全美是不够用的,供小于求,所以要是必须申请perm的话会耽误时间
、工作进度,影响领域发展,影响人民健康和生活水平, so adversely affect the
national interest,所以要求waive

3)说自己会继续在美国、在本领域奋斗终身

后两条简单,只要说点套话就行了,不需要什么论证。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...