Wednesday, November 27, 2019
Lessons Learnt from the Artifact
Lessons Learnt from the Artifact Education is of great importance and is currently given more value than it was about a hundred years ago. Every parent in this day and age believes that the best lifelong asset that he or she can give to their child is education. Unlike in the old days, education is currently taking place in modernized institutions where the mode of instruction is also modernized.Advertising We will write a custom essay sample on Lessons Learnt from the Artifact specifically for you for only $16.05 $11/page Learn More There is the use of organized syllabus for various subjects. Learning takes place chronologically from one grade to the next. The student has the freedom to choose the subjects that suite their future careers. They also take part in co-curricular activities to exploit their talents. A school is an institution in which teaching and learning take place concurrently. Teaching is basically known as the art of imparting knowledge and skills to individuals so as to m ould a positively minded and goal oriented person that the society can turn to or rely on for the sake of its prosperity and development. Every school setting tries to bring out the best in their students. Schools make curricular that offer the type of education that meets the communitiesââ¬â¢ needs. For example, all or most communities and thus nations at large require professionals like teachers, doctors, lawyers actors just to mention but a few. These professionals also need to be people who have values such as high self esteem. From the Maslowââ¬â¢s hierarchy of needs, high esteem is experienced when a person feels valued, accepted, respected and with a sense of belonging whether it is at work, in school or while pursuing a hobby (Kreitner, 2006, p. 12). All school settings should be able to provide all these to their students so that in the end they not only produce a knowledgeable person but also a socially fit person. This paper bases its discussion on the article known as the artifact. The paper will help its readers to see how schools have come up with their culture and other traditions, as well as its effects on teachers. It also examines the effect of the artifact on the learning of the student and other workers as well as its effects in future development. The document looks at how the school and its professional and non professional leaders form the basis of professional society. It continues to say that a proficient society is a unique part of the communal asset which is partly achieved by rooting and using certain structural methods of teaching by the schoolsââ¬â¢ concerned leaders.Advertising Looking for essay on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More In the article we find out that the artifact instilled the feeling of respect and trustworthiness among the students because it allowed the students to take part in many activities that saw them interact with different people in the community. This also enabled them to have a sense of belonging and helped them to become socially fit people. This was achieved by the leaders in the school. Normally the school is made up of two types of leaders. The first group of leaders includes leaders who affect the life of students indirectly. They make and put into practice the rules, regulations and activities to be done in the school but have no direct contact with the students. This group of leaders includes administrators among others. The second group of leaders includes leaders who have direct influence on the students. They meet more frequently and often on a daily basis with the students. They give knowledge to the students, instill confidence in them and help them view life from a wider perspective (Halverson, 2004). These are the teachers. The teachers have the duty of exploring new thoughts and dreams, analyze them and share them with the students for the purpose of making them better people in the community. Thus, teachers enable their students to be responsible overall as they develop common interest for others. This in turn makes the students to be high achievers, goal oriented and people who can make objectives and attain them. This is because teachers take full reasonability for traditions and other learning activities together with class work. They make sure that students learn by taking part in the activities and socializing with others in different ways and settings (Halverson, 2004). They also make sure that the students are well mentored, highly disciplined, and well mannered in addition to having good self conduct. This results in a professionally developed society as most people in a society tend to live and conform to the practices around them. All this is found in the artifact. The world is dynamic and nothing in it remains constant. Change takes place from time to time and we all know that change is inevitable. The artifact is bound to go through transformation in future as the education systems and needs keep changing. In order to make students better persons, the school needs to adapt and use a broad combination of knowledge, ideas, skills, character and principles. All these things are changing due to changes in technology, community needs and the needs of the nations at large.Advertising We will write a custom essay sample on Lessons Learnt from the Artifact specifically for you for only $16.05 $11/page Learn More Reference List Halverson, R. (2004). Accessing, documenting and communicating practical wisdom: the phronesis of school leadership practice. The American Journal of Education, 1, 1-50. Kreitner, R. (2006). Management. Thousand Oaks: Cengage Learning.
Saturday, November 23, 2019
5 Reasons Why The Future of Healthcare Jobs Are Bright
5 Reasons Why The Future of Healthcare Jobs Are Bright Job seekers are looking to the healthcare field as one of the fastest growing occupational sources in the United States. Over the years 2012 to 2022, healthcare-related jobs are expected to account for one of the highest sectors in job growth, according to the Bureau of Labor Statistics. Not since 2008 has the hospital industry made the number of jobs available as it has since the last quarter of 2014. Aside from hospital workers, employees are needed to fill positions in physicianââ¬â¢s offices, urgent care clinics and home healthcare jobs. A convergence of events has made this an exciting time if you are seeking a job in healthcare. That being said, here are 5 reasons why the future of healthcare jobs are bright: 1.à Increasing Population of Elderly PeopleAmerica is growing older, and baby boomers are reaching a time when they require medical services such as geriatric medicine. For an increasing number of older Americans, home healthcare is required. Increases in mind-alterin g diseases such as Alzheimerââ¬â¢s, diabetic-associated problems and cardiac disease raises the demand for healthcare providers. In addition, with an emphasis on maintaining a healthy lifestyle, older Americans are visiting their doctors and becoming involved in wellness programs, all of which require trained professionals to meet the demand. Ancillary services such as those that provide durable medical equipment are also increasing.2. Better Healthcare AvailabilityWith the passage of the Affordable Care Act, more Americans are gaining access to healthcare services. Under the ACA, the insured are able to visit the doctor, have their eyes examined and get laboratory tests done. This means that increasing numbers of optometrists, physicians, physicianââ¬â¢s assistants, nurses and laboratory technicians are necessary.In the next 10 years, the population is expected to grow by nine percent in the United States, increasing the need for more healthcare providers and personnel. In ad dition, with better medical care for chronic conditions, such as kidney disease that requires continuing treatment, the expansion of dialysis centers will require trained technicians.3.à Evolution of Healthcare RecordsAs healthcare reform is implemented, paperless medical records are replacing paper charts. Hospitals, medical offices and insurance companies are turning to electronic medical records. This relies on transcriptionists, computer experts and technicians to help bring about the transformation and maintain the records.4. Wellness ProgramsMore businesses and facilities are offering wellness programs. This is in line with the recognition that wellness is about more than medicine. Nutritionists, therapists and others are finding jobs in this proactive addendum to routine healthcare.5. Increased Jobs in the Hospital SectorAlthough the economy began to recover after March 2010, hospitals were not adding jobs. That changed in 2014. In the last quarter of that year, 100,000 job s were added, according to the Bureau of Labor Statistics. This surge is expected to continue with approximately 28.1 percent growth in ancillary healthcare jobs accompanied by a 21.5 percent growth spike in the number of medical providers.According to Forbes, healthcare jobs have grown exponentially, and the growth does not seem to be slowing. Job search services such as TheJobNetwork are available to help you look for opportunities in the burgeoning healthcare field. This free service is easy to use and provides alerts via email to let you know when healthcare jobs are available.
Thursday, November 21, 2019
John Mclaughlin Essay Example | Topics and Well Written Essays - 1000 words
John Mclaughlin - Essay Example f 8 years old, McLaughlin became inspired of learning to play musical instruments when one of his brothers listened to Beethovenââ¬â¢s Ninth Symphony from a radio station (Stump, p. 12). A year later, McLaughlin had the privilege to learn how to play the violin and piano (Christian Pegand). After three years of playing the violin and piano, he started to dream of becoming a good guitarist. His dream of playing the guitar started on the day when his brothers started to play blues of Bill Broonzy (Christian Pegand; Stump, p. 12). This made McLaughlin became more exposed to the music of Leadbelly, Muddy Waters, and Sonny Terry among others (Stump, p. 12). aware of the music industry (Stump, p. 12). Inspired with religious and cultural music in India and other Western classical music, McLaughlin became a famous jazz and classical guitarist that plays a wide-range of music styles and genres (Cal Performances). Because of McLaughlinââ¬â¢s passion to make other people happy by listening to his music, he exerted a lot of effort in terms of improving his knowledge and skills in playing musical instruments (Stump, p. 10). Later on, he became proficient in playing the violin and guitar (Stump, p. 13). During the late 50s, McLaughlin played some musical instruments together with Peter Deuchar ââ¬â the banjoist and his professors of Ragtime (Christian Pegand; Stump, p. 13). Before McLaughlin reached the age of 15 years old, he was very actively leading a band in school (Stump, p. 13). All this happened before he decided to go to London where he pursued his dream of being able to play in a rock and blues band. His decision to leave the school band was very much influenced by Miles Davisââ¬â¢ album ââ¬Å"Milestonesâ⬠which was released in the market back in 1957 (Stump, p. 13). McLaughinââ¬â¢s exposure on blues music started when he reached London during the early part of 1960s (Stump, p. 15). Since then, McLaughlin took every chance he gets to have a jamming or recording sessions with
Tuesday, November 19, 2019
Facing your monsters Essay Example | Topics and Well Written Essays - 1000 words
Facing your monsters - Essay Example The process of life progresses from simple imaginary nightmares to real life fears that is vividly explained in the article (Langella 158). Once the author realized that the thoughts about monster were gone, then it is replaced by the real fears. The fear of greying mummy and shapeless objects is replaced by real fears. The prime purpose of the essay is to discuss about the article ââ¬Å"The Monster in my headâ⬠The author illustrates personal experience on monsters and provided a connection on imaginary fears with his sonââ¬â¢s story of monsters. The author demonstrates that fear can be created by individualââ¬â¢s personal perception and experiences towards certain things. According to Frank Langella, human beings have the potential to create fears. Langella illustrated that he knew monster would come every. The long pathway between the house of neighbour and own family was covered by tufts of grass and black dirt. In the mid-1940, the author watched a movie about mummy. Langella does not recollect the name of the movie but remembers the powerful image of a man with mouth exposed and wrapped in greying cloth. The author describes the fear of monster at a very young age. Langella knew that every night a mummy would come and hunt him down. Until one night, monster did not show up for daily routine. Langellaââ¬â¢s son also struggles with the fear of monsters. Langella used first stra tegy to fight with imaginary monster. The implementation of the strategy is to remove the creation of fear. Later, author realized that fear can be created by daily experiences and activities. The author vividly illustrated the time when his son used to struggle from the fear of monsters. Imaginary fears on monsters are the integral parts of children life. The fear of monsters resides inside the head of children. Children would simple reply that monsters are hiding inside the bed or closet and will come out later to haunt. The author describes that the fear of imaginary monster is mainly
Sunday, November 17, 2019
Position Supporting Stem Cell Research Essay Example for Free
Position Supporting Stem Cell Research Essay Cells that can make a distinction into a variety of cell types are called stem cells and comprise embryonic stem (ES) cells and adult stem cells. Since ES cells can turn into a new organism or can differentiate into any tissue type, they are said to be ââ¬Å"totipotent.â⬠Adult stem cells, conversely, as they cannot turn into any type of tissue, are said to be ââ¬Å"pluripotent.â⬠For instance, bone marrow stem cells can turn into red blood cells, T-lymphocytes, or B-lymphocytes, however not muscle or bone cells. Nerve stem cells can as well turn into different types of nerve tissue. Stem cell research attempts to engineer tissues from the bodys stem cells to replace defective, damaged, or aging tissues. In 1998, scientists were capable to grow human ES cells indefinitely. Since then, researchers have performed stem cell experiments on mammals and have had some achievement in repairing spinal chord injuries in mice. Since scientists cannot use federal funds to carry out research on embryos, private corporations, most particularly the Geron Corporation, have funded ES cell research. Geron, awaiting possible ethical concerns, appointed its own ethics advisory board. The Clinton administration sought to loosen the interpretation of the ban on embryo research to permit the government to sponsor research on the use of ES cells once they were available. President G. W. Bush had made the decision to permit use merely of about sixty existing cell lines, and not the production of embryonic cell lines particularly made for the purpose of use for stem cells[1]. The majority of the stem cell procedures proposed to date would employ the ES cells from embryos formed by couples in fertility clinics. In the United States, thousands of embryos are discarded each year as IVF couples cannot use all of their embryos. A couple may make three-hundred embryos in an attempt give birth to one child. One more approach to stem cell research suggests that researchers make embryos for scientific and medical purposes. This approach, recognized as therapeutic cloning, or somatic cell nuclear transfer (SCNT), engrosses transferring the nucleus from a cell in a persons body into an enucleated egg[2]. The ES cells from this new embryo would match the tissue in the persons body, therefore avoiding the potential tissue rejection problems that might occur in stem cell therapy. The potential of stem cell research is huge, for the reason that so many diseases result from tissue damage. Stem cell research could bring about advances in treating paralysis, diabetes, heart disease, pancreatitis, Parkinsons disease, liver disease, arthritis, as well as many further conditions. [3] Thus human pluripotent stem cell research is very important as firstly it propose help in understanding the actions that take place during normal human development. The understanding of human cell development could make possible further understandings regarding how abnormalities such as cancer occur. Secondly this research helps us to find out why some cells turn into heart cells whereas other cells turn into blood cells. Although it has been previously recognized that a gene turning on and off is central to cell development, however it is not recognized what makes these gene turn on and offstem cell research will most probably give a possible explanation. In a realistic sense this could make possible further understandings of cell development abnormalities. Thirdly pure samples of specific cell types could be used for testing different chemical compounds so as to develop medicines to treat disease[4]. This would make more efficient the process of medical testing in order that merely medicines that have a helpful effect on cell lines would be tested on animals and humans. And most significantly this research could be very helpful for cell transplantation therapies. Theoretically, stem cells could be grown into replacements for diseased or destroyed cells[5]. This would permit medical science to get to the bottom of diseases of organ failure for instance diabetes as well as neurological disorders for instance Parkinsons disease. The main protest to this promising research has to do with the source of ES cells. ES cells can be acquired from aborted embryos, embryos remaining after infertility treatments (IVF), embryos created only for research by IVF techniques, and from SCNT techniques (that is therapeutic cloning)[6]. To get ES cells, consequently, one have to either create embryos that will be used, manipulated, or destroyed, or one have to get embryos leftover from infertility treatments. However here is where the abortion debate resurfaces, as these techniques would engross treating embryos as mere things or objects and would not give embryos the esteem they deserve, as said by some critics. That is to say that a proper, fair and realistic account of what comes out of the freezer is a 5-day-old ball of about 150 cells, and of that the researchers will want to use about 30. What comes out of the freezer is unquestionably human tissue however it is not human. That ball of cells has no hope at all of becoming a human being without further intervention. One must not confuse the existence of a chance of becoming a human being with actually being human. The tissue can be likened to organs taken from a lately deceased person for transplant. Neither the organ nor the tissue is dead; it is human tissue but it is not human. One may say the same of sperm, for instance, every sperm must be protected that is available for the reason that it might, under circumstances where other things have to happen, become a human. That is practically the same thought. What has to happen there is that the sperm has to meet with an egg to fertilize that egg, which then has to be looked after. What has to happen with a 5-day-old ball of cells in which the egg and sperm have previously met is that it after that has to be implanted in a woman and stay there for nine months. In both cases nothing is going to happen unless other things are brought into play. It is a very strong view that it is not being talked about a human, rather about human tissue that will with the intervention of others, and only with the intervention of others, has the chance of becoming human. A parents right must be supported to demand that any of these untouched fertilized eggs be left untouched for afterward use or not be used for research. Very few, if any, parents who have had the advantage of the IVF program would refuse the chance for spare fertilized eggs to be used. They themselves turned to the wonders of science to give them what apparently nature was otherwise going to deny them, those who through the wonders of science have had what must have been their greatest dream realized would definitely not deny the chance for science to make better things for others. After all, how many fertilized eggs at varying stages of development were used in the IVF programs to get to the point where one could have a successful IVF program? [7] Some supporters of this bill do not deny where one is now with the science. He just wants science to have the opportunity to take him to further and better places. One cannot say that there is no practical application of this now, so not do the research. That is the equal of saying to a child that you are not permitted to swim in the pool until you have learned to swim. How can one possibly refuse to do research on the basis that he does not have the researchers outcomes? One can not get those outcomes until he proceeds with the research. So, again, one must be very much on the side of proceeding with stem cell research. Some of the objections which have their foundation in a religious view held by their proponents. Living by a decent set of values is far more vital than defending the doctrine of one church over another. If you lead a good life and if there is a kingdom of heaven you will be welcome into his or heaven. Your religion is your business and no-one elses. When you make your religion an issue, you drag it into the political domain and you tarnish it. It follows that we attach very little importance or interest to arguments over religious dogma. Similarly, we do not turn to the state to legislate for one religious view over another. Without doubt, we can clearly see the risks of adopting a view that your religion is the right one and the rest of the world must be converted. This point is quite simple: each to his own religion. If you say to one that doing something is against Gods will, then he will respond by assuring you that, if God is annoyed, God will punish whoever has done that thing. The state should never be used as Gods enforcer. Over the years, as we have been approaching 50, we can assure you that we have every confidence in Gods capability to settle accounts. It has not been our experience that he or she usually waits until you are dead. Numerous people who have done the wrong thing have met their maker in a practical sense while they were still alive[8]. In brief, we are talking about fertilized eggs that are in the freezer. They have not the slightest chance of becoming human unless they are accepted by the mother to be carried for 9 months. We are talking about fertilized eggs where that is not the case. The outcome is that they are either going in the bin or going to be used for the betterment of mankind. My other proposition is that we cannot now say whether the science is good or bad. We do not know where the science is going to take us. Science of itself is not fundamentally good or bad; it is what we do with it that will make that case. We have to understand that the benefits of this research may take years to come. That merely makes us say: start more quickly. We simply ask those who, due to their religious beliefs, have a very authentic concern regarding this bill to accept that they are entitled to follow their religious beliefs; they are not entitled to demand by legislation that everybody else does the same. References: Adil E. Shamoo, David B. Resnik. Responsible Conduct of Research; Oxford University Press, 2003 Daniel Callahan. What Price Better Health? Hazards of the Research Imperative; University of California Press, 2003 John Harris. On Cloning; Routledge, 2004 Sandra Braman. Biotechnology and Communication: The Meta-Technologies of Information; Lawrence Erlbaum Associates, 2004 Thomas Kemp. ââ¬Å"The Stem Cell Debate: A Veblenian Perspectiveâ⬠; Journal of Economic Issues, Vol. 38, 2004. [1] Daniel Callahanpg 55 [2] John Harris, pg 90 [3] Daniel Callahan, pg 67-69 [4] Thomas Kemp, pg 6 [5] ibid [6] John Harris, pg 78-79 [7] Sandra Braman, pg 105 [8] Adil E. Shamoo, David B. Resnik, pg 210
Friday, November 15, 2019
The Causes of McCarthyism Essay examples -- Essays Papers
The Causes of McCarthyism As an individual in the middle of Twentieth century Joseph McCarthy had a rather intense effect on society. He started the movement that bears his name. McCarthyism was the movement that caused many changes in the lives of the people of the 1950's. McCarthy headed the charge against communism in the United States after the second World War. Through his actions many people were accused of being communists and hastilly judged to be so because of the general feeling toward communism. What causes such an incredible uprising. What caused so many people to rally behind, in many cases, unfounded accusations that would ruin other peoples lives unjustly? What caused not just a movement but the movement known as McCarthyism? It is historically proven that a simple action can have many complex causes, while a movement can have immeasurable causes underlying its begining and the momentum that keeps it alive. Leaving the little, but not insignificant causes alone, the major causes o f McCarthyism were the attitude of the United States toward communism, the sense of superiority within the United States, and McCarthy's own position. The attitude of the citizens of the United States was a tremendous influence on the development of McCarthyism. The people living in the post World War II United States felt fear and anger because communism was related with Germany, Italy, and Russia who had all at one point been enemies of the United States during the war. If the enemies were communists then, communists were enemies and any communists or even communist sympathizers were a threat to the American way of life. "From the Bolshevik Revolution on, radicals were seen as foreign agents or as those ... ...it was. Fear makes people do things they normally would not. Because of fear people overlook things they normally would notice imediately, especially in the case of something being moral or immoral. McCarthy was described as "paranoid" and for whom "...life was a sereis of conspiracies, the most fiendish of which were directed at him..."(Cook p77). Fear was the greatest underlying cause of the McCarthy movement; fear of communism, fear of the loss of freedom, fear of being accused or fear of what would happen if someone challenged the movement. Works Cited - Rogin, Paul. The Intellectuals and McCarthy: the Radical Speaker. The MIT Press, Clinton, Massachusettes. 1967. - Cook, Fred. The Nightmare Decade. Random House Publishing, New York, New York. 1971. - Theoharis, Athan. Seeds of Repression, Quadrangle Books, Chicago, Illinois. 1971.
Tuesday, November 12, 2019
Routine Communication
What kinds of tasks fall into each quadrant? Therefore, what kinds of communications norms do we need? routine/autonomous To the extent team members are working autonomously on tasks which remain static, there is little need for a lot of cross-team communications. Communications should be: Minimalist. Local. Compliance oriented where necessary. Automated whenever possible. The danger for virtual teams is that the ââ¬Å"disconnectedâ⬠feeling of a distributed team sometimes leads to over-reporting as a strategy to give people the feeling of ââ¬Å"knowing what's going on. Sometime team members generate a lot of reporting in order to make sure the team leader ââ¬Å"knowsâ⬠that they are working. This kind of communication creates sludge in the team's arteries. It is a common cause of information overload which can sometimes result in team members avoiding engaging in the communications which actually are important to the team. The team needs to agree on a strategy to defend itself against communication sludge! Be on the lookout for what can be eliminated. 2 of 5routine/interdependent. Team members need to provide enough information to each other about areas where their routine work is interdependent to enable them to coordinate. Communications should be: Standardized. Organized. Easy. ââ¬Å"Pullâ⬠v. ââ¬Å"Pushâ⬠(You go get what you need when you need it rather than having it pushed at you automatically). The danger for virtual teams is that because we have technology which allows us to exchange and store large amounts of information, we do it because we can without really addressing whether doing it adds value. The team needs to agree on a strategy to manage and coordinate this communication. Choose a few, processes for exchanging critical information and make a commitment to sticking to agreements about when and what will be produced by each member of the team. emerging/autonomous When individuals (or sub groups) on the team notice changes emerging in the work they have been doing, it's critical to make this ââ¬Å"intelligenceâ⬠available to the team as a whole. Communications should be: Timely (it can't wait for the next face-to-face meeting). ââ¬Å"Pushâ⬠v. ââ¬Å"Pullâ⬠(to make sure that nobody misses a key indicator). The danger for distributed teams is that a weak communications strategy results in missing signals where something new happening in one place is a bell weather for something that will sooner or later have an effect on other parts of the system. A team that doesn't share this kind of intelligence is less than the sum of its parts. The team needs a strategy for scanning, scouting the environment within which they are operating, noticing pattern changes to make sure that important things get up on the team's radar screen soon enough when something which has been static starts changing. But it's not enough to simply report the information, it's critical that the whole team have an opportunity to discuss its meaning.
Sunday, November 10, 2019
Martha McCaskey The Seleris Associates Industry Analysis Case Study
For the past 18 months Martha McCaskey has been an exemplary performer with high integrity and been assigned as a project leader to a crucial high profile project named Silicon 6. Upon successful completion of Silicon 6, McCaskey has been promised a promotion to group manager. McCaskey is being pressured by senior management to finish the project and have an action plan to present to the client. Now she has some options to weigh in order to complete the project. What McCaskey must decide is where she draws the line on compromising her values in order to complete Silicon 6. She will have to decide what constitutes proprietary information or is she engaging in ââ¬Å"gentlemanââ¬â¢s industrial espionageâ⬠McCaskey has also realized she might have to pay someone off to finish her project in order to attain her promised promotion. She felt she has always maintained a high degree of integrity until now. There were some warning flags McCaskey should have noticed. The focus this paper is to examine specific reasons underlying McCaskeyââ¬â¢s situation, what the warning flags were and what tactics she should employ concerning her involvement in the Silicon 6 project and her future with Seleris. Martha McCaskey Seleris Associates Industry Analysis Division Case Study Martha McCaskey has been assigned as the Project Leader of the Silicon 6 Project with Seleris Associates Industry Analysis Division (IAD). She is facing some real tough decisions that can be career threatening and possibly have legal ramifications. Silicon 6 has become a crucial project for IAD. Silicon 6 will account for 20% of IADââ¬â¢s revenues. If successful for IADââ¬â¢s client then more lucrative projects would follow. This should have been a warning sign to McCaskey, a high profile project given to a new hire would not happen. McCaskey has been promised a promotion to Group Manager with a substantial increase in pay if she performs well. This was a warning sign. How could McCaskey be promoted to Group Manager? There were only 2 groups who was going to go? Was it just ââ¬Å"lip-serviceâ⬠to entice her further to obtain the needed information on Silicon 6? Selersisââ¬â¢s client is a semiconductor manufacturer based in California. The client has retained IAD to identify cost structure and manufacturing processes for a new chip being manufactured by a competitor. Selersisââ¬â¢s client has offered to double the consulting fees if the required information could be obtained. McCaskey has been tasked by her management to formulate an action plan to present to senior management of the client and IAD. McCaskey is struggling with how she must decide what constitutes proprietary information and what is public knowledge. McCaskey wonders if she is engaging in ââ¬Å"gentlemanââ¬â¢s industrial espionageâ⬠. She has always maintained a high degree of integrity, until now. McCaskey now has some different approaches for finishing the Silicon 6 project to ponder. The Events Leading Up To Marthaââ¬â¢s Situation Martha McCaskey has the right pedigree; Electrical Engineering (EE) degree from CalTech, and Harvard MBA. Shortly after finishing her MBA she became an associate with Seleris Associates Industry Analysis Division. This division specializes in clients in the computer component manufacturing industry. McCaskeyââ¬â¢s offer was generous plus she received a good reference from a former CalTech associate who was employed there. The division was divided into 2 units. One unit was under Group Manager Bud Hackert called the ââ¬Å"Old Guardâ⬠which worked mainly on independent projects and the other unit under Group Manger Bill Davies comprised of newer associates or ââ¬Å"New Guardâ⬠where McCaskey was assigned. The New Guard group worked predominately on team projects. McCaskeyââ¬â¢s first project received high praise from Tom Malone the divisionââ¬â¢s vice president stating her performance was the best the division had ever seen. The second project was very challenging. Under heavy pressure McCaskey was successful. After presenting successfully to the client, the president of IAD Ty Richardson asked McCaskey what her delay was on this project in writing the clients report. McCaskey was so outraged she finished the report in 10 days. Malone established her report as the new benchmark for IAD projects. This behavior by Malone should have been a warning sign as well. McCaskey had been with IAD a short time and already her work was a bench mark? There is no easier way to gain loyalty then by praise. McCaskey felt Richardson and Malone disapproved of her handling of the project. It was during this period that Malone suggested McCaskey ask advice of 2 members of the Hackertsââ¬â¢ group; Dan Randall and Chuck Kaufmann concerning obtaining sources of information. Hackertââ¬â¢s group was involved in gathering detailed information about competitors. This McCaskey quickly ascertained that Kaufmann and Randall were the real producers of this group. Before she was done on her current project McCaskey was asked by Richardson to talk with the rest of the members of Davies Old Guard group on the Silicon 6 Project. Randall was cold and unapproachable and Kaufmann was unavailable. McCaskey did work later with Kaufmann on some team projects and she found him to be approachable and fun to work with. The Atmosphere At IAD Several senior associates had left the firm in the last few months. McCaskey over the months has discovered was that IAD had some severe ethics issues. The president Ty Richardson is very sharp as well as a convincing salesperson with plenty of charm and charisma. He was very driven, mostly by money. The defacto Chief Operating Officer (COO) Tom Malone was the type of leader who was another great talker and salesman who once stated to Kauffman that he did not care about the turnover at IAD because he could just put an ad in the paper and hire all the staff he needed. Richardson and Malone stated to the staff about being part of the management team. However both would go on a client visit without involving the staff. The staff felt left out and perceived themselves as being non-contributors. McCaskey had been given the freedom by Richardson to perform her work as she wished and her work was also recognized by Richardson. Her bonus that year was $25,000 while the other associates bonuses were much smaller. This should have been a warning sign to McCaskey, special attention by senior management, to include a large bonus in excess of co-workers share. McCaskey And Silicon 6 McCaskey had been asked to work on Silicon 6 because of her EE degree and coursework on chip design. Richardson had stated the project was behind schedule and her expertise would be valuable. McCaskey was informed she would be working with Chuck Kauffman. Kaufmann was hard working but was taken advantage of by both Richardson and Malone. He was paid less than any other associate and felt the company needed his expertise to run the business. Kaufmann could not step back and see his situation. When trying to obtain information from industry sources McCaskey would identify herself as a representative of a trade journal. McCaskey thought that was a little more above board than visiting a target company and pretending to be interviewing for a job, as a consulting friend of hers does. Richardson spends more time with Randall, McCaskey and Kaufmann often making impromptu visits to see McCaskey and Kaufmann. McCaskey was still struggling with obtaining credible information on the target company. Selerisââ¬â¢ client had also placed a stipulation that the target company was not to be contacted, to avoid the appearance of price fixing. Malone had queried McCaskey on whether she had been able to contact any former employees of the target company. On other projects she had found former employees of target companies a valuable source of information. Kaufmann had confided in McCaskey he had paid a former employee of a target company a $5,000 consulting fee for spreadsheets and a business plan for a new product line. He mentioned Randall had done this on a regular basis on Seleris projects. IAD had no written formal policies concerning solicitation guidelines and rules of engagement working for a client. McCaskey confirmed with a coworker that members of Hackertsââ¬â¢ Old Guard group routinely paid off ex employees of target companies to obtain sensitive and proprietary information for Selerisââ¬â¢ clients and the Group Manager Hackert condoned and encouraged this behavior. Desperate for information McCaskey considered using former employees of the target company to complete Silicon 6. When she learned of the bribes McCaskey should have known what Seleris was all about, ethics not being an attribute. This was another warning sign she chose to ignore. Enter Phil Devon McCaskeyââ¬â¢s best lead came via some random events. During her research she came across a professor at a small east coast engineering school who actively consulted with European semiconductor manufacturers. After contacting him McCaskey discovered he could not provide her with any information. Malone then suggested McCaskey fly out and interview him in person indicating he might have some ââ¬Å"gossipâ⬠on the new chip. The face to face interview provided no new information that McCaskey could use. The professor suggested she contact Phil Devon a consultant in southern California who had been involved in the design and start up of one of the European chip manufacturers. The lead for Devon came about under such obscure circumstances. Malone told her to fly out to see the professor for ââ¬Å"gossipâ⬠and then she discovered Devon? Did he know of Devon and intended to use McCaskey as a patsy? This was another set of warning signs for McCaskey. McCaskey set up an interview with Devon and discovered he was a former employee of the target company at the vice president level. This was large warning sign for McCaskey. You should never approach an executive of a target company, they are not ignorant. Your true intentions will be figured out in no time. McCaskey felt uneasy with Devon from the start. Devon was almost too forthcoming with information. McCaskey felt certain that Devon could provide her with all the information she needed to complete Silicon 6. She felt he might be leading her on in order to find out who she was working for. This should have been a red flag warning for McCaskey. Devon was way too anxious to give up information. What were his motives? Just a nice guy who wanted to help for the right price? A disgruntled ex-employee? Was he working for the target company? Was he part of a sting operation ? She did not listen to her ââ¬Å"gutâ⬠on this one. McCaskey was an intelligent person she should have gone with what she felt (Welch Jack: Straight From The Gut) When McCaskey debriefed Malone she informed him of her meeting with Devon and how she felt Devon could have provided her with all the information she required had she just asked. She then informed Malone she had come away empty handed with the needed information. She also informed him about how uneasy she felt about Devonââ¬â¢s demeanor to the point that he might call the authorities or inform the target companyââ¬â¢s plant Silicon 6 of her interest if she pressed him for the target companyââ¬â¢s information. Malone told her not to contact Devon anymore and just go through her client presentation with him. Malone informed McCaskey that Seleris would present the data as though it represented the actual Silicon 6 plant. When McCaskey objected Malone informed her no one would notice when they presented. Another warning sign, Malone was going to lie to the client. What McCaskey thought was to be a dry-run of her presentation turned out to be held in front of the clientââ¬â¢s senior plant management. The plant managers stopped her within 15 minutes of her presentation stating it provided no new information. In a closed door session with Malone and McCaskey the client plant management stated their displeasure in Selerisââ¬â¢s handling of the Silicon 6 project stating how much business they had given Seleris and how they hope to continue the trend. However, given what they had just witnessed they had doubts. Malone then brought up how Seleris had just made contact with an former employee of the Silicon 6 plant who could provide them all the information required given the proper ââ¬Å"incentivesâ⬠were provided. The attitude with the client senior management immediately changed. The client senior management doubled the consulting fee for IAD stating the additional funds could be used for ââ¬Å"incentivesâ⬠. The client stated they did not care how IAD obtained the information as long as they got it. Malone was delighted in the turn of events and how delighted Richardson would be. When Malone briefed Hackert, he suggested that the consulting fee paid to Devon should be $7,000 not the usual $4,000 or whatever would make it worthwhile. Malone then informed McCaskey to think about how she handle Devon and not rule out the idea of using Kaufmann to meet with Devon. McCaskey realized she was in the middle of paying Devon off to complete Silicon 6 and receive her promised promotion. This was a huge warning sign. Malone was shooting from the hip and he succeeded. Plus he had the perfect patsy; McCaskey or Kaufmann. Strategies Martha McCaskey Could Have Taken One strategy McCaskey could have taken was to stand up and define herself as a person and an employee (Jack Welch Video: Define Yourself or Others Will). If you allow people to think that you condone certain behavior, as in McCaskey stating to Malone ââ¬Å"Youââ¬â¢re Amazing! â⬠after the presentation she and Malone made to the Silicon 6 client. She seemed to admire him for his dishonesty. When she learned that Seleris was bribing former employees of target companies she further failed to define herself in not speaking up for ethics and distancing herself form the situation. Her co-workers could only assume she approved of such behavior. Being new McCaskey desired to excel and seek approval of her management; however bribery to succeed is not the way to differentiate or advance yourself. Differentiation is a way to manage your people and your business. Itââ¬â¢s about getting the best players on your team in order to have everyone pull together and win. (Jack Welch; Winning; Chapter 3) You do not win by being dishonest. When McCaskey discovered her management was basically unethical she needed to have a face to face meeting with them immediately. McCaskey was not in a situation of good boss vs. bad boss (Welch Podcast: Good Boss vs. Bad Boss) with someone who was just a jerk or a bully, she was dealing with 2 people who were blatantly dishonest and unethical who were condoning and encouraging bribery and industrial espionage. They were crossing a line that could land them or McCaskey or Kaufmann in jail. More than likely it would have not been Richardson and Malone as they were the ââ¬Å"know it allâ⬠types of mangers who would let subordinates take the fall. (Welch Podcast: Bosses Who Get It All Wrong). At this point McCaskey has realized both of her managers were dishonest. You cannot trust dishonest people. Trust is the fiber of good peer to peer relationships, once gone itââ¬â¢s hard to win back. Trust is like the stock market you can lose it overnight (Fiener Chapter 3 Law of Trust). McCaskey should have confronted both Richardson and Malone both with their behavior and asked to be moved off of the project. Better to be moved off or moved out than go to jail. McCaskey did not give herself a lot of options to improve her or change her situation as she went along with the status quo. She chose not to stand up and do her job the right way. She more than likely is going to be cannon fodder for her management. (Feiner Chapter 8 Law of Conscientious Objector). A culture change needed to take place at Seleris from top to bottom and bottom to top. However, the persons you had running the company Richardson and Malone were not about to inspire any change that would interfere with their personal cash flow. The main problem with Richardson and Malone is that while both were bright and charismatic, but they were the wrong type of leaders, they were not inspiring the right attributes. Feiner Chapter 2). They were not taking control of the situation for the good of the company or employees, they were doing for themselves. The burning bridge technique might have worked (Fiener Chapter 9 The Law of the Burning Bridge). For change to end it right the process must start right. Malone and Richardson were not about to upset their empire by admitting they were wrong and begin a dra stic change process. It is not in their moral fiber to do so. There was no way for McCaskey to have changed their behavior. A painful end is waiting for them. Three Emails McCaskey Should Write Ty: After some thought and soul searching I feel I should be removed from the Silicon 6 Project. I realize I have not produced well on this project and I sincerely regret my less than stellar performance. I would like to stay on with Seleris IAD and perhaps work on less high profile projects in order to give myself a much needed break. I feel very stressed and overwhelmed at this point. I would like to meet face to face with you in your office to personally discuss my options with you. I would also like to take a 2 week vacation to recover from the last few months as well. I notice your calendar is clear form 1300-1400 would that be convenient for you? Tom: Due to the tremendous stress I have been under I will be taking a couple of weeks vacation to recover. I would like to remove myself form the project. I will let you decide who should meet with Phil Devon, as I know you know the right person to speak with Devon. I have cleared this with Ty Richardson and he agrees that I need some time off. I will be moving on to some less high profile projects. Head of Human Resources: I have enjoyed my tenure Seleris IAD where I feel I have grown personally and professionally. I feel I have worked with some of the industryââ¬â¢s best consultants. It is a decision that I have thought about for a while and I feel it is the best option for me at this point. I will be terminating my employment within 2 weeks from receipt of this email. A certified letter confirming the same will be coming to you forthwith. Conclusion Martha McCaskey has painted herself into a corner. She can pay Devon off take her promotion and hope for the best with her future. Her situation is this; she is considering bribery and has engaged in industrial espionage. McCaskey should run not walk away from this situation. She should run; self terminate her employment and cut all ties with her co-workers. She should have seen the warning flags and listened to her ââ¬Å"gutâ⬠. As soon as possible McCaskey should quit Seleris IAD and retain an attorney. She needs to provide him or her with complete details of her dealings on Silicon 6. McCaskey should act on the advice of her legal counsel to protect herself if Seleris IAD chooses to come after her if the dealings with Devon take a turn for the worse. Call it what you want; incentive, consulting fee, gift, itââ¬â¢s still bribery and illegal. I wonder what Jack Welch would have done?ReferencesWelch, Jack with Suzy, (2005). Winning, Harper Collins. Welch, Jack with John A. Byrne. (2001). Jack: Straight From The Gut, Warner Books Inc. Feiner, Michael, (2005) The Feiner Points of Leadership. Warner Business Books. Welch, J., Welch, S. (2009). Define Yourself or Others Will Retrieved from The Welch Way Website. http://www.welchway.com/
Friday, November 8, 2019
Free Essays on Java Security
Introduction Java is a new programming language from Sun Microsystems (currently in beta release). The Java language has a number of interesting properties. One property is that it is intended to be portable, even to the extent that programs can be dynamically loaded over the network and run locally. In particular, small programs called applets can be loaded and run by a user's WWW browser while the user is ``surfing'' the Web (HotJava is such a browser written in Java, and Netscape2.0 will support Java applets). While this idea is very powerful, it is also an invitation to security problems. The Java language and runtime system (which includes libraries, the compiler, and the bytecode interpreter) attempt to address these security issues, with the result that Sun claims Java will be secure. This paper evaluates the security issues raised by the Java language and its intended uses in Java enabled Web browsers and Java's proposed solutions. After a brief discussion on the background of executable content, this paper moves on to discuss the potential security risks of executable content, what Java's proposed solutions are, and finally an analysis of the effectiveness of those solutions. Background on Executable Content Executable content is the idea of sending around data that is actually code to be executed. Why is the idea of executable content so exciting? The answer is fairly simple. Power and expressiveness. Use of the World Wide Web has exploded over the past few years, along with this growth there have been many attempts to retrofit applications to the Web. While the Web has adapted to allow more interesting uses through forms and scripts that run on the server, these methods are extremely limiting. The ability to have users locally run a program written in a full-fledged programming language allows applications to be used directly over the Web. Not surprisingly Java is not alone with its idea of shipping aroun... Free Essays on Java Security Free Essays on Java Security Introduction Java is a new programming language from Sun Microsystems (currently in beta release). The Java language has a number of interesting properties. One property is that it is intended to be portable, even to the extent that programs can be dynamically loaded over the network and run locally. In particular, small programs called applets can be loaded and run by a user's WWW browser while the user is ``surfing'' the Web (HotJava is such a browser written in Java, and Netscape2.0 will support Java applets). While this idea is very powerful, it is also an invitation to security problems. The Java language and runtime system (which includes libraries, the compiler, and the bytecode interpreter) attempt to address these security issues, with the result that Sun claims Java will be secure. This paper evaluates the security issues raised by the Java language and its intended uses in Java enabled Web browsers and Java's proposed solutions. After a brief discussion on the background of executable content, this paper moves on to discuss the potential security risks of executable content, what Java's proposed solutions are, and finally an analysis of the effectiveness of those solutions. Background on Executable Content Executable content is the idea of sending around data that is actually code to be executed. Why is the idea of executable content so exciting? The answer is fairly simple. Power and expressiveness. Use of the World Wide Web has exploded over the past few years, along with this growth there have been many attempts to retrofit applications to the Web. While the Web has adapted to allow more interesting uses through forms and scripts that run on the server, these methods are extremely limiting. The ability to have users locally run a program written in a full-fledged programming language allows applications to be used directly over the Web. Not surprisingly Java is not alone with its idea of shipping aroun...
Tuesday, November 5, 2019
ENGLISH ESSAY WRITING for Students
ENGLISH ESSAY WRITING for Students Students often receive assignments to do creative writing. Majority of our clients feel insecure about their creative writing skills. It is easy to get off track and jump from one topic to another. For that matter a strong English essay writing structure must be applied. All creative writings start with an idea. If you donââ¬â¢t know what to write about, do a list of ideas and see which one you feel most passionate about. Do a thorough research on a topic. Do you best to find all most interesting topic details to make your writing more exciting and bright for reader. Other way to go is to trust your writing to the hands of the professional writer. Find an online writing service you can trust and then place an order. If you have questions, talk to the Customer Support representative who work around the clock and she will address your issue. After the order placement, you can always message the writer directly to monitor the writing process. Also, you can request a draft to be written within 48 hours. Put your draft request directly into the order instructions.
Sunday, November 3, 2019
SWOT Analysis of Zara and Benetton Term Paper Example | Topics and Well Written Essays - 250 words
SWOT Analysis of Zara and Benetton - Term Paper Example SWOT Analysis of BenettonStrengthsWorldwide renowned brand.Financially stability.A good relationship with labors and suppliers.High-quality products.WeaknessesThe controversial way of advertising.Expensive products.Limited global markets reach except US. OpportunitiesThreatsOnline retail.Adoption of cost leadership strategy.Stable international market demand.Global Diversification. Saturated clothing market increasing market competition.Economic crisis.Comparing and contrasting the SWOT of Zara and BenettonThe strengths of Zara and Benetton are quite similar i.e. high brand value and high turnover. The weakness of Zara and Benetton are bit different. Zaraââ¬â¢s weakness is inadequate promotional activities. On the other hand, Benettonââ¬â¢s weakness is lack of strong presence in emerging markets. Manufacturing and distribution center of Zara is centralized. The opportunity of Zara is to adopt online marketing and decentralize the distribution process. The opportunity of Benetto n is to diversify into the emerging markets and adopt cost leadership strategy. Threats of Zara and Benetton are the similar i.e. threat of new entrants and price war on similar categories among the firms. In case of Zara, the prices of the apparel are lower-middle ranged which is their strength. But in case of Benetton, the prices of apparel are middle-high ranged which can be considered as their weakness.
Friday, November 1, 2019
Portrait of a Fourth Grade Classroom Coursework Example | Topics and Well Written Essays - 500 words
Portrait of a Fourth Grade Classroom - Coursework Example Gullon (2005) observes that ââ¬Å"your classroom has to serve a variety of purposes for a variety of people and as such will need routines and rules.â⬠There is also the need to ensure that there is maximum quietness at all times to facilitate individual learning and attentiveness during lesson delivery. Again, tidiness ensures safety and makes the class conducive for learning. Finally, in other to ensure that obedient students are encouraged to put up good behavior and disobedient ones are deterred from their bad behavior, it is important to constitute a reward and punishment mechanism. Establishing an effective learning environment where all students achieve learning outcomes relies on the implementation of a broad range of classroom organisation and management strategies (McBain, 2004, p.1). This tells of how important classroom organization is in the everyday upkeep the classroom environment.
Subscribe to:
Posts (Atom)