Q&A: Author of Dude, Did I Steal Your Job? sounds off
N. Sivakumar says the H-1B visa program is sometimes abused
Computerworld - N. Sivakumar's book, Dude, Did I Steal Your Job? Debugging Indian Computer Programmers, is an engaging and challenging account of the author's experience as an H-1B worker in the U.S. The book takes on the controversial employment of foreign workers through the visa program and lays out a case for its use. In an interview with Computerworld, Sivakumar addressed some of those issues.
Your book title -- Dude, Did I Steal Your Job? -- is very in-your-face. What are you trying to accomplish with that? A lot of people think that people like me came here and stole the jobs. People really never talk about the benefits that H-1B visa holders brought to this economy. The book is about Indian programmers and the nature of the visa holders. I just want to capture everybody's attention by asking this bold question. It's about abuse from the other side -- abuse that nobody wants to talk about in public. This is a question for my colleagues, the programmers, who think that the H-1B visa holders and the immigrants who came here stole Americans' jobs.
Opponents believe H-1B visa holders are being used to push down the wages of U.S. IT workers. What's your view? I agree with that. "Body shops" abuse H-1B visa users -- they bring in people for very low cost. But not all H-1Bs are abused. The majority are brought in to fill a gap. I came here as an electronic design automation (EDA) programmer; I do microprocessor design. H-1B workers definitely brought the salaries down, but they brought the right people in at the right time. The balancing of the salaries helped U.S. companies compete with their European counterparts.
Do major IT companies pay at reduced wages, or just the body shops? The body shops are the ones who pay low. When I was hired, I was paid exactly the salary I was promised.
If you were paid a wage comparable to what U.S. citizens and permanent residents get, then how do H-1B workers lower wages? Are the body shops responsible, or is it the increase in supply? It's the increase in supply generally. If you look at it, if there are only five EDA programmers in a city, they always have bargaining power. They will leave one company for another. They will negotiate good salaries.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts