Saturday, January 25, 2020

Fully Connected Mesh Topology Information Technology Essay

Fully Connected Mesh Topology Information Technology Essay These five labels describe how the devices in a network are interconnected rather than their physical arrangement. For example, having a star topology does not mean that all of the computers in the network must be placed physically around a hub in a star shape. A consideration when choosing a topology is the relative status of the devices be linked. Two relationships are possible: peer-to-peer, where the devices share the link equally, and primary-secondary, where one device controls traffic and the others must transmit through it. Ring and mesh topologies are more convenient for peer-to-peer transmission, while star and tree are more convenient for primary-secondary, bus topology is equally convenient for either. Mesh In a mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. A fully connected mesh network therefore has n*(n l)/2 physical channels to link n devices. To accommodate that many links, every device on the network must have 7 input/output (I/O) ports. tifsTmp9.tif Figure (9) Fully Connected Mesh Topology A mesh offers several advantages over other network topologies. First, the use of dedicated links guarantees that each connection can carry its own data load, thus eliminating the traffic problems that can occur when links must be shared by multiple devices. Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system. Another advantage is privacy or security. When every message sent travels along dedicated line, only the intended recipient sees it. Physical boundaries prevent other users from gaining access to messages. Finally, point-to-point links make fault identification and fault isolation easy. Traffic can be routed to avoid links with suspected problems. This facility enables the network manager to discover the precise location of the fault and aids in finding its cause and solution. The main disadvantages of a mesh are related to the amount of cabling and the number of I/O ports required. First, because every device must be connected to ever other device, installation and reconfiguration are difficult. Second, the sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can accommodate. And, finally, the hardware required connecting each link (I/O ports and cable can be prohibitively expensive). For these reasons a mesh topology is usually implemented in a limited fashionà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬for example, as a backbone connecting the main computers of a hybrid network that can include several other topologies. Star In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub. The devices are not directly linked to each other. Unlike a mesh topology, a star topology does not allow direct traffic between devices. The controller acts as an exchange. If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device. HubtifsTmp10.tif Figure (10) Star topology A star topology is less expensive than a mesh topology. In a star, each device needs only one link and one I/O port to connect it to any number of others. This factor also makes it easy to install and reconfigure. Far less cabling needs to be housed, and additions, moves, and deletions involve only one connection: between that device and the hub. Other advantages include robustness. If one link fails, only that link is affected. All other links remain active. This factor also lends itself to easy fault identification and fault isolation. As long as the hub is working, it can be used to monitor link problems and bypass defective links. However, although a star requires far less cable than a mesh, each node must be linked to a central hub. For this reason more cabling is required in a star than in some other topologies (such as tree, ring, or bus). Tree A tree topology is a variation of a star. As in a star, nodes in a tree are linked to a central hub that controls the traffic to the network. However, not every device plugs directly into the central hub. The majority of devices connect to a secondary hub that in turn is connected to the central hub. The central hub in the tree is an active hub. An active hub contains a repeater, which is a hardware device that regenerates the received bit patterns before sending them out. Repeating strengthens trans- missions and increases the distance a signal can travel. tifsTmp11.tif Figure (11) Tree Topology The secondary hubs may be active or passive hubs. A passive hub provides a simple physical connection between the attached devices. The advantages and disadvantages of a tree topology are generally the same as those of a star. The addition of secondary hubs, however, brings two further advantages. First, it allows more devices to be attached to a single central hub and can therefore increase the distance a signal can travel between devices. Second, it allows the network to isolate and prioritize communications from different computers. For example, the computers attached to one secondary hub can be given priority over computers attached to another secondary hub. In this way, the network designers and operator can guarantee that time-sensitive data will not have to wait for access to the network. A good example of tree topology can be seen in cable TV technology where the main cable from the main office is divided into main branches and each branch is divided into smaller branches and so on. The hubs are used when a cable is divided. Bus The preceding examples all describe point-to-point configurations. A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all the devices in the network. Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker the farther it has to travel. For this reason there is a limit on the number of taps a bus can support and on the distance between those taps. Advantages of a bus topology include ease of installation. Backbone cable can be laid along the most efficient path, then connected to the nodes by drop lines of various lengths. In this way, a bus uses less cabling than mesh, star, or tree topologies. In a star, for example, four network devices in the same room require four lengths of cable reaching all the way to the hub. In a bus, this redundancy is eliminated. Only the backbone cable stretches through the entire facility. Each drop line has to reach only as far as the nearest point on the backbone. tifsTmp12.tif Figure (12) Bus Topology Disadvantages include difficult reconfiguration and fault isolation. A bus is usually designed to be optimally efficient at installation. It can therefore be difficult to add new devices. As mentioned above, signal reflection at the taps can cause degradation in quality. This degradation can be controlled by limiting the number and spacing of devices connected to a given length of cable. Adding new devices may therefore require modification or replacement of the backbone. In addition, a fault or break in the bus cable stops all transmission, even between devices on the same side of the problem. The damaged area reflects signals back in the direction of origin, creating noise in both directions. Ring In a ring topology, each device has a dedicated point-to-point line configuration only with the two devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along. A ring is relatively easy to install and reconfigure. Each device is linked only to its immediate neighbors (either physically or logically). To add or delete a device requires moving only two connections. The only constraints are media and traffic considerations (maximum ring length and number of devices). In addition, fault isolation is simplified. Generally in a ring, a signal is circulating at all times. If one device does not receive a signal within a specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location. However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled station) can disable the entire network. This weakness can be solved by using a dual ring or a switch capable of closing off the break. tifsTemp 13.a.tif Figure (13) Ring Topology OSI Model This model is based on a proposal developed by the International Standards Organization (ISO) as a first step toward international standardization of the protocols used in the various layers. The model is called the ISO-OSI (Open Systems Interconnection) Reference Model because it deals with connecting open systemsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬that is, systems that are open for communication with other systems. We will usually just call it the OSI model for short. The OSI model has seven layers. The principles that were applied to arrive at the seven layers are as follows 1. A layer should be created where a different level of abstraction is needed. 2. Each layer should perform a well-defined function. 3. The function of each layer should be chosen with an eye toward defining internationally standardized protocols. 4. The layer boundaries should be chosen to minimize the information flow across the interfaces. 5. The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity, and small enough that the architecture does not become unwieldy. Below we will discuss each layer of the model in turn, starting at the bottom layer. Note that the OSI model itself is not network architecture because it does not specify the exact services and protocols to be used in each layer. It just tells what each layer should do. However, ISO has also produced standards for all the layers, although these are not part of the reference model itself. Each one has been published as a separate international standard. tifsTmp2-a.tif Figure (16) The OSI Reference Model The Physical Layer The physical layer is concerned with transmitting raw bits over a communication channel. The design issues have to do with making sure that when one side sends a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit. Typical questions here are how many volts should be used to represent a 1 and how many for a 0, how many microseconds a bit lasts, whether transmission may proceed simultaneously in both directions, how the initial connection is established and how it is torn down when both sides are finished, and how many pins the network connector has and what each pin is used for. The design issues here largely deal with mechanical, electrical, and procedural interfaces, and the physical transmission medium, which lies below the physical layer. The Data Link Layer The main task of the data link layer is to take a raw transmission facility and transform it into a line that appears free of undetected transmission errors to the network layer. It accomplishes this task by having the sender break the input data up into data frames (typically a few hundred or a few thousand bytes), transmit the frames sequentially, and process the acknowledgement frames sent back by the receiver. Since the physical layer merely accepts and transmits a stream of bits without any regard to meaning or structure, it is up to the data link layer to create and recognize frame boundaries. This can be accomplished by attaching special bit patterns to the beginning and end of the frame. If these bit patterns can accidentally occur in the data, special care must be taken to make sure these patterns are not incorrectly interpreted as frame delimiters. A noise burst on the line can destroy a frame completely. In this case, the data link layer software on the source machine can retransmit the frame. However, multiple transmissions of the same frame introduce the possibility of duplicate frames. A duplicate frame could be sent if the acknowledgement frame from the receiver back to the sender were lost. It is up to this layer to solve the problems caused by damaged, lost, and duplicate frames. The data link layer may offer several different service classes to the network layer, each of a different quality and with a different price. Another issue that arises in the data link layer (and most of the higher layers is well) is how to keep a fast transmitter from drowning a slow receiver in data. Some traffic regulation mechanism must be employed to let the transmitter know how much buffer space the receiver has at the moment. Frequently, this flow regulation and the error handling are integrated. If the line can be used to transmit data in both directions, this introduces a new complication that the data link layer software must deal with. The problem is that the acknowledgement frames for A to B traffic compete for the use of the line with data frames for the B to A traffic. Broadcast networks have an additional issue in the data link layer to control access to the shared channel. A special, sub layer of the data link layer, the medium access sub layer, deals with this problem. The Network Layer The network layer is concerned with controlling the operation of the subnet. A key design issue is determining how packets are routed from source to destination. Routes can be based on static tables that are wired into the network and rarely changed. They can also be determined at the start of each conversation, for example a terminal session. Finally, they can be highly dynamic, being determined anew for each packet, to reflect the current network load. If too many packets are present in the subnet at the same time, they will get in each others way, forming bottlenecks. The control of such congestion also belongs to the network layer. Since the operators of the subnet may well expect remuneration for their efforts, there is often some accounting function built into the network layer. At the very least, the software must count how many packets or each customer sends characters or bits, to produce billing information. When a packet crosses a national border, with different rates on each side, the accounting can become complicated. When a packet has to travel from one network to another to get to its destination, many problems can arise. The addressing used by the second network may be different from the first one. The second one may not accept the packet at all because it is too large. The protocols may differ, and so on. It is up to the network layer to overcome all these problems to allow heterogeneous networks to be interconnected. In broadcast networks, the routing problem is simple, so the network layer is often thin or even nonexistent. The Transport Layer The basic function of the transport layer is to accept data from the session layer, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all this must be done efficiently, and in a way that isolates the upper layers from the inevitable changes in the hardware technology. Under normal conditions, the transport layer creates a distinct network connection for each transport connection required by the session layer. If the transport connection requires a high throughput, however, the transport layer might create multiple network connections, dividing the data among the network connections to improve throughput. On the other hand, if creating or maintaining a network connection is expensive, the transport layer might multiplex several transport connections onto the same network connection to reduce the cost. In all cases, the transport layer is required to make the multiplexing transparent to the session layer. The transport layer also determines what type of service to provide the session layer, and ultimately, the users of the network. The most popular type of transport connection is an error-free point-to-point channel that delivers messages or bytes in the order in which they were sent. However, other possible kinds of transport service are transport of isolated messages with no guarantee about the order of delivery, and broadcasting of messages to multiple destinations. The type of service is determined when the connection is established. The transport layer is a true end-to-end layer, from source to destination, in other words, a program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. In the lower layers, the protocols are between each machine and its immediate neighbors, and not by the ultimate source and destination machines, which may be separated by many routers. There is a difference between layers 1 through 3, which are chained, and layers 4 through 7, which are end-to-end. Many hosts are multi-programmed, which implies that multiple connections will be entering and leaving each host. Their needs to be some way to tell which message belong to which connection. The transport header is one place this information can be put. In addition to multiplexing several message streams onto one channel, the transport layer must take care of establishing and deleting connections across the network. This requires some kind of naming mechanism, so that a process on one machine has a way of describing with whom it wishes to converse. There must also be a mechanism to regulate the flow of information, so that a fast host cannot overrun a slow one. Such a mechanism is called flow control and plays a key role in the transport layer (also in other layers). Flow control between hosts is distinct from flow control between routers, although we will later see that similar principles apply to both. The Session Layer The session layer allows users on different machines to establish sessions between them. A session allows ordinary data transport, as does the transport layer, but it also provides enhanced services useful in some applications. A session might be used to allow a user to log into a remote timesharing system or to transfer a file between two machines. One of the services of the session layer is to manage dialogue control. Sessions can allow traffic to go in both directions at the same time, or in only one direction at a time. If traffic can only go one way at a time (analogous to a single railroad track), the session layer can help keep track of whose turn it is. A related session service is token management. For some protocols, it is essential that both sides do not attempt the same operation at the same time. To manage these activities, the session layer provides tokens that can be exchanged. Only the side holding the token may perform the critical operation. Another session service is synchronization. Consider the problems that might occur when trying to do a 2-hour file transfer between two machines with a 1-hour mean time between crashes. After each transfer was aborted, the whole transfer would have to start over again and would probably fail again the next time as well. To eliminate this problem, the session layer provides a way to insert checkpoints into the data stream, so that after a crash, only the data transferred after the last checkpoint have to be repeated. The Presentation Layer The presentation layer performs certain functions that are requested sufficiently often to warrant finding a general solution for them, rather than letting each user solve the problems. In particular, unlike all the lower layers, which are just interested in moving bits reliably from here to there, the presentation layer is concerned with the syntax and semantics of the information transmitted. A typical example of a presentation service is encoding data in a standard agreed upon way. Most user programs do not exchange random binary bit strings. They exchange things such as peoples names, dates, amounts of money, and invoices. These items are represented as character strings, integers, floating-point numbers, and data structures composed of several simpler items. Different computers have different codes for representing character strings, integers, and so on. In order to make it possible for computers with different representations to communicate, the data structures to be exchanged can be defined in an abstract way, along with a standard encoding to be used on the wire. The presentation layer manages these abstract data structures and converts from the representation used inside the computer to the network standard representation and back. The Application Layer The application layer contains a variety of protocols that are commonly needed. For example, there are hundreds of incompatible terminal types in the world. Consider, the plight of a full screen editor that is supposed to work over a network with many different terminal types, each with different screen layouts, escape sequences for inserting and deleting text, involving the cursor, etc. One way to solve this problem is to define an abstract network virtual terminal that editors and other programs can be written to deal with. To handle each terminal type, a piece of software must be written to map the functions of the network virtual terminal onto the real terminal. For example, when the editor moves the virtual terminals cursor to the upper left-hand corner of the screen, this software must issue the proper command sequence to the real terminal to get its cursor there too. All the virtual terminal software is in the application layer. Another application layer function is file transfer. Different file systems have different file naming conventions, different ways of representing text lines, and so on. Transferring a file between two different systems requires handling these and other incompatibilities. This work, too, belongs to the application layer, as do electronic mail, remote job entry, directory lookup, and various other general purpose and special-purpose facilities.

Friday, January 17, 2020

IQ Testing and Group Intelligence Testing

In defining intelligence, there has always been the question of whether intelligence is measured as a remarkable occurrence or if it has many variables that are combined. For example, is it how â€Å"smart† a person is? Or is it their ability to perform well on standardized tests? Are they measuring a person†s intelligence? Or just some arbitrary quantity of the person†s IQ? Or is it a mixture of survival, mathematical, social and other abilities. There are many debates regarding whether measuring intelligence is determined from test scores and results, or if it is measured by the person†s ability to process and problem solve. Uses of intelligence testing in an educational setting, intelligence and achievement tests are administered routinely to assess individual accomplishment. They are used to improve instruction a! nd curriculum planning. High schools use these tests to assist in the students future educational planning and help decide what college or type of college to attend. Elementary schools utilize screening and testing procedures to help determine readiness for writing and reading placement. Intelligence can be measured, by intelligence tests, among them the Stanford-Binet Intelligence Scale and the Wechsler Scale. These tests are intended to determine an individual†s intelligence quotient (IQ). Intelligence tests usually provide an estimate of global cognitive functioning as well as information about functioning within more specific domains. Intelligence tests are quite stable compared to measures of other human traits. However, the degree of stability increases with age such that early childhood and preschool measures of intellectual function are far less predictive of later functioning than assessments taken during middle childhood. The stability of intelligence test scores may! change as a function due to important environmental factors. Therefore, intelligence test scores are descriptive of a child†s functioning at that point in time when taking a test. The test scores could also be effected by environmental factors, child†s psychiatric status or educational program. Components of a good intelligence test are (a) Validity; does the test really measure intelligence and not something else? (b) Reliability; does the test produce consistent measures? (c) Norms; are the participants being fairly compared? Components that make an intelligence test flawed are (a) Poor validity; tests may be sensitive to social factors. (b) Poor norms; comparing people who are different. (c) Poor application; tests measure something that the school or job has nothing to do with. Theories of Process Psychometric Model Psychometric approach is defined as psychology that deals with the design, administration, and interpretation of quantitative tests ! for the measurement of psychological variables such as intelligence, aptitude, and personality traits. There are various psychometric approaches to intelligence. The following paragraphs describe three different theorists and their psychometric model. First is Charles Spearman, who believed that intelligence is a combination of two parts. According to his two-factory theory of intelligence, the performance of any intellectual act requires some combination of g, (general intelligence factor) which is available to the same individual to the same degree for all intellectual acts. (Specific factors) or s is specific to that act and varies in strength from one act to another. S is specific knowledge such as verbal reasoning or spatial problem solving. Spearman equated g with mental energy. If one knows how a person performs on one task that is highly saturated with g, one can safely predict a similar level of performance for another highly g saturated task. The prediction of perfor! mance on tasks with high s factors is less accurate. Thus, the most important information to have about a person†s intellectual ability is an estimate of their g or mental energy (Plucker 1989). Guilford†s theory includes 150 abilities, arranged in three dimensions; contents, operations, and products. Guilford†s three-dimensional Structure of Intellect classified intellectual acts into 120 separate categories. These categories are operations dimension, products dimension and material or content dimension. He developed firm convictions regarding the ability of individual difference among people. Guilford believed that intelligence is much too complicated to be subsumed by a few primary mental abilities and g factor. His systematic theory gave rise to what is known as informational-operational psychology. Information-Processing Informational theorists believe human cognition is best understood as the management of information through a system with limit!ed space or resources (Bukato and Daehler 1998). Thurstone†s theory is based on seven primary mental abilities. In the area of intelligence, his theory maintains that intelligence is made up of several primary mental abilities rather than just the g and s factors. He was among the first to purpose and demonstrate that there are numerous ways in which a person can be intelligent. Thurstone†s Multiple-Factors Theory identified these seven primary mental abilities; Verbal Comprehension, Associative Memory, Word Fluency, Number Facility, Reasoning, Spatial Visualization, and Perceptual Speed. Thurstone†s theory has been used to construct intelligence tests that yield a profile of the individual†s performance on each of the ability tests, rather than general that yield a single score such as an IQ. Two theorists that promote informational processing models are Sternberg and Gardner. Sternberg†s triarchic theory consists of three parts; cognitive components of intelligence, experien! They are divided into three major sub-theories: Componential is encoding, combining and comparing stimuli, and evaluating one own performance. Contextual is the adaptation to one†s environment. One of Sternberg†s most important contributions to intelligence theory has been the redefinition of intelligence to incorporate practical knowledge. As Sternberg insists, â€Å"real life is where intelligence operates† and not in the classroom†¦The true measure of success is not how well one does in school, but how well one does in life (Trosky, 1998)†

Thursday, January 9, 2020

One of the most prominent perspectives on meaning in life...

One of the most prominent perspectives on meaning in life is that of Frankl (1959, 1984). He describes meaning in life as having found a reason for living and a feeling or experience that one’s life is of significance. In Frankl’s view, meaning in life refers to a sense of being committed to, and fulfilling, a higher purpose in life. This purposefulness provides one with a reason for living (the term purpose is often used as a synonym for meaning). It makes life more than just a survival quest, but rather an experience of one’s life as having made or being able to make a difference in the world. According to Yalom (1980), two questions one can ask pertaining the meaning are â€Å"what is the meaning of life?† and â€Å"what is the meaning of my†¦show more content†¦As long as he remains conscious, he has irresponsibleness. This responsibility remains with him to the last moment of his existence.† Reker’s (2000) conception of existential meaning overlaps with Yalom’s (1980) afore mentioned two questions. He defines existential meaning as â€Å"attempts to understand how events in life fit into a larger context. It involves the process of creating and/or discovering meaning, which is fascinated by a sense of coherence (sense of order, reason for existence) and a sense of purpose in life (mission in life, direction, goal orientation)† (p.39). Coherence seems to address Yalom’s first question (â€Å"what is the meaning of life?†) whereas a sense of purpose could be seen as a response to the second (â€Å"what is the meaning of my life?†). Also central to Reker’s formulation of existential meaning are what he refers to as the â€Å"core processes† of meaning- making, i.e., searching for meaning and finding meaning. Baumeister (1991) took a somewhat different track by suggesting that the meaning of one’s life is not a distinct form of meaning. Rather, it is no different from the meaning in a sentence: the parts come together to form a coherent whole, it can be comprehended by other people, it fits into a wider context, and it evokes particular assumptions understood by the culture. The two functions meaning serves, accordingShow MoreRelatedDeveloping Management Skills404131 Words   |  1617 PagesWeidemann-Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproductionRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book

Wednesday, January 1, 2020

Development And Implementation Of The Organizational Strategy

Development and Implementation of the organizational strategy Me: Hello sir, I’m excited to know how the development and implementation of operational strategies occurs at IGT. I would like to know more about importance of a core strategy. VP-customer service – I am fascinated about how companies are working on core operational strategy. In my opinion, without a clear strategy in mind it is difficult to reach the vision. I will give you an example of strategy of InterGlobe Enterprises – once a company has a clear picture of the organizational environment, vision and mission, resources, the firm then creates a strategy to achieve the pre-defined goals. Our company deals majorly in industry of Information Technology and Aviation. Over a period of years, both of the industries are recognized as booming. While the industries are booming, immense of competition is also involved. To stay ahead in the industry, to meet the objectives, and to accomplish the visionary image, IGT over a period time has developed a core organizational strategy and top management ensure that each of us follow it. We have a very tactical approach while developing and implementing strategies. Entire team works together and is involved in idea generation. We motivate our employees to become leader and organize the core job responsibilities. Our teams work on regular basis to improve the processes for high performance delivery. 1. Customer orientation - In a service oriented business like that of IGT,Show MoreRelatedHow The Development And Implementation Of The Organizational Strategy Takes Place And How It Became The Worlds Leading Industrial2555 Words   |  11 Pagesevaluate the way individuals interact within Grainger and talk about how those interactions contributes to the success or failure of the organization. I will analyze how the development and implementation of the organizational strategy takes place and what effect it has on Grainger’s organization. I will also explore how the strategy is expressed through the culture of Grainger’s organization and how that helps determine the output of the organization. Most importantly, I will discuss the style and techniquesRead MoreOutline And Outline Of Organizational Development And Strategies1717 Words   |  7 PagesQUESTION #2: (addressing SLO #2 - summarize and explain organizational development and strategies common to technology-intensive enterprises SLO #3 - formulate and assemble component ideas in order to successfully execute a project plan) NOTICE: The following questions are to be answered in your own words. Your responses to the questions are to be formulated solely from your personal body of knowledge developed and derived from your readings, study and research while in the Master of ScienceRead MoreA Research Study On Project Management922 Words   |  4 Pagesinstruction and career development in the field of project management† (Healy, 1997). The PMBOK (Project Management Body of Knowledge) is the guide published every 5 years by the PMI containing guidelines for managing individual projects and defines project management related concepts (PMI, 2013) . The PMBOK is divided in knowledge areas and process groups: Change Management and Project Management. Change management in this paper is understood as a subset of organizational development, defined as â€Å"theRead Moreï » ¿Understanding Organizations and the Role of Human Resources Activity1149 Words   |  5 PagesOrganizations and the Role of Human Resources Activity 2 Organization Strategy and Human Resources An organizational strategy is the creation, implementation and evaluation of decisions within an organization that enables it to achieve its long term objectives. Key strategic considerations of organisation strategy include: 1) What re-configurations, reach extensions and strategic relationships will be necessary to deliver the intended strategy. 2) What new skills and capabilities will be needed and whatRead MoreOrganizational Development ( Od )1130 Words   |  5 PagesOrganizational development (OD) refers to a process of enhancing personal and organizational change, and increasing the organization’s effectiveness by using interventions that are driven by behavioral and social science knowledge (Brown and Harvey 2011).The main aim of organizational development in any given organization is to bring change that will drive the organization towards attaining effectiveness in its operations. Organizations need to change in order to become more productive, satisfyingRead MoreExisting Frameworks Of Strategy Implementation Essay1030 Words   |  5 Pagesframeworks of strategy implementation (the gaps of theory) The reasons for the framework in strategy implementations are obvious. it’s an extremely complex set of tasks and managers need to know what are the steps to follow, what is the sequence of those steps, why at all those steps are necessary, what is more critical in those steps, and so on. The frameworks are working as guide for managers to set the actions needed. In the absence of a framework, managers would still implement their strategies. ButRead MoreA Report On The And Mielke1249 Words   |  5 Pagesthe foundational principle of Gemba in the workplace. Gemba is a Japanese term applied to organizational leaders who observe the workplace to gain knowledge and make decisions based on data and observations (Hossen, 2015). In the development of the product or service, organizational leaders observe the process to identify the root cause of problems or opportunities (Dombrowski Mielke, 2013). Organizational leaders avoid defects by identifying and addressing problems through the Gemba process (HossenRead MoreMckinsey 7 S Model1323 Words   |  6 Pages3 Tools for Strategic Implementation LaKeshia Chaney Walden University Tools for Strategic Implementation The chosen strategic tool for implementation is the McKinsey 7 S model. The 7 S Framework created by two consultants, Tom Peters and Robert Waterman from the McKinsey Company, which uses an internal alignment perspective to improve organization effectiveness (Caraballo, 2015). The McKinsey 7 S model helps strategic managers create and maintain efficient alignment (Dyer, Godfrey, Jensen,Read MoreThe Concept of Strategy and Strategic Management1718 Words   |  7 PagesTHE CONCEPT OF STRATEGY AND STRATEGIC MANAGEMENT G. Tyge Payne, PhD 1 Strategic Management Strategy: The unifying theme that gives coherence and direction to the decisions of an organization Strategic Management: Consisting of the analysis, decisions, and actions an organization undertakes in order to create and sustain competitive advantages. Or, the Strategic Management Process is: The full set of commitments, decisions, and actions required for a firm to create value and earn aboveaverageRead MoreQCP 100 Quiz 2 Ch 4 Questions 21626 Words   |  7 Pagesï » ¿QCP 100 8th Edition CHAPTER 4 STRATEGIC FOCUS FOR PERFORMANCE EXCELLENCE TRUE/FALSE QUESTIONS 1. A strategy is a pattern or plan that integrates an organization’s major goals, policies, and action sequences into a cohesive whole. Answer: T 2. Mission is the pattern of decisions that determines and reveals an organization’s goals, policies, and plans to meet the needs of its stakeholders. Answer: F 3. Strategic planning is the process of envisioning the organization’s future and developing