Skip to main content

申请绿卡的难度 - 招人倾向


我们公司是个传统制造企业,有个挺大的专门做有限元结构分析的组,有50个人吧,经
理是中国人,组里20个印度人,14个中国人,7美国白人,剩下的韩国、东欧、越南等
等。由于我和这个中国人经理是牌友,平时关系不错,聊天时也了解了不少最近招人的
事情。

前些日子,他们有两个位置在招人,结果收到了60多份申请,其中一个美国人都没有。
他说他其实挺想招个美国人,来增加他们组的diversity。呵呵,现在公司里不少部门
老美成了minority, 要受保护的。最后,他还是招了两个刚博士毕业的中国人。但是,
招收国际员工其实会给他日后带来一些风险。

大家知道,公司为员工申请绿卡前,要进行job test, 就是在报纸/网上多处打招人广
告,如果有美国公民来应征且符合要求,公司是不能给老外申请绿卡的。换句话说,你
的skill必须是老美替代不了的。当然了,这个job test里的要求,律师会按人下菜来
写,所以一般来讲很难会有合适的人来应聘。2009年前,我们公司job test的成功率几
乎是100%, 但是最近两年,由于失业的专业人士大增,加上公司律师越来越保守,这个
job test的成功率只有60%,造成很多中国人、印度人在H1B失效后,没法得到绿卡继续
在美国工作。这对公司、个人来讲都是很大的损失,也带来很多麻烦。

想想看,如果这个经理手下有40个人要申请绿卡,很可能有15个人通不过要走人。所以
最近job test的这种状况,让手下国际员工多的经理非常恼火、也非常无奈。也让他们
再招人时,对已经有身份的应聘者多了几分青睐。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...