Skip to main content

F1(非OPT) I 140 approved 8 days.

在版上潜水已久学了很多东西,今天I 140 通过了。上来说下自己的CASE 鼓励下大家。
老公是F1 到今年年底才毕业。 但在版上看到大家都办绿卡,感觉他的case 也差不多
够了,就开始咨询律师是否可行。有的律师说是F1 不能有移民倾向。咨询到郭律师,
他说可以上,如果你可以直接拿H1B 的话。 当时还一篇审稿都没有,他说你可以先签
合同,我指导你一步一步开始做,因为推荐信最费时间。等准备差不多了,你的审稿也
上来了。所以我决定做了。从签合同到递交上去5个月整。本来想直接PP, 但参考郭律
师的意见,10后PP. PP 后第八天通过。

背景如下:optical engineering
Authorship: claim 了16 篇。有几篇没有引用的中文文章没有放进去。 基本都是一作。
Review: 31次 (IF 2-14)
Contribution:
1)律师强调了文章的影响因子,一篇NATURE 子刊 IF 接近30. 有3篇文章的引用是 top
1%. 有一篇文章被选为 front cover.
2)引用就用了一个引擎 200+
3)有3个国内专利被产业化,有公司老板的推荐信。但是律师没有claim.他说
前面两点就够了,这个留着RFE的时候再用。
推荐信共5封。4封独立。外加一封

结果直接过了。所以大家条件到了就直接上,不要等什么opt 或H1B 之类的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...