Wednesday, November 27, 2019

Purchasing and Implementing a Student Mangament System at JCSS free essay sample

Jefferson County School System has purchased a new System for Student Management and just like any new technology it takes time to adjust. But there were quite a few issues in the implementation process that could have been avoided. I will explain what went well in the implementation process of Jefferson County School System. I will examine the complaints as well as complications with the system and explain what should have been done better. And lastly I will point out what could have been done to improve the results of the implementation process. Background  Jefferson County School System (JCSST) is a school system that educates about 10,000 students in 18 different schools, consisting of fourteen elementary schools, two middle schools, and two high schools. In 1970 administrative computing had begun for doing student scheduling, grade reporting and keeping record of student enrollment. In 1976 the school corporation purchased a DEC PDP 11/34 computer, and the student management applications were converted from the university computer. We will write a custom essay sample on Purchasing and Implementing a Student Mangament System at JCSS or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page During the next few years, financial applications were added and more student management applications were developed. As the years went by and Technology changed, JCSS has been keeping up. Now they have four Dell servers operating under UNIX and PC’s and Pc’s in all JCSS locations are connected to the system via a high-speed TCP/IP network. Now the newly hired superintendent Dr. Henry Greene and a small task force of Administrators decided that JCSS systems should be replaced with purchased software and it should utilize and integrate database and report-generation software. This task force also suggested that the programming staff of the data processing department would no longer be needed if these recommendations are accomplished. Discussion Everything started off well, a task force of administrators was established and a task of selecting a vendor to provide the hardware and software to replace the current administrative computing applications at JCSS went good. By late March, the new DP Director and her committee had prepared and sent out a 71 page RFP to 23 possible vendors with proposals being submitted by May 4. The RFP stated that â€Å"The proposals will be evaluated on functional requirements, support services, and a 5-year life cycle cost. † This RFP was sent to vendors that would contract to accept responsibility for all the software, support and training services required to install and maintain the new system. After the DP Director evaluated the responses that were submitted, she chose three serious contenders. These contenders were invited to demonstrate their system to the committee. However, the vendors were not told in detail what to show except that they show the major systems. This was mistake number one. I would have wanted these vendors to demonstrate to me what I needed to my specific details. Second, instead of visiting a School that already use a similar system, the committee only visited two sites. And this was because of time and money constraints. The DP Director and the Assistant Principle spent one day at these locations observing the systems and the committee members made calls to others that use the vendors to get their feedback on the systems. Another mistake, what they need the systems for may not be the same as what I need the system for. No matter how they did it, everybody was satisfied with the systems. After a difficult decision the committee selected DSI, even though neither of the vendors systems did exactly what they wanted it to do. Right here I could say that was another mistake but I think just like when you learning how to cook something new, it takes a few times of making it before you get it just the way you want it. You have to figure out how to use the program the way it needs to be used. This is where we go into our next phase, implementation. In December the DSI people helped implement the new system. And as soon as the systems got purchased and put into play at JCSS, the complications started. The first problem was with the financial systems. Most was converted to the new system but the real major problem was installing and using the student management systems. The DP Director planned to follow the cycle of the academic year when implementing the student systems. First, they would transfer all the student demographic information from the present system to the new system’s database. Then they would complete the students’ fall class schedules by the end of the spring semester, as they had been doing with the old system, so that the students’ schedules would be on the new system and ready to go in the fall. During the summer they would pick up the attendance accounting on the new system so it would be ready for the fall. Then they would implement grade reporting so it would be ready for use at the end of the first six-week grading period in the fall. Finally, they would convert the student transcript information from the old system so that fall semester grades could be transferred to the transcripts at the end of the semester. The transferring of the student’s demographic information was a success, but the scheduling was a disaster. I believe this came from a lack of training or should I say the lack of time that was not taken out for the training. DSI was willing to train any and all employees; however, the employees did not take the allotted time to get the training. I think all involved individuals should have made time to get this training. The summer break was a great time to get this completed but if they were not on the payroll, they were not there for training. Fortunately, Paul Faris, the scheduling officer at Roosevelt, was working summer school, and with his assistance they were just able to get all the schedules done two weeks before school started. For preparation for the upcoming fall year, the secretaries and the counselors should have been paid to come to training over the summer. When things started failing a group of names should have been written down so that these could be trained in whatever areas that needed to be improved. This would have helped the process move along more smoothly. It is already over whelming when learning something new in the IT world, but to learn it without the proper training is foolish. Conclusion The real problem was not the vendor that was chosen, it was the lack of user training and there was no user manual available for employees. DSI offered JCSS everything they asked for; they were on time when needed for trouble shooting as well as for training the employees. And remember it was the committee that said they could work well with them (with DSI). Looking back, JCSS chose the right vendor, but without detailed definition of what the system needed, and without the proper training, money constraints and a plan for the project, the system would surely fail.

Saturday, November 23, 2019

Free Essays on Private Security

â€Å"Course Project† No information in this paper is classified As I am stationed in Germany, the successful completion of this lesson was very difficult. As you are well aware of, since September 11, the Armed Forces of the United States have been on Threat Condition (Threat Con) Charlie or Bravo. Both, Threat Con Charlie and Bravo have the same security measure but the difference is the use of deadly force. Under Threat Con Charlie, the Noncommissioned Officer In Charge (NCOIC) can authorize the use of deadly force and under Bravo; the Officer In Charge must authorize it. The entire European Command is under Threat Con Bravo and will remain at this level for some time. The reason that I have mentioned the Threat Con is because it has a direct effect on the overall security and how the general public (soldiers and dependants) feels about the safety of they’re shopping. If I may call your attention to the drawing of exhibit â€Å"A† (Area Overview) you will see that this is indeed a very small post (called concerns here in Germany). The XXX represent a seven-foot high chain-link fence with razor wire and barbed wire on top of it (this was just added after September 11th incident). Located at Guard Point one (1), there are two to three civilian security guards (Pond’s security force) with loaded 9mm weapons and three to four soldiers with loaded M16’s with 20 live rounds apiece. Upon entrance into the post, one must stop and show their drivers license, ID Card, and vehicle registration and the vehicle gets a quick look over. Then you would proceed in and within 30 meters the road divides (divided by concrete barriers) and an armed soldier will direct you to the search lane or the bypass lane. If you are lucky you will go through the bypass lane, however if you get directed (ever five cars) to search lane your vehicle will go through an intensive... Free Essays on Private Security Free Essays on Private Security â€Å"Course Project† No information in this paper is classified As I am stationed in Germany, the successful completion of this lesson was very difficult. As you are well aware of, since September 11, the Armed Forces of the United States have been on Threat Condition (Threat Con) Charlie or Bravo. Both, Threat Con Charlie and Bravo have the same security measure but the difference is the use of deadly force. Under Threat Con Charlie, the Noncommissioned Officer In Charge (NCOIC) can authorize the use of deadly force and under Bravo; the Officer In Charge must authorize it. The entire European Command is under Threat Con Bravo and will remain at this level for some time. The reason that I have mentioned the Threat Con is because it has a direct effect on the overall security and how the general public (soldiers and dependants) feels about the safety of they’re shopping. If I may call your attention to the drawing of exhibit â€Å"A† (Area Overview) you will see that this is indeed a very small post (called concerns here in Germany). The XXX represent a seven-foot high chain-link fence with razor wire and barbed wire on top of it (this was just added after September 11th incident). Located at Guard Point one (1), there are two to three civilian security guards (Pond’s security force) with loaded 9mm weapons and three to four soldiers with loaded M16’s with 20 live rounds apiece. Upon entrance into the post, one must stop and show their drivers license, ID Card, and vehicle registration and the vehicle gets a quick look over. Then you would proceed in and within 30 meters the road divides (divided by concrete barriers) and an armed soldier will direct you to the search lane or the bypass lane. If you are lucky you will go through the bypass lane, however if you get directed (ever five cars) to search lane your vehicle will go through an intensive...

Thursday, November 21, 2019

Remembering, feeling, and thinking Essay Example | Topics and Well Written Essays - 750 words

Remembering, feeling, and thinking - Essay Example The interrelationship among the psychological concepts of motivation, emotion and behavior is important to understand. Human behaviors are always directed towards certain motives and those motives are further propelled by emotion. Human emotion stands in between motivation and the behavior. Emotion, first of all, stems from motivation. A desire to do or achieve something comes from emotion and the success or failure of the same also results in the arousal of emotions – joy or happiness if one is successful and sadness or distress if one fails. The emotions thus aroused make the person show appropriate behaviors that project those emotions. For example, a sad person stops eating and a happy person may start dancing and singing! Sometimes emotion also effects motivation. Often times our goals and ambitions stem from the kind of emotional state one is in. A joyful person might be motivated to spend time in recreational activities while a frustrated person might choose to seclude himself inside closed doors. Let us look at the behavior of John, a high school student who wants to pursue a degree in engineering. His ambition to become an engineer is a motivation and his desperate search for a suitable institution that can provide a degree in engineering is the behavior propelled by his motivation for achievement. This motivation, on the other hand does not appear without emotion. John feels extremely happy when he repairs certain machines like his neighbor’s computer or his old radio and when he makes certain buildings out of plastics or cartoons. He is always driven towards outdoor activities and is obsessed with other clerical jobs and other activities that require dexterous capabilities and mathematical intelligence. Thus such behaviors are always motivated and those motivations are always liked to emotions. II. Theories of Emotion There are four major theories proposed to explain emotions. The first one is The James-Lange Theory. According to this t heory an event causes a physiological arousal and it is only when you interpret the physical response, you experience the resulting emotion (Maddie, 2011). For example a girl walking in dark hears certain sounds of an animal, and her heartbeat rises. She interprets this reaction to be fear. The Cannon-Bard theory claims that â€Å"we feel emotions and experience physiological reactions such as sweating, trembling and muscle tension simultaneously† (Kendra, 2011). For example I see a snake; I feel afraid and begin to tremble. The Schacter-Singer Theory says that two factors are essential for the experience of emotions, high physiological arousal and an emotional interpretation of that arousal. According to the theory, an event causes physiological  arousal  first. You must then identify a reason for this  arousal  and then you are able to experience and label the emotion (Schachter-Singer Theory, 2011). The Lazarus theory builds on the Schechter-Singer theory and propo ses that when an event occurs, a cognitive appraisal is made and based on the results of that appraisal, an emotion and physiological response follow. The most valid theory for me is the Cannon-Bard theory because it acknowledges the fact that the experience of emotion and physiological reaction occurs simultaneously. Moreover it does not assert the need for ‘interpretation’ of emotion, for, emotion is instinctual and a person engrossed in the emotion hardly has a change to ‘interpret’ the same, yet, he feels the emotion. The least valid theory for me is the James-Langue theory. It is not necessary that the physiological arousal must occur first and it is also not necessary to ‘interpret’ the physical reaction for a person to know what emotion he is feeling. Emotions often occur in a subtle form where we notice our physical reaction such as rejoice way after we have felt the emotion. III. Thinking, Intelligence and Creativity Thinking is the pr ocess of making use of mind or the brain to observe, interpret and make sense of the world around us.