Skip to main content

美工作签证新规出炉

 
美工作签证新规出炉!不抽签了 按这个标准排位

美国公民和移民服务局(USCIS)上周五(8日)公布H-1B工作签证申请新规,取消现有
的抽签制度,以申请人的薪资水平作为发放签证的优先考虑条件。新规将于今年3月9日
正式生效,在此之前已提交申请者不受影响。

H-1B工作签证授权允许外籍专业技术人员受雇在美国境内工作。根据新规,美国政府将
以申靖人的入职年限和工作经验为标准,划分四个薪资水平等级,一级最低、四级最高
,在每年8.5万个签证配额不变的情况下,优先考虑向高等级的申请人发放签证。

USCIS表示,新规目的是保护美国工人的经济利益,同时确保优秀的外国工人从中受益
。USCIS副局长埃德洛(Joseph Edlow)指出,H-1B工作签证被一些聘用初级职位和希
望降低营运成本的雇主滥用,使美国无法借该项目吸引最优秀的国际人才。


外媒引述移民律师分析称,新规导致美国企业聘用外籍雇员的成本提高。而由于美国每
年的H1B申请数量均超限额,对于新入职和缺乏工作经验的申请者而言,他们获得签证
的可能性将相应降低。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...