Questions: How has the current cultural environment of our country shaped th

 Questions:
How has the current cultural environment of our country shaped the way that companies are looking at their own corporate cultural standards?
What are the potential downfalls and positive influences of the “Netflix way”?
How does Netflix’s internal culture negatively or positively affect its ability to stay competitive and deliver cutting-edge content?
 
Today’s news is littered with scandals, new allegations of sexual assault, and tragedy. Since 2017 and the #metoo movement, stemming from the Harvey Weinstein scandal, more and more public figures have been put into the spotlight to defend themselves against allegations from women around the globe.
Not only publicly, but privately in companies around the world, there have been firings and investigations into misconduct from coworkers, managers, and CEOs. It is a relevant topic that is getting long-overdue publicity and encouraging more men and women to come forward to discuss openly rather than hide the events and injustices of the past. Other events showcase the tumultuous and on-edge society we are living in, such as the Charlottesville, VA, attack that left one dead and 19 injured when a person drove a car through a crowd of protestors during a white nationalist gathering.
With unanticipated events on a daily business, it is important for companies to take a stand against racial hatred and harassment of any kind, and to have firm policies when such events occur. Take Netflix, for example, who in July 2018 fired their chief communications officer for saying the “N-word” in full form. This event occurred during an internal meeting in which the speaker was not directing the slur at anyone specific but claimed it was being made as an emphatic point about offensive words in comedy programming. The “Netflix way,” the culture that is built around radical candor and transparency, was put to the test during this occurrence.
The offender, Jonathan Friedland, attempted to apologize for his misdeed, hoping it would fade away and his apology would be accepted. However, it didn’t work that way; instead, the anger was palpable between coworkers and eventually led to the firing of Friedland after a few months of inaction.
Netflixers are given a high level of freedom and responsibility within their “Netflix way” culture. Blunt feedback is encouraged, and trust and discretion are the ultimate gatekeeper, as employees have access to sensitive information and are ultimately trusted for how they expense items and take vacation time.
In the insanely fast-paced streaming-services industry, it is hard to keep this culture at a premium, but it is imperative for the success of the company overall. “As you scale a company to become bigger and bigger, how do you scale that kind of culture?” said Colin Estep, a former senior engineer who left voluntarily in 2016. “I don’t know that we ever had a good answer.”
In order to keep up, sometimes the company is seen as harsh in their tactics to keep the best of the best. “I think we’re transparent to a fault in our culture and that can come across as cutthroat,” said Walta Nemariam, an employee in talent acquisition at Netflix.
Netflix has stayed true to their cultural values despite the pressures and sometimes negative connotations associated with this “cutthroat” environment. Their ability to remain agile, while displaying no tolerance for societal injustices, puts them at the forefront of new-age companies. It is a difficult pace to stay in line with, but it seems that they are keeping in stride and remaining true to who they are, for now.
References
 B. Stelter, “The Weinstein Effect: Harvey Weinstein scandal sparks movements in Hollywood and beyond,” CNN Business, October 20, 2017, https://money.cnn.com/2017/10/20/media/weinstein-effect-harvey-weinstein/; L. Hertzler, “Talking #MeToo, one year after bombshell Weinstein allegations,” Penn Today, October 30, 2018, https://penntoday.upenn.edu/news/talking-me-too-one-year-later; S. Ramachandaran and J. Flint, “At Netflix, Radical Transparency and Blunt Firings Unsettle the Ranks,” Wall Street Journal, October 25, 2018, https://www.wsj.com/articles/at-netflix-radical-transparency-and-blunt-firings-unsettle-the-ranks-1540497174.

Your task is to analyze the case titled “Sogeti’s Teampark – Designing Intellig

Your task is to analyze the case titled “Sogeti’s Teampark – Designing Intellig

Your task is to analyze the case titled “Sogeti’s Teampark – Designing Intelligent Organizations for the Future.”  Please use “The Student Guide to the Case Method” to perform this analysis. This is supposed to be an analysis, not a summary of the case. It should analyze: What is the background of the company? What is the problem they are facing? What are potential solutions? Which is the best solution and why?Your are expected to adhere to the following:
Apply research in your analysis using at least two published sources for each of Steps B – D.
Use APA format, 12-pt font, Times new Roman.
Paper should be around 8-10 pages double-spaced including title and Bibliography
Create a title page with your name, course number and name, and date submitted.
Append a Bibliography page for the cited research.
Use major headings that coincide with the steps outlined in Section 4 of “The Student Guide….”
Apply sub-headings sparingly and for further structuring as necessary.
Submit your document in Word format only, please.
No plagiarism

Your task is to analyze the case titled “The Digital Transformation of Freeport

Your task is to analyze the case titled “The Digital Transformation of Freeport

Your task is to analyze the case titled “The Digital Transformation of Freeport McMoRan….”  Please use “The Student Guide to the Case Method” to perform this analysis. This is supposed to be an analysis, not a summary of the case. It should analyze: What is the background of the company? What is the problem they are facing? What are potential solutions? Which is the best solution and why?Your are expected to adhere to the following:
Apply research in your analysis using at least two published sources for each of Steps B – D.
Use APA format, 12-pt font, Times new Roman.
Paper should be around 8-10 pages double-spaced including title and Bibliography
Create a title page with your name, course number and name, and date submitted.
Append a Bibliography page for the cited research.
Use major headings that coincide with the steps outlined in Section 4 of “The Student Guide….”
Apply sub-headings sparingly and for further structuring as necessary.
Submit your document in Word format only, please.
No plagiarism

  When you’re searching for contractors, consultants, business partners, soft

 
When you’re searching for contractors, consultants, business partners, soft

 
When you’re searching for contractors, consultants, business partners, software, and hardware, what are some methods you use? Be very specific and detailed in how you research these resources and give more than one example (contractor and software search, for example).

What method do you use for keeping track of your contacts and leads?

Once you have a list of resources, how do you decide which to recommend to your company to select for your project? (If you have never done this, research a methodology and report on how you plan to do it.)

If you are selecting contractors, consultants, or other human resources, recommend an interview process and gather the costs.
If you are looking at software, hardware, or other non-human resources, talk about how you determine the most value to the company for the money. The company is making an investment; how do you determine the best investment for the greatest return? (Be specific on the methodology you use or would use.)

After responding to the above, write an additional paragraph on why you think your recommendation should be followed and how you can be confident that your recommendation is best for your organization.

  Part 1 Before you begin working on this discussion post, please make sure tha

 
Part 1
Before you begin working on this discussion post, please make sure tha

 
Part 1
Before you begin working on this discussion post, please make sure that you have read the Week 1 readings!
Welcome to Padgett-Beale and your first week as a management intern.
The Chief of Staff will be hosting a working lunch this week for your group of interns. In addition to the usual introductions and “getting to know you” discussions, you’ve been advised that there will be a discussion of the following article.

Seasonal Employee Security Risks: Present Danger, Proactive Defense


Each intern has been asked to write and bring a discussion paper containing their written responses to the following questions:
What steps can (should) managers take to reduce security risks associated with hiring seasonal or temporary employees? (Consider whether or not the Secure Computer User training course would be appropriate for these employees.)
 How can managers show leadership in the area of cybersecurity defenses and best practices?
Consider the ways in which these types of companies are likely to use seasonal employees and the types of digital assets / information to which these temporary employees may have access.
Part 2
  Responding to Guest Concerns about Cyberattacks 
 
your internship assignment is with the company’s Guest Relations office.
You have been asked to draft a letter to guests to address concerns about the impacts of possible cyberattacks. Recently there have been news reports describing cyberattacks on the hospitality industry. This letter should reassure guests that the company is taking positive steps to protect guest privacy. Consider the technical and people perspectives.
There are legal requirements for such a letter. This  Data Security Breach Notice Letter guidance document from Hutnik, Kelley Drye & Warren LLP provides guidance for companies facing the need to write notification letters.
Consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.
To learn more about emotional intelligence, read this definition of Emotional Intelligence.  Then, read about three types of empathy: https://www.verywellmind.com/what-is-empathy-2795562
The letter should be between 200-250 words and written concisely so the explanation is clear and not overly technical. The point is to ensure guests that the situation is under control and that you’ve taken steps to make sure they can feel confident that their information is safe. Remember accountability and empathy in your letter.
Part 3
 Cybersecurity Issues for Business Travelers 
 Post your initial response of at least 150 words 
Here  interns are reflecting on cybersecurity issues that must be considered when employees travel for business. In your opinion, what are the security issues associated the technologies (cell phones, computers, etc.) used when traveling? In your opinion, is there a false sense of security that this is only a concern with international travel? 
Part 4
 Privacy Policies & Compliance Issues 
 Post your initial response of at least 150 words 
 
After completing the course readings for the week, do additional research into the potential privacy, data security, and liability issues facing companies similar to Padgett-Beale. Find an event within the past three years that describes an issue related to this week’s course material and describe the event. And then, provide your opinion on what should be done to make sure it doesn’t happen again? For example, did the event result from a potential lack of employee training? If so, what type of training would you recommend? 
For examples of guest privacy policies, please see these resources:
https://www.lhw.com/Privacy-Policy
https://www.ihcltata.com/privacy-policy/
https://www.fourseasons.com/privacy/
Part 6
 Post your initial response of at least 150 words 
 
Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).

  A company has a potential case involving their trademark. Describe some ste

 
A company has a potential case involving their trademark. Describe some ste

 
A company has a potential case involving their trademark. Describe some steps you might suggest at a meeting with the officers of the corporation to investigate a crime involving trademark infringement. What if it were a sexual harassment case? What are the similarities or differences between the two types of cases?
Describe the steps you would suggest for investigating a corporate espionage case.

Part 1   Quick Start Guides    write a quick start guide.  This discussion topi

Part 1
  Quick Start Guides 
 
write a quick start guide.  This discussion topi

Part 1
  Quick Start Guides 
 
write a quick start guide.  This discussion topic is designed to help you become more familiar with what a quick start guide is and what its function is in technical writing.
To learn about quick start guides, please examine the three resources provided in Content in week 3:
What is a Quickstart Guide?
Quick Reference Guides Right Where You Need Them
Technical Writing Tips: The 80/20 Rule
You might also benefit from looking at the Sample Quick Start Guides in Learning Resources in week 3.  While these quick start guides are longer than the one you will be writing, they present different strategies for incorporating text and images to accommodate their users.
Then answer the following questions.  Your answers can be 2-3 sentences:
Most quick start guides are one page long. They have to be one page so that the user can look at them at a glance. What are some of the challenges to reducing a set of instructions of, for example, 3-4 pages into one page?
How does the 80/20 rule relate to the usefulness of quick start guides?
In your experience, when you purchase a product or a new piece of software, do you tend to use the user manual more, or do you tend to use the quick start guide more? Why?
Part 2
 
Preparing for WA4, the Report to the Supervisor
 
Please read the instructions for that assignment.  Then answer the following questions:
You have just been hired as Assistant Manager at Work ‘N Suds. Please write a one-paragraph (3-4 sentences) summary of the problems you see in the company, according to the scenario.
 In UMGC’s OneSearch interface, find one article on the concept of cross-training for employees in an organization.  Keep in mind that some articles might spell the term with a hyphen (cross-training) and some might spell it without a hyphen (cross training). Provide the author(s) and title of the article.
From your search from task #2 above, select Resource Types, then select Articles, and then select Peer Reviewed (Scholarly) Journals. 
Select one article in your search list and provide the author(s) and title of the article.  If you do not see any hits, reword your search terms. If you still receive no hits after rewording your search terms, then indicate what search terms you used.
Select one of the other concepts mentioned in the writing assignment instructions (mandatory vacations, cyberscurity in video surveillance systems, handling of credit cards, or any other concept).  Then, in UMGC’s OneSearch interface, find one article on this concept. Provide the author(s) and title of the article.
This question involves listening to a part of the podcast, “Cyberbit Podcast Episode 1: The Unspoken Skill-Gap in the Cybersecurity Market,” which features Mr. Adam Bricker, former co-founder of Carolina Cyber Center and Mr. Sharon Rosenman, Chief Marketing Officer at Cyberbit.
The segment of the podcast we will listen to is from the 48:00 mark to the 50:30 mark. In that segment, a participant asks a question about writing in the cybersecurity field. The following link takes you directly to that question and Mr. Bricker’s response:
The Unspoken Skill-Gap in the Cybersecurity Market, 48:00 mark(https://www.youtube.com/watch?v=1-IMz_EXcas&t=2880s)
Mr. Bricker describes the type of technical communication that individuals in the cybersecurity field need to be able to produce.
How does his description fit the scenario with Mark Carman and Work ‘N Suds?  In other words, who is the audience for writing assignment #4, and how does Mr. Bricker’s explanation align with the scenario?

Identify and briefly discuss two important concepts from “Business Continuity P

Identify and briefly discuss two important concepts from “Business Continuity P

Identify and briefly discuss two important concepts from “Business Continuity Planning and Disaster Recovery” that are applicable in IT industry.  A substantive post will do at least two of the following: 
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
Make an argument concerning the topic
 Use proper citations and references in your post.