Skip to main content

标  题: 唉,被无良小公司害死了

http://gengwg.blogspot.com/发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 唉,被无良小公司害死了
发信站: BBS 未名空间站 (Tue Jul 21 16:58:14 2015, 美东)

毕业后在一个小公司干了两年

去年办H1B的时候他们也同意办,但是一直拖拖拖
结果到三月最后一周LCA还没办下来,于是错过了

今年他们开始还是拖,后来我每天都催,他们终于同意找个律师办
律师是他们找的,律师费是我出的
结果等case selected不到两周,我还在庆幸中签的时候,他们宣布把我解雇

各种气愤、绝望先不提了
我还是寄希望能approve然后transfer,就集中精力找工作
结果等了俩月工作有点着落了,却来个RFE
这时原来的公司不愿意帮忙了,说不能提供不真实信息
。。。

现在只好死马当活马医,集中找non-profit的工作
不行就只好走人了


还是怪当初太相信别人
去年就应该多催他们,争取办成
今年则应该提高警惕,当时用PP也许能好一些

提醒那些去不正规小公司工作的人,一定要当心当心!!!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...