Heavy Equipment Repair Plant Bharat Heavy Electricals Limited Varanasi ACKNOWLEDGEMENT At the outset, I thank the Lord Almighty for the grace, strength and hope to make my endeavour a success. I also express my gratitude to Mr. Ashawni Kumar Sr. Manager Maintenance and my Training Guide Mr. SUNIL TIWARI (Dy Manager production) for providing me with adequate facilities, ways and means by which I was able to complete this training. I express my sincere gratitude to him for…
I will discuss later a selection of these best practices that I believe would complement each other in an organisation, because if one doesn’t complement the other, it will ultimately cancel out any advantage that could possibly result from the practices. Human resource management best practices are designed to improve the overall performance of employees within the business, ultimately resulting in improved organisational performance also. Commitment is a major factor of human resource…
When using information systems, it is essential to ask, “What is the ethical and socially responsible course of action?” A MODEL FOR THINKING ABOUT ETHICAL, SOCIAL, AND POLITICAL ISSUES Ethical, social, and political issues are closely linked. The ethical dilemma you may face as a manager of information systems typically is reflected in social and political debate. One way to think about these relationships is given in Figure 4-1. Imagine society as a more or less calm pond on a summer…
Unfortunately, some companies have mismanaged their greatest asset—their brands. This is what befell the popular Snapple brand almost as soon as Quaker Oats bought the beverage marketer for $1.7 billion in 1994. Snapple had become a hit through powerful grassroots marketing and distribution through small outlets and convenience stores. Analysts said that because Quaker did not understand the brand’s appeal, it made the mistake of changing the ads and the distribution. Snapple lost so much…
While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…