Free Essay

The Hexadecimal Company

In:

Submitted By mumedjon
Words 292
Pages 2
The Hexadecimal Company
I. Problems:
A. Macro
1. OD group not respected in company – save for the President, a large number think it is a waste of time & money (700K/yr).
2. OD group disgruntled after meeting – half the group considers leaving .
3. OD group meeting resistance in implementing change.
4. Financial stress of group on company.

A. Micro
1. OD group appears to have no clear goals or objectives beyond its own function.
2. Training program has bred resentment.
3. OD relationship with company changed after suggestion to place them under HR w/ Indra as the primary contact.

II. Causes:
1. OD group reported to president, who was often absent and acted without oversight.
2. President did not address entire OD group, but primarily Kay & Indra to a lesser extent.
3. No clear goals or objectives set by President/committee or from OD group created

III. Systems affected:
1. Structural – moving OD to HR instead of an independent entity & establishment of Indra as the primary contact.
2. Psychosocial – build relationship between OD & the other departments. With suggested restructuring. Two members of OD group want to leave – may not be the best fit for those members.
3. Technical – appear to have technical knowledge that may benefit company – training programs.
4. Managerial – the management currently seems to be comfortable in their positions and performance. Zoltar appears to leave the majority of the decisions up to the committee. Zoltar is also rather absent from the day to day operations.
5. Goals and values – the system seems to value putting in your time and you will get promoted. Excellence in performance is something not present at Grayson, but complacency seems to be prevalent.

IV. Alternatives: 1. Restructure as per President
2.
3.

V. Recommendations:

Similar Documents

Premium Essay

Hexadecimal Company

...The Hexadecimal Company Case Analysis pg, 167 I. Problems     A. Macro           The Hexadecimal Company in recent years was forced to change their product market due to lower labor costs by companies in competition. With this change of product came rapid growth and systemic problems within the company. The President, John, Zoltan, decided to created an Organizational Development (OD) group to help address change and managerial style within the company. However, this OD group was not accepted well within the organization and many felt as though this group was a waste of time, energy and resources. Employees did not want to participate in the training although forced to attend. In the beginning of the group’s development, the members and Zoltan were meeting once a week, relaying quality data and information up to the president for situational awareness and feedback. Zoltan became less involved with the OD group during his absences while traveling abroad for business trips. He did not appoint the group with a leader/manager, because of this, some members of the group are unhappy with the current situations. Some members feel as though there is favoritism with those allowed or some have easier access to speak to Zoltan without appointments (i.e. lunch or coffee meetings). These hostilities could have been avoided if Zoltan appointed a leader or even perhaps one speaker, over the group. An advantage of having one speaker for the group is that this one individual can...

Words: 1118 - Pages: 5

Premium Essay

Components of It

...The VPN connection is also handled by a specific router for VPN access. In addition to my home network, work network, and VPN, I also have a cloud-based music service where I access my music that gets me through the day. The cloud based network is not local, but it is accessible over the internet at Google. 2) Binary data codes like EBCDIC, ASCII, or Unicode are often presented using hexadecimal notation rather than a long list of 0’s and 1’s. Likewise other items requiring long sequences of 0’s and 1’s like IP addresses to identify network location are generally presented in non-binary formats as well. Describe the relationship between a hexadecimal character and its associated binary. Describe the relationship between one octet of an IP address and its associated binary. Explain why these notations are often utilized rather than the full binary. Binary is a computer’s way of receiving instructions. Binary represents a switch indicated by the number 0 or number 1 that indicates either “Off” or “On”. Hexadecimal is a much easier way to keep track of binary code. Binary has a hexadecimal equivalent, much like...

Words: 803 - Pages: 4

Premium Essay

Ipv4 vs Ipv6

...successful. IPv6 is supposed to become the new standard over the older version of IPv6, but it is tough for v6 to take its spot when v6 cannot support everything v4 does, basically v6 cannot connect to a v4 system. Some differences are that it is stated that the IPv6 is more secure than the IPv4, the address size went from 32 bits in the IPv4 to 128 bits in the IPv6, extensible protocols are more flexible in the IPv6, IPv4 and IPv6 are not compatible, the IPv4 will not be able to support additional nodes or support for applications, and the threats are different for the IPv6 than the IPv4. One reason why IPv6 is considered safer is that it uses 128 bits for its address which is also in hexadecimal. Having a bigger address means it takes longer time to find the address and having it in hexadecimal makes it even tougher to figure out. IPv6 also supports IPsec, which supports better security while sending data across the TCP/IP Network. IPv6 is considered safer because of the IPsec where in IPv4, there are many compatibility issues and without having the IPsec enabled, it can be a security fault. IPv6 includes security-orientated functionality by default whereas the IPv4 does not. Now some people might differ that the IPv6 is not more secure than IPv4 because of the poor allocation of the IPv6, the main issue with the security of the IPv4 was the address size being so small, but the IPv6 does have a larger address, it still has the potential to have problems, even though it may take...

Words: 1090 - Pages: 5

Premium Essay

Computer

...CHAPTER 1 INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Introduction Modern civilization has become so complicated and sophisticated that to survive one has to be competitive. This compels people to keep themselves informed of all types of happening in the society. And this in turn entails the need for an infrastructure of information. This is the point where information technology or IT becomes most important, as it is the infrastructure that allows us to get information accurately and in time. Before we define information technology, it is important to understand the notion of Data, Information, Technology, and Knowledge. In everyday conversation, people use the terms data and information interchangeably. However, some computer professional make a distinction between the two terms. Data It is the words, numbers, letters, symbol, sound, video and graphics that describe people, events, things and ideas. It is raw facts about people, objects, and events that have little or no meaning. It is the raw material used to create useful information. It becomes information when you use it as the basis for initiating some action or for making a decision. Information It is defined as the words, numbers, letters, symbol, sound, video and graphics used as the basis for human action or decisions. It is data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns that can be used in decision-making. It is data...

Words: 12773 - Pages: 52

Premium Essay

Notes of Unit 1. Chapter 1. Nt1230

...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...

Words: 22727 - Pages: 91

Free Essay

Introduction to Personal Computers Homework Chapter 3

...Gate N-type silicon Source Drain Conductor MOSFET is the most common type of what electronic component? Vacuum tube CPU Integrated circuit Transistor Approximately how many transistors are incorporated into today’s Intel processors? Hundreds Thousands Millions Billions What made the 8088 Intel CPU special compared to its predecessors? 1MB address limit 33 MHz processor 64KB address limit 1MHz processor What does Moore’s law state? Whatever can go wrong with computers will. Processor performance doubles every one and a half to two years. Total computer memory doubles with each new computer. Hard disks will fail. Which two companies are most responsible today for the advancement of PC CPUs? (select the two best answers.) Toshiba Intel Samsung AMD Which company did IBM first hire to build their core operating system for their PCs? Intel Apple...

Words: 1114 - Pages: 5

Free Essay

Ipv4 to Ipv6 to Dns

...Running Head: IPV4 TO IPV6 TO DNS Unit 1: IPv4 to IPv6 to DNS Your Name Here Kaplan University IT530-01 Your Instructor Here Your Date Here Abstract IPv4 is the current standard by which the internet routes connections over the internet by using DNS to make those connections easier to perform. However IPv6 will be replacing that to meet the needs of the growing internet by providing many more addresses that are required to add more connection addresses to the internet. At the same time this is created to add more needed addresses IPv6 has improved the way the data is handled and processed with new security features. IPv4 to IPv6 to DNS IPv4 and IPv6 and how the differences between these two different Internet Protocols will change how the DNS connects systems over the internet. To understand these changes we will need to start from the beginning and breakdown what all these terms mean and how each works together to get a better understanding. What is an IP and how does it work? IP is short for Internet Protocol, and what that means in general is the address of a device or a machine. It could be viewed as a phone number or way to label a device or address in order to contact that machine or device in order to transfer data back and forth to that device. The first version of the Internet Protocol or IP was version 4 or IP4. It is a 32 bit address in that there are 4 numbers represented in a binary value of 8 bits for each of the 4 bytes comes to a total of 32...

Words: 1328 - Pages: 6

Free Essay

Intor to Pc

...Unit 1 History and Architecture Copyright © 2008 Heathkit Company, Inc. All rights reserved. A Short History of the Computer 2 Objective • Describe some of the earliest forms of computers. 3 The Abacus 4 Charles Babbage’s Analytical Engine 5 The Hollerith Machine 6 First Electronic Digital Computer 7 ENIAC 8 Colossus 9 • Describe some of the earliest forms of computers. 10 The Emergence of the Personal Computer 11 Objective • Discuss the transition of influence in the development of the personal computer. 12 Prior to the Personal Computer • Computers were very large. • Computers were very expensive. • Computers were quite rare. 13 History of the PC • Before the IBM PC – 1975 to 1981 • The IBM PC – 1981 • The IBM XT – 1983 • The IBM AT – 1984 • The IBM PS/2 – 1987 • Waning of IBM as the pace setter – 1987 to present 14 The First PC • Generally considered the MITS Altair • Introduced in January 1975 • Based on the 8080 Intel Processor • Sold for $395 in kit form 15 Before the IBM PC, personal computers used: • A variety of microprocessors • Many different architectures • A variety of operating systems 16 The IBM PC • Introduced on August 12, 1981 • Used the Intel 8088 microprocessor • Operated at 4.77 MHz • No hard drive • One or two single-sided floppy drives • Used MS-DOS 1.0 • Introduced the 8-bit ISA bus 17 The IBM PC brought standardization • Intel Microprocessors...

Words: 2595 - Pages: 11

Premium Essay

Hee We Go

...1Lesson 1: Overview of Local Area Networks Objectives By the end of this lesson, you will be able to:  Describe the functions and advantages of a network.  Describe the evolution of networking models.  Compare and contrast server-based and peer-to-peer networks.  Identify the characteristics of local area networks (LANs).  Identify the functions of a networking operating system, network interface cards and transmission media.  Compare wired and wireless connections.  Identify the advantages of using open standards such as Transmission Control Protocol/Internet Protocol (TCP/IP).  Identify the two types of addressing used on a LAN: MAC addresses and IP addresses.  Describe the structure and allocation of IPv4 addresses.  Describe the structure of IPv6 addresses.  Identify the advantages of using private IP addressing, and describe the process of Network Address Translation (NAT). 1-2 Local Area Networks (LANs) Pre-Assessment Questions 1. In a centralized computing model, what is situated at the center of the network? a. b. c. d. 2. node host mainframe client There is no centralized management of network resources in which type of network? a. b. c. d. 3. A A A A A A A A peer-to-peer network server-based network mainframe network domain-based network What are two characteristics that describe a local area network (LAN)? © 2012 CertPRESS, a...

Words: 8056 - Pages: 33

Free Essay

Statistics and Excel 2 Questions

...important data that can be obtained using the expanded MS Excel financial functions is performance level calculations, principle payment calculation, depreciation of an asset, interest payment on investment, present value of investment, calculation of interest rate over time, annual duration of the security, current and future rates of investment, and amortization. The logical functions help calculation based on the requirements such as if, or, and, true and false. MS Excel also has an integration that allows to import information stored in COM applications. MS Excel also has a series of arithmetic and geometric functions. Additionally, MS Excel has a number of functions for engineering applications such as Bessel functions, binary and hexadecimal. Other functions include correlation, covariance, sum of squares, exponential means, permutations, quartiles, Student’s t-distribution, z test , and others. The manager can effectively utilize these tools in interpretation of data sets and creating queries without using MS Access. The manager can effectively calculate all the needed statistics without having to go through extensive calculations. By using Data Analysis, the manager can calculate the statistical data and test the statistics for significance with a few pushes of the button. MS Excel is integrated with MS Access and the data can be kept in both database and excel formats. 2. What potential legal and ethical issues could arise if the information gained in this survey...

Words: 510 - Pages: 3

Free Essay

Intro 1

...hash, or unique identifier. The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32-digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications and is also commonly used to verify data integrity. The usage of this tool is used towards other programs I have produced in C#. This is the most basic of the 3 programs. PROGRAM #2 C# program number two is a whole infrastructure in which the C# program can run with. It is a client that allows me to log chat logs gathered from IRC chatrooms and organize/search them for key terms etc. Internet Relay Chat, or IRC, is a protocol that allows users that connect to Internet Relay Chat Servers to have conversations with others in real time. Users connect to IRC Servers using an IRC Client. There are many popular IRC clients available on the Internet for all operating systems. PROGRAM #3 C# program number three is the main component that can have program one integrated into it. The secondary piece that makes this software so important is that it is an external firewall that uses artificial intelligence gathered from other programs to help corporate level users that are not tech savvy keep the company from being internally compromised. It accomplishes this by taking the well-known files from the internet and using the md5 hashing tool to get a unique identifier. When an employee tries to download...

Words: 313 - Pages: 2

Free Essay

Comp Txt

...1 2 Acknowledgements p.1 tr ©iStockphoto.com/Dennys Bisogno, etc t = top, b = bottom, l = left, r = right, c = centre Computer hardware and software brand names mentioned in this book are protected by their respective trademarks and are acknowledged. Scratch is developed by the Lifelong Kindergarten Group at the MIT Media Lab. See http://scratch.mit.edu Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia...

Words: 49691 - Pages: 199

Free Essay

Evidence Collection Cases

...seek out personnel who have experience and training in capturing and preserving volatile data before proceeding. First responders should also be alert to the crime scene environment. They should look out for pieces of paper with handwritten notes, passwords, usernames, and software and hardware manuals. These forms of evidence also should be documented and preserved in compliance with departmental policies. In this case the computer should also be checked for DNA so investigators can match the suspects DNA to the arson crime scenes. Also TimeFrame Analysis can be used to link any files of interest to the timeframes of the investigation. All these things can help link the suspect to the crimes, and in doing so can help tell the insurance company whether the claims are valid. 2. Case 4-4 (bomb threat) A list of what items should be included in an initial response field kit to ensure preservation if digital evidence. The initial response field kit should be lightweight and easy to transport. With this kit, you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible. * Small computer toolkit * Large-capacity drive * IDE ribbon cable * SATA cables * Forensic boot media containing an acquisition utility * Laptop IDE 40 to 44-pin adapter, other adapter cables * Laptop or tablet computer * FireWire or USB dual write-protect external bay * Flashlight * Digital Camera with extra batteries * Evidence log forms...

Words: 1243 - Pages: 5

Free Essay

Hexadecimal

...The Hexadecimal Company ________________________________________ Name 1. Problems A. Macro Lack of appropriate leadership skills. Also, there was lack cooperation among the members of the OD group. The training activities lacked integration and coordination. ________________________________________ B. Micro The members of the OD group were divided in ideas i.e. had division of thoughts. Members of the OD group had little respect of the president Zoltan. ________________________________________ II. Causes Zoltan caused problems among the OD group. When Bill and Peter wanted to explain to him about their ideas on the program, he was unavailable. He didn’t portray the appropriate leadership skills. He didn’t take the OD program seriously because when Kay and Indar wanted to speak to him he would be available but on matters concerning the OD program, he was not available. Lack of cooperation among the members of the OD group was a great problem. It was caused by having different ideas. Kay and Indar wanted an approach that is gradual while the rest wanted an aggressive approach. Lack of integration and coordination problem was caused by lack of a leader among the group members. Lack of respect for Zoltan by the OD group members was a great problem. The members started to see less of him. The cause of this problem was because Zoltan didn’t take the training activities seriously. Therefore, OD group members started to belittle him (McLean, 2005). ________________________________________ ...

Words: 445 - Pages: 2

Free Essay

Packet Sniffer Report

...IMPLEMENTATION OF PACKET SNIFFING IN JAVA USING JPCAP LIBRARY Project Report Submitted in Partial Fulfillment of the Requirement for the Award of Degree of Bachelor of Engineering in Computer Science Engineering of Rajiv Gandhi Proudyogiki Vishwavidalaya, Bhopal (MP) By Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) Department of Computer Science Engineering Jai Narain College of Technology, Bhopal June – 2012 DECLARATION We, Siddharth Pateriya and Swarna Swaminathan, the students of Bachelor of Engineering (Computer Science Engineering), Jai Narain College of Technology, Bhopal hereby declare that the work presented in this Major Project is an authentic record of our own and has been carried out taking care of Engineering Ethics under the guidance of Prof. Manish Mishra. Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) CERTIFICATE This is to certify that the work embodied in this Major Project entitled “Implementation of Packet Sniffing in Java using Jpcap Library” has been satisfactorily completed by the students of final year, Mr. Siddharth Pateriya and Ms.Swarna Swaminathan. The work was carried out satisfactorily under the supervision and guidance of the undersigned in the Department of Computer Science Engineering, Jai Narain College of Technology and Science, Bhopal for the partial...

Words: 8200 - Pages: 33