Tuesday, December 24, 2019

What Additional Competencies And Skills Required From An...

What additional competencies and skills are required from an HR professional managing a company’s diversity portfolio? Today’s workforce may comprise of people from different age groups representing different generations, faith, gender and sexual orientation. They may have different ethnicity, culture, native language and they may come from any part of the world. Basing on these reality HR professionals have to make sure that they can effectively attract, retain, develop and utilize this complex heterogeneous workforce to achieve the goals of the company. With the influx of hundred thousands of skilled migrants, huge number of international students graduating from the local institutions and international worker programs the picture of the†¦show more content†¦It is also important to understand the functions of different departments to sense how they view diversity from their end. The diversity manager must be able to help the business unit leaders to understand the implication of diversity for the business. By understanding the culture he/she should be able to know how work gets done formally and informally in the organization, discover the real strength and use it effectively. Apart from having an overall knowledge of HR practices he/she should be able to utilize and interpret operational/financial data, should know the competitions in the market and collaborate within and outside the organization. It is also important to know the external environment that affects the organization like society, regulatory, technology etc. Cultural Competence: Since the employees come from diverse cultural backgrounds it is very important for the diversity and inclusion practitioner to understand the norms and values of different cultures. As employees from different cultures may land into conflicting situations the practitioner must be able to understand the delicate dynamics of cultural conflict and be able to resolve the conflict. He/she should preferably be fluent in more than one language to communicate effectively with the employees. While dealing with individuals he/she should be able to address one’s cultural preferences. He/she should understand complex group dynamics so that can successfully

Monday, December 16, 2019

Jose Aquino Free Essays

Sure we have gone a very long way to back in the days Of Martin Luther King J. R. , Blacks/Minorities are not so bluntly discriminated but now in days its as if this new form of subliminally resentful actions are being brought to this day and age. We will write a custom essay sample on Jose Aquino or any similar topic only for you Order Now Examples like the recent tragedies regarding Mike Brown and Erick Gardner make my argument even more clear to understand and to prove. Of course there are a few people who believe that the actions the police officers took were necessary. Perhaps they might say, ‘ ‘They asked for it,† â€Å"They Resisted arrest,† they had it coming. Y to them that events such as the police killings are a nexus where white racial resentment and white supremacy are made to confront black/ minority pain, reasonable hurt, and the righteous anger. Why is it that the media has always showed the â€Å"gang member† as a Black or Hispanic male? These are subjects we should be asking ourselves and realize how that can be crucial to some ones perception about a group of people and think about the repercussions all this can have to future generations. Just recently released to the public was data that disappointingly proves the Boston Police department has used racially biased pol icing. Researchers concluded that police targeted Blacks in 63. 3% of encounters, while Blacks make up less than a quarter of Boson’s population. This racial disparity cannot be explained. They also found that Blacks were more likely than whites to be subjected to repeat police/civilian encounters and to be frisked or searched. The bottom line is that race was a significant factor driving the BED’S stop and frisk practices. Those on the opposing side would become speechless to this information. These people who were randomly targeted ere minding there business and going about there day. But because of this current view that society has emplace they were boxed in to this stereotypical box, leading to them being victimized. How do we put an end to all of this? First we need to know our own conscious and unconscious feelings. Perhaps think about what stereotypes we may have and ways we might eliminate these believes or figure out why these ideas have been introduced and of course find the ROOT of this. But perhaps the most important but most difficult is to educate ourselves well enough to hanged the way people think and work within the system so that new ideas and change can be accomplished. The simple fact is that racism both personal, institutional, and structural remains a force in American life. It impacts the lives of everyone, whites included because the result of tension , and shapes the broad material circumstances of minorities in countless negative ways. Yes, there are many ways in which we’ve made progress, and we should celebrate them. But just because we don’t face the racism of the past doesn’t mean we’ve solved the problem. How to cite Jose Aquino, Papers

Sunday, December 8, 2019

Actor Network Theory Flattening Consumption Studies

Question: Discuss about the Actor Network Theory for Flattening Consumption Studies. Answer: Introduction As opined by Sayes (2014) actor network theory can be described as the analysis of the interactions between the system and the end users. In most cases the end users are the human. The interaction between the two (i.e. the system and the human user) in the network have a crucial role in achieving the desired objectives. This essay represents the relevance of the actor network theory in the computing. This essay focuses on the analysis of two computing stories, the different actants in those stories. These two stories are different in the aspects of computing, their benefits and issues. Also the use of the actants in enhancing the management functionalities in the organization or network is also discussed here. Moreover the advantages and the disadvantages of contemporary computing are also discussed in this essay. The concept of ANT and its relevance of it in studying computing The concept of the actor network theory is about understanding the effect of the actors action (either human or non human actant) on the network. Although the idea of ANT is not that oblivious as the words in the phrase means. Instead the meaning or the interpretation of the theory is simple (Horowitz, 2012). The theory can be interpreted as the effect of the actor on the network as well as the effect or the influence of the network on the actant. Every time the actions of the actant are affected by the wide range of surrounding factors (Sayes, 2014). The ANT theory helps in linking the technical as well as the non technical actants in the processes or computing. It helps in enhancing the efficiency and effectiveness of the different management functionalities (Latour, 1996). As an example it can be said that when a user is using the word processer then this action of the user is influenced or affected by the users prior experience of using it. Figure1: Different attributes of actor-network theory (Source: Latour, 1996, pp-376) Computing story 1: iris scan to replace the fingerprint method Recently the investigating agency FBI (Federal Bureau of investigation) has scanned the irises of nearly, 460,000 people as a part of a pilot project. This pilot project is aimed to remove the method of fingerprints to ensure the accurate determination of the identity of a person. Although the technology is in existence for almost last 25 years but it was not used in this purpose. Now, being a bug free, fast and easy process it is going to be used in the personal identification process. The Iris scanning process is also going to replace the retinal scan process which is considered as uncomfortable for the people (livescience.com, 2016). According to this technology, it captures pictures from a live pictorial or video feed and searches inside the central database to find a possible match. At first it captures the image then it segments the iris region of the eye area. After this, a specific algorithm is used so that the different information about the iris is obtained and compared to the available information in the database. This can help in the identification of the criminals and to control the access of people in the restricted areas. Figure 2: process of scanning the iris (Source: livescience.com, 2016) Identification of actants In this story the algorithm used for obtaining the different information about the iris acts as a digital actant. The software or the hardware like the camera used in this process, acts as the software actant (Sayes, 2014). The human are also works as the actants in this process, since the image of the human eye or the iris acts as the main component in the total processes (Er, Pollack and Sankaran, 2013). The interrelation and connection between the processes are important for the success of the whole processes. Enhanced management by using the iris scanning process As the iris also has the unique structure like the fingerprints, then it is possible to detect the difference between the two persons using the iris related information. The twins too do not have the same patterns in their iris. There are different aspects like the coronas, furrows and the stripes are different for each and every person (Sayes, 2014). Also the structure of the iris remains same and stable for a persons lifetime. Therefore the use of iris pattern in identification of individuals can be reliable. Again as the iris is an external organ and extremely visible then it becomes non-invasive (Horowitz, 2012). For this reason the iris recognition becomes more reliable than the other identification technique. Computing story 2: The atomic memory device: The better storage option The researchers of the Delft University of Technology, has developed a new atomic memory device that can encode data atom by atom (livescience.com, 2016). This can help the users to store almost hundred times more data than the present storage devices can store. This helps in the storing the huge amount of data (Bajde, 2013). Since in todays world, from a individual to the business organizations are generating a huge amount of data which needs to be stored for the future use (Bueger, 2013). The new devices developed by researchers can store up to 500 trillion bits of data per square inch. This amount of storage capacity is almost 500 times more than the current best performing storage devices. The new device represents each bit in two probable locations on a copper plane; a chlorine atom can move backward and forward between these two positions. This replacement of the chlorine atom helps in the storage of 0 and 1 on the copper plane. When the chlorine atom is on its top position, th en there is a hole under this atom. This position is suitable for storing 1. On the other hand if the hole is in upper position and the chlorine atom is in lower position then that is suitable for storing the 0 bit. These bits are separated by the rows of other chlorine atoms. The atoms are organized into 127 blocks of 64 bits, and each of the blocks is labeled with marker of holes. Till now the reading process of a block takes about one minute and writing takes about two minutes (Horowitz, 2012). However the researchers are working on the methods to speed up the reading and writing processes. Figure3: Structure of the atomic memory device (Source: Horn 2013, pp-229) Identification of actants In the above story the storage device is the technical actant. In the present world the storage devices are a necessary part of the computing. The more the capacity is the more efficient management of the different processes or tasks will be (Er, Pollack and Sankaran, 2013). Therefore the new storage devices are capable of providing much more storage space with lesser physical size of the device. Enhanced management In todays world the individuals as well as the organization needs much more storage space device that needs lesser setup cost and less physical area for the installation. These new technology can cop up with this requirements of the users and help in storing large amount of data in a smaller device (Horowitz, 2012). This enhances the usability of the storage devices with lesser setup cost and minimum required physical area. Being small in the size, these devices will easy to carry anywhere and to get the required data. Pros and Cons of the Contemporary Computing As the computing technologies are getting more and more developed every day, there are some benefits and problems are also noticed related to these technologies. In both the computing stories stated above, the advancement helped the users to have increased access, communication and security; at the same time it causes lesser privacy for the users (Bueger, 2013). Moreover, the risks of losing jobs, technical faults are increased due to the use of these technologies. Therefore it is advice to co-relate the human and nonhuman activities to maintain the sustainability in the computing world. Conclusion In both the computing stories stated above it can be said that the actor network theory had played a significant role. The key concepts of the networks, actants and the effect of one actant on another are significant for the implementation of these technologies. Use of the iris scanning process for identifying individuals has increased the reliability of the identification process. These kinds of approaches are crucial for the security of the organizations and identifying the criminals in disguise. On the other hand the atomic storage device helped the users to have more storage space while the device consumes much lesser physical area to establish than the current devices. But since this technology are in initial stage and the read, write speeds are slower, and the researchers are working on this to increase the speeds. Therefore the development of these technologies will end up in providing much more efficiency to its users. After the analysis of the above two stories it can be sta ted that the use of the actor network theory have huge impact on the use of thee technologies. Moreover, it can help the users of these technologies to understand the effect of the different actants over the network channel. References A kilobyte rewritable atomic memory. (2016).Nature Nanotech. [online] Available at: https://www.livescience.com/55437-tiny-atomic-memory-device.html [Accessed 26 Jul. 2016]. Bajde, D. (2013). Consumer culture theory (re) visits actornetwork theory Flattening consumption studies.Marketing Theory,13(2), pp.227-242. Best, J. and Walters, W. (2013). Actor-Network Theory and International Relationality: Lost (and Found) in Translation.International Political Sociology,7(3), pp.332-334. Bueger, C. (2013). Actorà ¢Ã¢â€š ¬Ã‚ Network Theory, Methodology, and International Organization.International Political Sociology,7(3), pp.338-342. Dalphy, L.J. and Blackburn, D.K., Western Digital Technologies, Inc., (2012).Data storage device tester. U.S. Patent 8,332,695. Er, M., Pollack, J.B. and Sankaran, S. (2013). Actor-Network Theory, Activity Theory and Action Research and their application in project management research.Novel Approaches to Organizational Project Management Research: Translational and Transformational. Horn, R.L., Western Digital Technologies, Inc. (2013).System and method for data recovery in a solid state storage device. U.S. Patent 8,503,237. Horowitz, L.S. (2012). Translation Alignment: Actorà ¢Ã¢â€š ¬Ã‚ Network Theory, Resistance, and the Power Dynamics of Alliance in New Caledonia.Antipode,44(3), pp.806-827. Latour, B., 1996. On actor-network theory: A few clarifications.Soziale welt, pp.369-381. Pollack, J. Costello, K. and Sankaran, S., (2013). Applying ActorNetwork Theory as a sensemaking framework for complex organisational change programs.International Journal of Project Management,31(8), pp.1118-1128. Sayes, E., (2014). ActorNetwork Theory and methodology: Just what does it mean to say that nonhumans have agency?.Social Studies of Science,44(1), pp.134-149. Science, L. (2016).Iris Scans to Replace Fingerprints. [online] Live Science. Available at: https://www.livescience.com/55418-iris-scans-to-replace-fingerprints.html [Accessed 26 Jul. 2016].

Sunday, December 1, 2019

Super PACs free essay sample

Super PACs or Super Political Action Committees are â€Å"a type of independent political action committee which may raise unlimited sums of money from corporations, unions, and individuals but is not permitted to contribute to or coordinate directly with parties or candidates† –Oxford Dictionaries How did Super PACs come to be? Political Action Committees have been around for decades. However, prior to 2010, PACs were only allowed to accept up to $2,500 per individual. Corporations and labor unions were NOT allowed to make contributions in any form or fashion. This money could then be given to political campaigns to be used for promoting their candidate. However two Supreme Court cases changed that in 2010. Citizens United v. Federal Election Commission ruled that a television advertising for Michael Moores Fahrenheit 9/11 was legal despite Citizens United’s protest that it unfairly and illegally advocated against the re-election of George Bush. Later that year, Speechnow. org v. We will write a custom essay sample on Super PACs or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page FEC led to the ruling that the creation of independent expenditure-only groups, or Super PACs was constitutional so long as they did not coordinate directly with parties or candidates. Thus, the Super PAC was born. Who manages Super PACs? Congress, the Supreme Court and the Federal Election Commission (FEC), control super PACs. What should be done about Super PACs? Although the Supreme Court was responsible for the Citizens United case that allows Super PACs to accept unlimited sums of money, Congress has the power pass legislation that would prohibit these organizations. Furthermore the Supreme Court has the power to reverse its previous rulings in Citizens United v. Federal Election Commission and Speechnow. org v. FEC. Lastly, the FEC has done a poor job of enforcing the rules that are in place regarding super PACs.