Skip to main content

标 题: Re: 问一下现在perm->i140->i485的时间线

发信人: burlingame (upload), 信区: EB23
标  题: Re: 问一下现在perm->i140->i485的时间线
发信站: BBS 未名空间站 (Mon Jun 26 15:58:50 2017, 美东)

第一你不能赶上公司大裁员,印象是15%以上比例的裁员,办perm得等个半年才能提交。
第二别遇到perm的audit,这两年好像audit少了很多,我们办的时候号称有1/3的人都
被random audit。
第三你得等到140批了半年以内不离职,排期才算保住,不然你在这个之前换工作的话
得重新排队。
第四你得交了485半年以后,才算基本稳妥,之前换工作,得重新走perm、140这个过程。

之上不考虑工作签证过期回国的时候是不是会被check,即使check一般都会通过,就是
1到2个月的等待期比较麻烦,得远程工作。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...