House set to vote again on STEM visas
In a report released today, the IEEE-USA examines employment-based immigration worldwide, arguing that the 1990 visa lottery made itself unnecessary, and some of its original goals, "to correct for the history that had cut off immigration from Europe behind the Iron Curtain and which had never allowed voluntary immigration from Africa" have been met.
"There is now a self-sustaining flow of family and employment based immigration from all regions of the world, including the two specifically targeted as underrepresented in the 1990 Act," wrote the IEEE, which has urged passage of a STEM visa bill.
If the Senate decides to take up a STEM visa bill in the lame duck session, a point of controversy may be over how many colleges and universities will be considered STEM producing institutions. Schumer was critical of the House bill as being too expansive, but Smith claimed it wasn't.
In an earlier analysis of that bill, the Economic Policy Institute said that more than 200 schools qualify under it, too many in its view to ensure that only the "best and brightest" were granted STEM visas. It also said the House bill could allow that list to be expanded with waivers.
The greater tempest may be whether Congress is willing to take up an immigration bill apart from a comprehensive bill. Lawmakers, who support comprehensive reform and laws such as the Dream Act, have blocked efforts to take up immigration piecemeal, less they lose support for a broader effort. But that was before the most recent election.
The STEM visa bill may be the first opportunity Congress has to test itself on immigration post-election.
Patrick Thibodeau covers cloud computing and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Gov't Legislation/Regulation White Papers | Webcasts