Tuesday, May 5, 2020

Roles of Supervisor free essay sample

Supervising    members is clearly more than a job. It is also a commitment    to developing   ones own capacity and that of others to initiate changes that will result in stronger companies. Regardless of whether you are full time or part time supervisor, you are in a key position to make a difference in the lives of your members in the organisation. An in-depth discussion of the Case Study: St. Simon Manufacturing Company, is designed to help readers with practical ideas , suggestions and many effective supervisory techniques   highlighting areas that are important to modern day organisations. Key Components that will be applied to the Case Study: Role of the Supervisor                              Planning-This is the function of setting goals and objectives and converting them into specific plans. For a supervisor the outcome of planning includes operating schedules, quality specifications and deadlines. The planning process also establishes policies ,standard operating procedures, rules and regulations. We will write a custom essay sample on Roles of Supervisor or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Organizing- In performing this function a supervisor lines up all available resources, including   departmental tools, equipments ,materials, and –especially – the work force . It is at this stage   that the organizational structure   of a department is designed and its work is divided up into jobs. Staffing –This is the function by which supervisors figuratively   put   flesh on the organisational structure. Supervisors first figure out exactly how many and what kind of employees a department will need to carry out its work. They then interview, select and    training those people most suitable to fill the open jobs. Leading –This function gets blood flowing in an organization. Supervisors   energize   the vital human resources of the department by providing motivation, communication and leadership

Saturday, April 18, 2020

Linux Security Technologies free essay sample

In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary Access Control (DAC). DAC, though it is still a form of security, only provides minimal protection to a Linux file system. We will write a custom essay sample on Linux Security Technologies or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page With DAC, access to files merely requires needed permissions from the owner of the file to access (commonly referred to as file permissions), often requiring a password to open. A basic weakness of DAC is not being able to fundamentally differentiate between human users and computer programs. And with so many systems often having such large numbers of users, it only takes hackers accessing a single user’s account to have access to any and all of the files they have permissions for. If the compromised user account were to have super-user (root) access, the hacker could then gain access to an entire file system. This became the basis for coming up with a more secure way of protecting wrongful access into standard Linux based systems. SELinux utilizing MAC, on the other hand, was created to address this very weakness that DAC has as the standard Linux security. The way MAC helps improve overall security of SELinux is by providing what is called granular permissions for every subject (user, program, process) and object (file, device). In other words, through MAC, you only grant any subject the specific object or objects required to perform a specific function, and no more. Compared to DAC, security is more compartmentalized and has more layers of protection. Hence, SELinux provides a much more secure environment than the original Linux security features alone can. Another feature providing further security for a network is TCP Wrappers. TCP Wrappers work by controlling access through the utilization of IP addresses. In Linux, this is accomplished through 2 specific files that need to be created. The first file, hosts. deny, is a file listing names of hosts that are to be denied access to the network. The second file, hosts. allow is a file listing the names of hosts that are allowed access to the same network. The absence of theses 2 files, would allow the entire Internet access to network services, severely lowering the security of a host. This lowers a system being compromised through a sort of â€Å"gate guard with an access list† policy. If your name appears on the list, you gain access; if it’s not, you don’t. Creating an artificial root directory is yet another way to provide security for Linux systems, and is commonly referred to as a chroot jail. This prevents accessing or modifying, possibly maliciously, any file outside the directory hierarchy. The command required to create a chroot jail is /usr/sbin/chroot. Note, you must be working as root inside the Linux shell to do this. By creating a chroot jail, it prevents users from navigating up the hierarchy as high as possibly â€Å"/† (root). Even if the user did not have permissions required to edit higher directories, they may still be able to see files they don’t have any reason to have any access to. Chroot can be useful for providing basic preventative security by making it more difficult to exploit information on a server. But, by limiting user access in this way, if a user account were ever hacked, it still provides yet another layer of security by limiting the amount of access each user account has to begin with. It is important to understand that you must run a program in chroot jail as a user other than root (/). This is because root can break out of jail, making the chroot jail not provide the security it is intended to against unwanted access. Setting up iptables is another form of network security in Linux. They allow for setting up a firewall on the network. Iptables allow for network packet filtering rules. The use of iptables function allows rules to be set up that can reject inbound packets opening new connections and accept inbound packets that are responses to locally initiated connections. This basic feature therefore acts as a firewall to the system, preventing unwanted outside attempts to hack into a host network. In conclusion, with the technological direction of our future apparent, security technologies will be a continuing issue that will never stop making further advances. After all, the financial, physical, and ideological future of our country, and people as a whole, cannot afford to do otherwise. As our children, and children’s children, begin to take the reins of this electronically motivated world, computer security technologies will continue to be an important issue as long as we continue as a society. References: * http://www. omnisecu. om/gnu-linux/redhat-certified-engineer-rhce/what-is-security-enhanced-linux-selinux. htm * http://fedoraproject. org/wiki/SELinux_FAQ * http://www. nsa. gov/research/_files/selinux/papers/x/img3. shtml * http://docs. redhat. com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/SELinux_Guide/selg-preface-0011. html * http://docs. fedoraproject. org/en-US/Fedora/13/html/SELinux_FAQ/ * http://www. bu. edu/tech/security/firewalls/host/tcpwrappers_macos x/ * http://www. serverschool. com/dedicated-servers/what-is-a-chroot-jail/ * http://en. wikipedia. org/wiki/Chroot

Saturday, March 14, 2020

The Varied Diet of Turtles

The Varied Diet of Turtles Turtle eating habits are varied and what they eat depends on the available food sources, the habitat in which the turtle lives and the turtles behavior. Most adult land turtles eat a diet that consists of plants. They graze on grass or browse on the leaves of bushes and shrubs that are within their reach. A few species of turtles also eat fruits. Occasionally, some turtles also ingest small insects such as caterpillars that get caught up in the plants they eat, so invertebrates make up a part of a turtles diet as well. One group of turtles well-known for their herbivorous feeding habits are Galapagos tortoises. Galapagos tortoises feed on leaves and grasses and their diet is so influential that over the course of their evolution their shells have been modified in different ways to reflect their eating habits. Galapagos tortoise subspecies that eat grasses that lie close to the ground have shells that are dome-shaped with the rim of their shell lying snugly above their neck. Galapagos tortoise subspecies that eat leaves that are above the ground on bushes and shrubs have shells that are saddle-backed in shape, with the rim of the shell arched upwards enabling them to crane their neck high in the air as they grasp their food. Freshwater turtles such as snapping turtles are ambush predators. Too cumbersome to swim after their prey with any great speed, snapping turtles instead tuck themselves into a bunch of aquatic vegetation and snap at anything that comes within their path. Consequently, snapping turtles eat fish and crustaceans. Most freshwater turtles, when young, eat the larvae of aquatic invertebrates. As they grow older, their diet switches to aquatic vegetation. Sea turtles eat a variety of marine invertebrates and vegetation. For example, leatherback sea turtles feed on jellyfish, loggerhead sea turtles eat bottom-dwelling shellfish, green sea turtles eat seagrass and algae.

Thursday, February 27, 2020

Film Journal Essay Example | Topics and Well Written Essays - 250 words - 1

Film Journal - Essay Example Moreover, there is Gorge, who has shown the interest of marrying Tracy. Moreover, we have the family of Tracy, and that is; Margaret, Dinah and Seth Lord. Also, there is the boss of the Spy magazine by the Kidd among other characters featured in the film. However, the primary objective of this study is to examine the plot Philadelphia story critically as well an analysis of the principal characters in the film. The director of the film introduces us to the Main characters by showing us their character traits. For instance, the director presents Cary Grant as a violent character in the play. His violence features are seen when he pushes Tracy down in their time of divorce. Moreover, Cary is seen to gullible for Kidd blackmails him to sneak Ruth and Jimmy ( Liz and Mike) to the mansion impersonating to be Junius, the son of Seth. On the other hand, Katherine is presented to be a violent and temperamental individual. Her characters are clearly seen when she smashes Dexter’s suitcase at the doorway during their separation. Besides, Catherine is seen to be arrogant towards other people’s weakness. On the other hand, Ruth is introduced as a secretive because of her silence on her last divorce and at the same time she is presented as a loving parson. Costume changes in the film have contributed a lot towards the presentation of the real characters, more so the ladies. The designer of costumes in Philadelphia story (Adrian) has a lot of positive comments as well as an excellent reputation for his great influence in the female fashion industry. For instance, provision of men’s wear to Katherine was the first most revolutionary thing that he did in the introduction of the film. Therefore, putting on means’ wear depicted Katherine to be a strong woman who can handle any challenge before her. Therefore, the designer designed Katherine’s’ clothes in that, they can show her braveness.

Monday, February 10, 2020

FEASIBILITY ANALYSIS Essay Example | Topics and Well Written Essays - 1750 words

FEASIBILITY ANALYSIS - Essay Example The sources of funds will be the share of capital by the three investors. To meet the legal aspects of the business as a General Partnership, one of the three investors will be a national of UAE with around 51 percent of the shares. The shares of the other two investors will be equal. In this section, the feasibility analysis of HealthPoint has been done by analyzing the market and competition situation. To analyze the market, STP approach and BCG matrix methodologies have been used whereas, to analyze the competition situation, Porter’s Five Forces analysis has been conducted. Finally, a survey has been developed which will be used to analyze the feasibility of the proposed business. The UAE food market can be segmented into three major segments including the Retail Outlets (targets the resident expatriates community and covers 80 percent of the population base), Restaurant (Targets the tourists and the visitors community along with the health concerned resident expatriates) and other Market Outlets (such as ship chandlers, catering etc) (Rahman). Since our proposed venture falls in the category of restaurants therefore, only the market segments for this category will be considered. The target market for the proposed venture will be the health conscious people, professionals who seek to eat healthy food during their lunch breaks and workplaces and students who are concerned about their healthy diet plans. In order to attract the target market, the restaurant will be positioned as a healthy-food outlet rather than a food point. Since various Western, Arabic and other small or big outlets of domestic and international brands are operating in Abu Dhabi therefore, there is a strong competition among companies. Because of the tough competition the market shares of each company is very low however, based it has found that because of

Friday, January 31, 2020

Explain Steps in Organizational Changes Process Essay Example for Free

Explain Steps in Organizational Changes Process Essay There are four steps in organizational changes process. The management of change involves determining the needs for changes, determining the obstacles to change, implementing change, and evaluating change. Explaining steps in organizational change process are as follows: First, the organization may determine the needs for changes to make organization more responsive, flexible and competitive. Before the changing, the organization should find the gap between performance objectives and actual performance, and uses some indicators, which like total net profit, sales per employee, and labor costs, to measure the gap in order to decide whether the organization needs to change. Second, the organization need to identify the obstacles, which like resisting changes at organization, division or individual level, Unions resistance, the culture, strategies and structures of the organization, and financial ability, to introduce new policies and practices when the organization need to changes. For example, for the financial ability, HR manager expects to introduce new technology to make the organization more competitive. However, the organization doesn’t have enough subsidies to afford all staffs to learn new skills. Therefore, the organization should identify all potential barriers. Third, the organization should consider which methods to implement in the change to reduce the resistance from managers or employees. The organization can use internal managers or external consultants to carry out the changes. The internal managers have more knowledgeable about people and business operations, but the internal managers often are too narrow to successfully introduce change. Besides, the external consultants are politically neutral and possessing broader and have more knowledgeable viewpoints, but the external consultants do not know the organization and its staff. Therefore, the organization should measure which method is more suitable for the organization. Moreover, the organization should use Top-Down or Bottom-Up approach to implement the changes. The Top-Down approach which managers need to involve in decision and implementation, this approach emphasizes on speed and action. This approach shows the low-level staff just participates in the changes, but top-level managers are made decisions. The Bottom-Up approach which involves considerable discussion and consultation with managers and employees, it emphasizes participation, communication, and the minimizations of uncertainty. This approach makes the staff have more motivations and satisfactions. Therefore, the organization should choose which approach to implement the changes. Last, to measure the effectiveness of changes, the organization use some indicators, like employee productivity, job satisfaction, sales, to compare the before and after situations to analyze and control the outcome. For example, when the organization implemented the change, it can compare the sales this year and last year to evaluate the effectiveness of the change. Therefore, the organization can utilize different indicators to evaluate the effectiveness of the change. The organization should change regularly as the business environment is constantly changing. However, some of reasons why the employees sometimes resistant to change are followings: If I were a HR manager, I would handle this situation with different methods to help the employees. As a HR manager, I would communicate with the employees to reduce the influences of them. Some employees may resist changing because they feel incapable of performing well under the new way of doing things like using high technology, and they do not understanding what is happening or why. Therefore, I would communicate with them to reduce their resistances. As a HR manager, I would participate with the employees to attend some lessons or courses, which are provided by the organization. It is because some of them may feel work overload and loss of face when they faced the change. They may feel that they are physically or mentally unable to handle the change and feel uncomfortable. Thus, I would participate with them to support them to change. As a HR manager, I would organize some channels, which like meetings, memos, E-mails, and social network, to let the employees know why the organization needs to change in order to reduce their resistances and angers. In the channels, I would tell them the high technology only less skills required, the change can carry lower pay rate. So I would organize some channels to reduce their fear of the unknown. As a HR manager, I would negotiate with the organization to provide the counseling for the lay-off employees to lower negative emotions. Some of them may feel that their pay and benefits may be reduced or they may lose their job as the economic downturn. Thus, I would require the organization provide counseling to give them comfort. As a HR manager, I would negotiate with the organization providing rewards when the employees accepted some required. The organization needs to introduce some high technology as an example, if some of them, who accepted the requirement, may have opportunities to increase their pays or promotion. Therefore, I would utilize some rewards to attract them. Therefore, as a HR manager, I am not only monitoring organization’s environment, but also I should communicate with employees.

Wednesday, January 22, 2020

Comparison of Kate Chopins Story of an Hour and William Faulkners A R

Historically, women have been treated as second class citizens. The Napoleonic Code stated that women were controlled by their husbands and cannot freely do their own will without the authority of their husband. This paper shows how this is evident in the "Story of an Hour" by Kate Chopin and " A Rose for Emily" by William Faulkner. In both stories, the use of literary elements such as foreshadowing, symbolism, and significant meaning of the titles are essential in bringing the reader to an unexpected and ironic conclusion. The background of both authors, which was from the South, we can conclude how they could described the situations that they faced such as political and social presumptions problems especially for women at that time. The story explains how Chopin wrote how women were to be "seen but not heard". "The wife cannot plead in her own name, without the authority of her husband, even though she should be a public trader, or noncommunicant, or separate in property." (Kreis 1) This is one of the Code Napoleon that shows women have no right and position at that time. However after World War II, most of the men were going to war and left the women, who make them finally, could get their freedom to do anything or their own because they have to do it to survive. Chopin's stories seem very modern in different ways even though it was written about two hundred years ago. Chopin says that it "..does not always find that marriage necessarily requires that a wife be dominated by their husband,.."(Oklopcic 19) and she was trying to show that women can get along just fine without having man interfere. The story represents a disdain for the way women are treated in some relationships and in society as well. "Her concern w... ...usual life such as Emily who turned into a murderer, killing her own boyfriend and Louise Mallard dead after living her "real life" for one hour, feels her feeling free from repression during her husband death and finally died of heart disease when she knew that her husband is alive. Works Cited Chopin, Kate. "The Story of an Hour." Heritage of American Literature. Ed. James E. Miller. Vol. 2. Austin: Harcourt Brace Jovanich, 1991. 487. Print. Faulkner, William. â€Å"A Rose For Emily.† An Introduction to Fiction. 10th ed. Eds: X.J. Kennedy and Dana Gioia. New Yorkk: Pearson Longman, 2007. 29-34. Kreis, S. (2001). The History Guide. Lectures on Modern European Intellectual History: The Code Napoleon. 15 July, 2010, http://www.historyguide.org/intellect/code_nap.html Oklopcic, Biljana. Faulkner and the Native Keystone: Reading (Beyond) the American South