Skip to main content

标 题: Re: 感觉好无望半个绿卡要等个十年八年

发信人: burlingame (upload), 信区: EB23
标  题: Re: 感觉好无望半个绿卡要等个十年八年
发信站: BBS 未名空间站 (Thu Aug 24 15:15:07 2017, 美东)

一般都是分三步来办,先把perm和140办下来,140可以PP,需要花大概1000多刀,140
等180天以后再跳槽,这样你就拿到了PD,相当于排队拿个了号。然后有合适的机会该
跳槽跳槽,换了公司就是需要再办一
遍perm、140,多办几次也就熟悉了。这个时候因为你的140已经批了,所以h1b可以不
受6年限制,可以无限续杯了。你只要保持工作,就可以一直合法的在美国呆着,算是
个半解放的农奴。

等到了你的排期,你就可以交485,485交了180天,如果是赶上防水或者第二排期交的
485,你又可以跳槽了,这是第二步。因为防水或者第二排期交的485,到能批到你的
case,快则一年,慢的话等个2、3年都有可能。这个时候你有了AP,可以轻松回国了(
短期的),回美国的时候不需要去使馆申请签证了(如果h1b续签没风险的话都是建议
还是续签,保持h1b的身份),拿着AP这个半残通行证可以随时回美国,不要担心h1b签
证被check的然后等个2个月没法回美的情况。

然后等到审批到你的485的时候,你可能已经在第三家公司了,一般移民官走个形式,
REF你需要不需要的一些材料,绿卡哪能让你一次过的,又不是银行申请信用卡,这时
候要需要公司出个J表,然后移民局就慢慢的磨蹭,你需要各种催,SR,找议员,让律
师催。这是第三步。

现在中国eb的排期还没有10年,以后谁知道呢,不如抓紧生两个娃,到时候孩子都可以
替你申请移民了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...