Risk
3/4/2010
03:43 PM
50%
50%

Startup Visa Act Proposed To Create US Jobs

High-tech firms would likely benefit from the legislation, which would give permanent legal status to immigrants who attract $1 million in revenue or investments.

Legislation supporting immigrants with the wherewithal to start companies in the U.S. has been introduced by Senators John Kerry and Richard Lugar with the hopes that it would help create badly needed U.S. jobs.

Supported by a group of Silicon Valley investors who visited Washington this week, the bill would revise the E-5 visa program to accredit any foreign entrepreneur who has raised at least $250,000 for a business venture. The bill calls for the creation of a new two-year visa called EB-6 for successful applicants. More than 150 U.S. venture capitalists have supported the legislation.

"Everywhere Dick Lugar and I travel for the Foreign Relations Committee," said Kerry in a statement, "we see firsthand the entrepreneurial spirit driving the economies of our competitors. Creating a new magnet for innovations and innovators to come to the United States and create jobs here will offer our economy a double shot in the arm -- robust job creation at home and reaffirmation that we're the world's best place to do business."

The legislation, dubbed the Startup Visa Act of 2010, calls for amending existing EB-5 immigration laws. If an immigrant entrepreneur attracts $1 million in additional investments or achieves $1 million in revenue, the entrepreneur would be granted permanent legal resident status. According to many of the venture capitalists supporting the bill, high-tech startups would likely benefit from the bill.

Many U.S. computer and IT companies have been started by immigrants from foreign countries.

For instance a 2006 study of high-tech firms found that nearly half of the founders were immigrants. The study listed many foreign immigrants who founded successful companies, including Intel's Andy Grove, from Hungary; Sun Microsystem's Andreas Bechtolsheim, Germany, and Vinod Khosla, India; eBay's Pierre Omidyar, France; Yahoo's Jerry Yang, Taiwan; Google's Sergey Brin, Russia; Nvidia's Jen-Hsun Huang, Taiwan; and Cascade Communications' Gururaj Despande, India.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4720
Published: 2014-12-27
Hillstone HS TFTP Server 1.3.2 allows remote attackers to cause a denial of service (daemon crash) via a long filename in a (1) RRQ or (2) WRQ operation.

CVE-2012-1203
Published: 2014-12-27
Cross-site request forgery (CSRF) vulnerability in starnet/index.php in SyndeoCMS 3.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that add user accounts via a save_user action.

CVE-2013-4663
Published: 2014-12-27
git_http_controller.rb in the redmine_git_hosting plugin for Redmine allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the service parameter to info/refs, related to the get_info_refs function or (2) the reqfile argument to the file_exists function.

CVE-2013-4793
Published: 2014-12-27
The update function in umbraco.webservices/templates/templateService.cs in the TemplateService component in Umbraco CMS before 6.0.4 does not require authentication, which allows remote attackers to execute arbitrary ASP.NET code via a crafted SOAP request.

CVE-2013-5958
Published: 2014-12-27
The Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a si...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.