Skip to main content

2014年H1B名额大战即将展开

美国劳工部就业和培训机构(Employment and Training Administration)外籍劳工认证
办公室(Office of Foreign Labor Certification)近日发布了2014年第一季度截止到2
月14日的H1B LCA申请数据。Labor Condition Application(LCA)申请是H1B申请的第一
步。这一步要求雇主在劳工部网站上填写申请表格,内容包括雇主基本背景信息,所要
雇佣的职位,小时数,和薪水等。移民局不接受没有劳工部批准的LCA的H1B申请。因此
,为了保证及时递交H1B申请获得名额,LCA的申请通常要在4月1号H1B申请名额开启前
进行 ,并且在递交H1B前获得批准。

这份数据显示,2014年第一季度截止到2月14日,已经批准了144,657个H1B LCA申请。
这一数字远远超过每年H1B的预留名额85,000个。需要注意的是,劳工部公布的这份数
据中不止包括需要使用新一年名额的新H1B申请,同时还包括不需要使用名额的
extension和transfer申请。虽然我们不知道在这14万余个被批准的H1B LCA中有多少是
需要占用今年名额的新申请,但我们可以合理地推测今年H1B申请将很有可能展开名额
大战。

在2014年第一季度目前批准的14万余个LCA中最多的行业仍旧是电脑相关的工作,主要
的职位包括:Computer Systems Analyst (47,860个批准申请), Software Developers
Apps(16,792), Computer Programmers (15,205), Comp Occupations All Other (12
,982), Software Developers Sys Soft (5,492), Accountants and Auditors (5,101
), Management Analysts (3,367), Comp & Info Sys Mgrs (2,830), Electronics
Engineers (2,758), Net & Comp Sys Admin(2,645)。

我们注意到,排在前十名的H1B LCA申请雇主中,有六家是IT咨询和外包公司,包括
Cognizant Technology Solutions U.S. Corporation (22,599个批准申请), Wipro
Limited (10,021), Infosys Limited (3,409), Mphasis Corporation (2,980),
iGate Technologies, Inc. (2,635), Mindtree Limited (1,901)。这些公司被批准的
H1B LCA申请总和已经达到43,545个。其它几家排在前十的公司还包括:Cisco Systems
, Inc. (4,256), Deloitte & Touche, LLP (4,161), PriceWaterhouseCoopers, LLP
(4,136), IBM India Private Limited(2,228)。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...