Sunday, February 23, 2020

Critical Review Essay Example | Topics and Well Written Essays - 1000 words - 1

Critical Review - Essay Example The article is based on a study in an organization where people were more tested with the new method of work and they thoroughly enjoyed it because people had the ease of being watched by their colleagues and friends rather than being watched over by their extremely â€Å"strict rules (Snook 2008 16) bosses. The management realized that the â€Å"employees want to know where the business is going and what they need to focus on† (Kaplan 2007 87). This idea was although introduced in the early 21st century, it was still to be tried and tested upon though â€Å"management fads shift all the time† (Brown and Duguid, 2000, p80). The article deals with the issue of surveillance at the work place "that is becoming the focus of much attention" (Sewell 1998 397) Core Questions: The article emphasizes on a few special pointers. The main one was probably to test how the workers work when they are around their peers who act like their bosses and not actually around their real boss es; who they think can be stricter. Also it shows how workers responded to managerial changes from bureaucratic to concertive control. Throughout this control the workers had their peers manage a group which was specially assigned to do a particular task, for them. Also the main purpose of it was to check how much labor, time and money is saved through concertive control and how quickly the negative or positive changes take place in the organization. Assumptions of the Study: The assumption made on the study was weather concertive control can affect any organization in a positive way or not. Also it was a controlled task to all self managers. They had to act responsibly for all actions. They had to initiate all actions and also commit to them. They had to be responsible for the organization’s performance. They had to be responsible for the quality of the work provided to an individual or of a group. They had to make a balanced group that is that every group should have high e xperienced workers, knowledgeable workers and able workers. Also the assumption was to take it in three stages. The first stage being the simple control one, allowed hired bosses to boss his employees. The second stage was the technological control. This control allowed the technology to look upon the workers. The third stage was the bureaucratic control. This was rather the most systematic stage of the control. And after this was the stage of concertive control that was to change the managing way of the organization, this change allowed self control throughout the organization and also control over the staff by a certain worker was introduced throughout this control How the analysis undertaken in the article helps to achieve these objectives After a lot of brain storming the idea of concertive control was started, hence, it should have at least been represented in a better way. The mangers should have had to have proper rules they had to follow and probably the basic rule for the m anagers should have been to be a little easy going on their staff. Also the research should have been carried out in many organizations instead of being carried out in two or three organizations for a longer period of time. Also discrimination between new and old staff members should not have been made. If an old staff member made a mistake he was punished but if the new staff member made the same mistake he was overlooked. The workers should have been given some time to get adjusted to the environment. The iron cage should have been

Thursday, February 6, 2020

Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 words

Computer Communications & Networks - Lab Report Example The devices are called end devices or more correctly hosts; which are either the destinations or sources of information transmitted via a network so accessing a network or site remotely involves three elements; a source or sender, a destination and a medium which is the channel through which the data is transmitted. The data transmitted can be in the form of text, graphics, voice or video which are converted into a language the computer understands called binary bits (data is transmitted as a zero or a one: 0I). The bits are then ‘programmed’ or coded into signals or data packets that can be transmitted through a medium over a network. Now sending data as one continuous stream will mean that no other data or devices can use the medium while the data is being transmitted just like a pipeline; if it is delivering gasoline, it cannot at the same time deliver liquid petroleum gas; so the data is broken into smaller packets; a process called segmentation which allows many dif ferent data to be transmitted concurrently, this is called multiplexing and segmenting data enhances network reliability so data is not lost easily whenever a break in communication occurs (â€Å"3rd Symposium on Networked Systems design and Implementation (NSDI’06), San Jose, California†). ... The one used for internet communication is called TCP/IP stack which contains four layers; Application protocols layer that is defined to applications like WWW, or FTP (File Transfer Protocol), a transmission control protocol which is responsible for directing packets of data to specific computers by using a port number. It also has an internet protocol layer that directs data bits to destinations using the IP addresses of the computers and a hardware layer that converts data into data streams or signals such as the network cards or modems. An instruction flows from the sender (computer) from the application to the transfer control protocol then to the internet protocol and finally to the hardware protocol that converts the bits of information into signals transmitted through a medium through the internet. On reaching the destination computer, the signals are converted back to binary bits through the hardware layer then to the internet protocol layer then to transfer protocol layer a nd then to the application such as a web server software. The internet is made up of many big networks called Network Service providers (NSPs0 connected together in a peer standard. The NSPs exchange data packets with each other and must connect to three network access points (NAPs) and at metropolitan Area Exchanges (MAEs) both of which are called internet exchange points (IXs). Information is then sent around these networked computers to its destinations by routers which contain information tables and switch data packets to the right destination (Serpanos and Wolf 292-302) As soon as one types the web address to be accessed into a web browser (a web browser is a program that is used for internet applications and