Skip to main content

精简版485材料

http://gengwg.blogspot.com/

简单背景

140递交时是博后,生物医学研究领域:

文章9,会议摘要10,专利2;
专利被小start-up licensed,引用200+,文章期刊有2个IF 10+的CNS子刊,其余烂灌水杂志到一般杂志不等;
Scientific America / CNS子刊 highlights / 其它科学新闻类小杂志报道 / F1000 共7处news reports;
审稿很少,没提;无奖,很不保守地说属于一般偏弱水平的case。

claim了publication,contribution和media reports。

supporting letters :
indepenent 4 - 美国,加拿大,日本,台湾,无院士无诺奖;
博后老板,信的重点是我的具体工作/贡献;
前同事现小公司director,证明专利被licensed;
news report writer。

140递交后1个多月,辞职,回国,签H4返美,在家学习准备转专业方向。140批准时H4身份无工作无offer。
很幸运地在2周内找到要转方向(还是生物医学研究,大领域没变)的工作,拿到offer letter,以H4身份和LD(H1b,485 dependent)一起交485。
485无RFE无面试光速批准,绿卡路基本走完,全程DIY,目前H4无工作等卡中。

本来打算拿着EAD去上班的,手续办得慢,估计下周去HR报道的时候,可以直接拿着绿卡去了,嘿嘿。


精简版485材料

我的140和485材料都非常精简,485材料严格按照移民局的instruction并参考文学城的皮匠博客,多余的尽量一页纸都不放 - 给IO方便,就是给自己方便。

身份材料,只提供了最后一次入境 美国之后的。我去年9月回国H1转H4,所以只提供了H4的签证复印件,以 前的H1和I20之类统统没提供。
出生公证只复印了两页(中文和英文翻译),后面公证 页没 复印,因为觉得不相关。但加了一份声明(没公证),说本人懂中英文,可以证明英文 翻译是准确完全的。
护照只复印了信息页和最后一次入境美国的签证(H4)。
AP/EAD的 材料也非常精简,清单如下:

485

$1,070 check 
Form G-1145

Form I-485
Form G-325A
Form I-693
Copy of Form I-797 issued upon approval of I-140 
Copy of birth certificate (Chinese and English) with certification of translation
Copy of passport identity page and the nonimmigrant visa issued within the last year 
Copy of Form I-94 (both sides) issued at the last entry to U.S.
Copy of Employment Verification Letter (只是job offer,至今未开始工作)
Copy of W-2 forms for the last three years
2 photos with name on the back  

EAD

I-765
Copy of Form I-94 (both sides) issued at the last entry to U.S. 
Copy of last EAD (both sides) 
Copy of Form I-797D issued upon the approval of last EAD 
2 photos with name on the back 

AP

I-131
Copy of passport identity page 
Copy of Form I-94 (both sides) issued at the last entry to U.S. 
2 photos with name on the back
[此贴子已经被作者于2012/7/2 9:52:28编辑过]

最大心得,绿卡很重要,但不少人其实是可以在不伤害绿卡申请的前提下,做自己想做的事情而不用被一张卡紧紧束缚动弹不得。

EB1a/NIW 的申请人不敢换工作/转方向(同领域就好,领域是大领域,比如一个生物医学研究领域,从做化学生物物理工程到做数学统计计算机的,很多都可以扯得上边) /辞职/回家养娃,EB1b/PERM的申请人485 pending 180天后不敢换雇主,都属于自己吓自己。

发几个实例,鼓励一下大家,以下都是我敬佩的牛人:

http://www.mitbbs.com/article/Immigration/32106901_0.html
(lz已绿,485无RFE)

http://www.mitbbs.com/article/Immigration/32440197_3.html

http://www.mitbbs.com/bbsann2/life.faq/Immigration/eb1/experience/D12772401272R0/M.1272405168_2.N0/EB1a+PP+approved%A3%A1%B8%FA%B4%F3%BC%D2%B9%B2%CF%ED%CE%D2%B5%C4%BC%F2%D2%AA%B1%B3
(lz 硕士学位,07年大潮时交的NIW/485,485 pending期间辞职就读法学院,法学院就读期间递交EB1a的140,relink 485,顺利变绿。这个其实风险不小,胆小者慎用 - 比如我是不敢的,但不妨碍我对lz发自内心地敬佩)

还有一个找不到了,文章引用都非常弱(模糊记得只有2篇文章),DIY的EB1a被拒后毫不气馁再次递交+PP,无RFE水过

还有一个物理专业的去了街上,成功claim为同领域,也找不到了
[此贴子已经被作者于2012/7/2 13:13:44编辑过]

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec