Assume that an unfair labor practice charge was filed against your company by  

Assume that an unfair labor practice charge was filed against your company by   several employees and three prospective employees. See the form linked below      indicating the charge, which outlines the scenario below: 
FORM NLRB-501: Case 4689-3 
On July 29, 2016, Delphi Golf, Inc. and the union entered a collective                           bargaining agreement. The majority of the company’s    employees         covered   by     the          agreement had not designated    the union as   their             collective-bargaining             representative. The agreement     contains a           union-security clause    requiring          employees who     are members in   good         standing of    the union to maintain   their            membership in   good   standing          and all other employees to become       members of the          union   on or    before       the 31st day following the     effective   date of the          agreement     or  the       date of their hire.     The union instructed        Delphi   Golf,   Inc. not to           employ    three   servers for    restaurant   positions     in the company   because   the             servers    were  not members   of the union.   The   company is an       employer          within the     meaning of    Section 2(2)   of the act     engaged in          commerce     within the meaning of       Section   2(6)  and   (7) of the      act.        
Explain in a three-page essay  (not including cover or reference page) the process and steps your company will have to     take to defend this action. 
Explain the defenses to the action and if the union    employees have valid claims. What actions by the employer should have been       done   differently, if at all? What actions by the union should have been done     differently? Who, if anyone, is liable? 
 All sources used, including the textbook, must be referenced;        paraphrased and quoted material must have accompanying APA style citations. 

The post Assume that an unfair labor practice charge was filed against your company by   appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

  Purpose of Assignment The purpose of this assignment is to provide the studen

 
Purpose of Assignment
The purpose of this assignment is to provide the student with an opportunity to understand and analyze the Universal Model of Leadership in the text, and compare it to one other model to see the similarities and differences. 
Assignment Steps
Create a 10 slide PowerPoint® presentation to compare the Universal Model of Leadership in Mastering Leadership to one other leadership model. 
Include the following: 
A graphic that compares and contrasts the two models, noting similarities and differences.
Your conclusions regarding the significance of these models in business. How might they apply?
Detailed speaker notes or narrated slides, supporting citations, and references.
Format your assignment consistent with APA guidelines.

The post  
Purpose of Assignment
The purpose of this assignment is to provide the studen appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

project PowerPoint presentation which will be a BEST PRACTICES PRESENTATION. Th

project PowerPoint presentation which will be a BEST PRACTICES PRESENTATION. The project presentation will be a detailed presentation worth 100 points
And you should follow below points
12-point font using Times New Roman 
Use APA style correctly throughout the presentation 
Use correct grammar and punctuation 
Format correctly and consistently 
Include a cover slide, introduction slide at the beginning of the presentation and a conclusion slide at the end of the presentation, and a reference slide using APA format at the end of the presentation. 
Number all slides beginning with the cover slide as page 1 
Utilize 10 references from scholarly sources…do NOT use Wikipedia (one source can be the textbook) 
Cite references within the presentation using correct APA format 
Include a minimum of 16 slides which will include the cover and reference slides 
Include at least one figure or one table in the presentation and format in APA style 
Highlight your knowledge of technology by including transition and animation 

The post project PowerPoint presentation which will be a BEST PRACTICES PRESENTATION. Th appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

write 3-4 pages of essay. -thesis should have 2 0r 3 reason. – no counter argum

write 3-4 pages of essay.
-thesis should have 2 0r 3 reason.
– no counter argument.
-no solution or suggestion.
-at least 2 print source. book or newspaper. should have proof of source. if from library take picture showing barcode. if not show your hand taking book or newspaper . and also photo of page you are  using for reference.
-at least two online database source.
-one evidence should be in one paragraph. one paragraph should be between 5-18 . if paragraph contains one evidence that should not exceed 10 lines if there is more than 10 lines it should have 2 evidences. 
-one print source and one online database should be in body. 

The post write 3-4 pages of essay.
-thesis should have 2 0r 3 reason.
– no counter argum appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Project Deliverable 5: Infrastructure and Security Due Week 8 and worth 110 poi

Project Deliverable 5: Infrastructure and Security
Due Week 8 and worth 110 points
This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.
Section 1: Infrastructure Document 
Write a four to six (4-6) page infrastructure document in which you: 
Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
Present the rationale for the logical and physical topographical layout of the planned network.
Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
Create and describe a comprehensive security policy for this data-collection and analysis company that will:
Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information. 
Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Your assignment must follow these formatting requirements: 
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.
Section 2: Revised Project Plan
Use Microsoft Project to: 
Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.
The specific course learning outcomes associated with this assignment are:
Develop information systems-related activities to maximize the business value within and outside the organization.
Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
Evaluate the issues and challenges associated with information systems integration.
Use technology and information resources to research issues in information systems.
Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

The post Project Deliverable 5: Infrastructure and Security
Due Week 8 and worth 110 poi appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Homework Activity (30 points) It can be very easy to send the wrong message usi

Homework Activity (30 points)
It can be very easy to send the wrong message using social media. Research a company who made a serious error on social media. Explain what the error was and the repercussions it had. How would you react as a consumer? Provide an explanation in a one (1) page paper. Make sure you use proper grammar and Strayer Writing Standards. Try using Grammarly before submitting to the Gradebook.
Note: You can use Grammarly to check your assignment before submitted it. Grammarly is a great tool to check your spelling and grammar. It is free tool and there is a link to it in iCampus. Click here for a quick video on how to use Grammarly.

The post Homework Activity (30 points)
It can be very easy to send the wrong message usi appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

  Provide a 50-75 word discussion reply to the following post below.     When s

  Provide a 50-75 word discussion reply to the following post below.  
 
When setting up a wireless network for your home or business it is important to secure yourself and those that you may be doing business with.  Store your router is in a safe and secure location you can reduce that ability for anyone to physically tamper with it.  Next ensuring you have forms of authentication in place (Passwords or PINs) will also reduce the possibility for unwanted people on your network.  The addition of firewalls will reroute unwanted users from entering the network, this along with an anti-virus that is designed to prevent, detect and remove mal-ware should keep your system safe.  Another option is adding a guest access, maybe a separate router from the one the business uses, this allows your clients to enjoy the Wi-Fi but keeps them from possible corrupting the business network.
            In 2018 500 million guests of Marriott found out their information had been breached, the breach had been going on for over four years at the time of the announcement.  The guest’s names, addresses, credit card information, pass port numbers, arrival and departure dates, and who they were traveling with was all part of the breach (Telford and Timberg).  At the time it was thought this could have been a nation-state hack aimed at tracking the movements of military members, diplomats, and business officials, this was never confirmed.  The company did later say that they had used encryption on credit card numbers but not the other travel information but could not rule out the possibility some numbers could have been compromised.  Government officials along with the President have called for stricter enforcement of consumer data privacy, and multiple state Attorney Generals have opened investigations into the Marriott breach (Telford and Timberg).
            I would say this is completely on the Marriott corporation, with the money that if funneled through this company daily they have more than enough revenue to provide the best possible level of security.  I am sure they had things in place but clearly somehow the ball was dropped, this was going on for four years.  Companies like this have an obligation to the public to ensure the safety and security of personal information, updates, continuously evaluating the system and running multiple different anti-viruses are just a few things I think could have helped.
References:
Telford, T. and Timberg, C. (November 30, 2018) “Marriott discloses massive data breach affecting up to 500 million guests”. Retrieved from:  https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?utm_term=.b805954e9b8d (Links to an external site.)Links to an external site.

The post   Provide a 50-75 word discussion reply to the following post below.  
 
When s appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

   Instructions: Please respond to at least three other students. Responses sho

  
Instructions: Please respond to at least three other students. Responses should be a minimum of 100 words (total 300 words all 3 responses together) and include direct questions, to each student. 
Responses Due: Sunday, by 11:55pm ET
—————————————————————-
Gunner Finlay
I do agree with Durkheim that deviance is a necessary part of a successful society, and I think that this is another topic in which political science and sociology intertwine.
According to Durkheim, deviance is necessary in a successful society for two reasons, the first of which being that deviance is a driver of social progress and the second being that deviance that is negative solidifies in the minds of members of society which behaviors are reprehensible. Generally, it is in the first of these that I see the relationship with political science. As a driver of social progress, one could attribute deviance to the liberal side of the political spectrum. The role of the liberal side of the political spectrum is to drive social progress, one of the examples from the text is relevant in this case. At the time that Rosa Parks refused to give up her seat in the front of a bus, her behavior was deviant, in fact she faced a formal sanction for her behavior. But her actions led to progression in racial integration in the south.
I would not say that I have had to use informal sanctions often, especially not in a way that was a conscious act of chastisement. But I do think that my role as a parent is to prepare my children to function properly in society in a way that makes society accepting of them so as to, to the best of my ability, ensure they lead successful lives. Because of this, I have had to use informal sanctions on my three year old when she misbehaves in public so she understands which behaviors are appropriate and which are not. This could a time that my daughter was throwing a tantrum at the mall that I had to remind her that it is not appropriate to stomp and scream in the middle of Macy’s. A reaction like this to a child who is throwing a tantrum I believe reinforces social norms of which behaviors are acceptable in a public environment.
—————————————————————-
Jerome Machynski
Hello class! Groups are entities of two or more people who all have an alignment of their identities within the group. The two of several groups that I am a part of in my life that I will be discussing is my friends group, and my co-workers. Both of these groups are primary groups, because they have a big impact on my life, and both are of a small amount of people. My workplace has twelve people and my friends group has five. In addition, these two dynamics are something almost everyone has in their life.
Both of these groups have a lot of expressive functions in my life, because my friends group is something that brings my emotions up, and my workplace naturally has a big control of my emotions because it consumes over a third of my day, everyday.
There are multiple differences between the two social groups I am in. For my friends group, I choose to be a member of it. I would consider it an in-group, because I feel like I belong to it, and I am able to leave at any time.  For my workplace, I am in the military. This matters because I cannot just up and leave the job. In a simplistic way of putting it, I have no choice in the matter of whom I work with. Not everyone in my work group is my friend, nor do I get along with everyone either. I don’t necessarily feel pride in my job, and I want to get out of the military, so in some ways I would consider it an out-group because I feel like I don’t belong.
I have to present myself in a professional matter to those I work with, whereas I joke around and act freely with my friends group. As far as leadership goes, my work has a legitimate chain of command, where I fall at the bottom of. My friends group has no real leader, but everyone takes turns controlling the conversation or picking where or what we should do when we hang out. Everything we do at my workplace serves the mission of the command we serve in, and the purpose of my friends group is to have a good time and bond with each other. This leads to activities being conducted to be more boring at work, and more fun with my friends group. Those are some of the many major differences between my work group and my friends group.
—————————————————————-
William Finkbiner
1.  Using what you have learned about groups, organizations, and bureaucracies this week, compare and contrast two different groups or organizations of which you are a member. Describe the two groups.  How do they differ in terms of leadership, membership, purpose, and activities? What is your role in the group? Provide examples in your discussion.
    The military seems to provide very obvious examples of the concepts delivered in this weeks material.  My department consists of approximately 700 personnel and a handful of smaller groups, called divisions or sections.  In my department I am most comparable to a shift manager at a business, as there are several layers of supervisors above me.  I handle the day to day operations and they handle the long term and more administrative tasks.  My section consists of ninety six people, on average, and is split into four platoons, each consisting of three squads. If one were to sever my section into its own autonomous entity, I would be in the triad group at the top of the pyramid.  I would describe my primary group as my section and my secondary group as my department.  The relationships with the majority of the people outside my section are usually professional in nature, while the relationships within my section are normally personal and invested.  Departmental leadership tends to me exclusively transactional.  Through the lessons explanation of transactional vs. transformational, I believe my leadership is also transactional, but transformational in nature.  I was actually intrigued when I was reading about social capital.  A concept I’ve taught Sailors for a while now, is leadership capital, which I define very close to that of social capital.  

The post   
Instructions: Please respond to at least three other students. Responses sho appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

  The 1970s and 1980s brought remarkable changes for the Untied States. The Col

 
The 1970s and 1980s brought remarkable changes for the Untied States. The Cold War between the US and its allies versus the Soviet Union and its allies/clients was still the dominant international issue. China was also going to start emerging as a major world power. Nixon was dealing with Vietnam and then Watergate—one of the pivotal scandals of modern history. Reagan would bring a new national spirit, and he would tackle economic problems by deregulation and moderating taxes—and he would be dealing with a very new type of Soviet leadership.
Discuss lessons in leadership with the examples of President Nixon and President Reagan:
Choose and discuss (in a full paragraph or two) one of the following two topics related to the 1960s and 1970s, especially to the terms of Presidents Nixon and Reagan.
Discuss lessons in leadership with the examples of President Nixon and President Reagan:
Identify a leadership example from President Nixon’s handling of the Watergate issue, and another example from Reagan’s presidency.
Give two lessons in leadership—one from each example. They can be positive lessons or negative lessons (good things to do; things not to do, etc). Discuss how these lessons can apply to those in business or politics or some other realm.
Identify the source(s) where you read about these issues.
Discuss Presidents Nixon and Reagan as Cold Warriors:
Identify a strategy or policy from the Nixon presidency that related to the Cold War, and another from the Reagan presidency.
In hindsight, describe your views of each approach and how effective (or not) each approach was.
Identify the source(s) where you read these issues.
Reference Material
Chapters 26 and 27

The post  
The 1970s and 1980s brought remarkable changes for the Untied States. The Col appeared first on graduate paper help.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"