Premium Essay

Case File 1

In:

Submitted By cchoat
Words 986
Pages 4
Case Study Analysis Paper 1: A Tale of Two Coaches

Clive S. Choat

Ken Blanchard College of Business, MGT-600

10 December 2013

Case Study Analysis Paper 1: A Tale of Two Coaches

Based on our learning from week one of our class, the purpose of this paper is to discuss the leadership perspectives manifested in both Bobby Knight and Mike Krzyzewski, coaches who have made significant marks in their field in college basketball. I hope to be able to identify the power bases both coaches rely upon, as well as whether their actions are more aligned with either a managerial role or leadership role. In addition, I hope to identify how significant the leadership traits have influenced their leadership, based on the five-factor personality model from our textbook readings, and has this affected the performance effectiveness of the coaches. I begin my report with some background information about the two coaches. Bobby Knight is the former head basketball coach for the United States Military Academy (USMA), Indiana University and Texas Tech University. Coach Knight is best described as a serious taskmaster who ran his team through the use of strict discipline, fear and intimidation. His aggressive style cost him his position after a twenty-nine year successful career at Indiana University for physically assaulting a player, the final straw in a string of violent actions he had displayed during games. In counterpoint, Mike Krzyzewski, who had served as a player under Coach Knight at USMA and an assistant coach at Indiana, is known as “Coach K”, and currently serves as head coach for the Duke University men's basketball program. Rather than using fear and intimidation, Coach K relies on providing to his players positive support, open and supportive communication, and caring support. So while they exhibit different leadership traits, they have both had

Similar Documents

Premium Essay

Case File 3-1

...Assume you are the new marketing vice president at the Mayo Clinic. The CEO and the board have decided to expand their international sales revenues by 100 percent over the next five years. Write a memo to your staff outlining the marketing research that will be needed to support such a strategy. Be specific about sources of secondary data and the best places and media for gathering primary data. Also, be specific about the best methods to use. At Mayo Clinic, in order to expand the international sales revenue by 100 percent there will need to be a lot of research. More specifically there will need to be a lot more research on our consumers or patients. There have already been past surveys conducted via telephone and focus groups, both containing roughly 400 or a little less participants. To conduct further research and reach the goal of 100 percent international sales revenue I propose we use social media and the internet. First, I believe that Mayo Clinic should use Facebook to not only advertise the clinic but to do surveys as well. As a company we could pay for ad or survey space on the website which is one of the most popular sites around the world. Next, I suggest we partner with an international web survey engine that is available in all countries such as surveyproject.org. Using them Mayo Clinic could create a survey that would be available on their company website, a third party website such as inboxdollar.com, and websites like Facebook and Twitter. Since the world...

Words: 287 - Pages: 2

Premium Essay

Project Management

...Juan Gomez Project Management The FBI’s Virtual Case File Project Failure Back in the years between 2001 and 2005, the FBI had started a project called the Virtual Case File. This was part of a larger initiative called Trilogy which was supposed to contain three parts to it: One was to upgrade software and hardware for FBI agents. Another was to be able to upgrade the FBI’s communications network. And the third in which it contained the Virtual Case File, was to significantly upgrade the FBI’s case management system “to enable better access to, and sharing of, case-related information across the FBI.”(WordPress) The first two parts were able to be completed but the Virtual Case File project was faced with high costs and schedule overruns and thus never achieved its goals. This project was compared to the London Stock Exchange’s Taurus Project, where scope creep lead to the termination of the project after huge amounts of cost overruns. The Trilogy program was to modernize the FBI’s information technology infrastructure. The Virtual Case File was intended to replace the FBI’s antiquated case management application, which was the Automated Case Support system. The Virtual Case File was initially designed to improve the FBI’s ability to manage investigative case files, to facilitate data and document resources, and to share information with other FBI offices. In the beginning, The Department of Justice required the FBI to use two contractors for the Trilogy project because the...

Words: 388 - Pages: 2

Free Essay

Virtual Case File

...IT projects, its Sentinel case management system, into a model of success for other agencies? Sentinel and its predecessor case management system have been a symbol of all that's wrong with government IT--over budget, behind schedule, and short on functionality. Sentinel grew out of an earlier failure, the FBI's Virtual Case File system, started in 2001 and scrapped four years--and $170 million--later. Last September, after a partially completed Sentinel had been put on hold, FBI CIO Chad Fulgham decided to take over management of the project from lead contractor Lockheed Martin. Fulgham, a former senior VP of IT with Lehman Brothers who joined the FBI in December of 2008, outlined a plan to use agile development. For the past eight months, a small team of FBI technologists have been developing "working software" in intervals of a few weeks, then rolling that into bigger releases every two or three months. Speaking at InformationWeek's Government IT Leadership Forum in Washington, D.C., on May 5, Fulgham and FBI CTO Jeff Johnson, another former Lehman Brothers IT manager, explained how they shifted the Sentinel project from traditional waterfall application development--where requirements are established at the beginning and can take years to deliver. Fulgham said a "system of record" will be delivered this summer, with a broader release in September. FBI agents and other employees will use Sentinel to manage the information associated with cases. Capabilities include records...

Words: 410 - Pages: 2

Free Essay

Sdf Sekfjhks Fskf

...The FBI started to set up a project to build a new Virtual Case File system (VCF). This VCF project was to be let as one massive contract at a total cost of $379m. It was planned as a classic waterfall project - with a grand design being drawn up before work would start on the development of a monolithic system. Testing would be carried out at the end, and the whole system would go live at once - a classic big-bang implementation approach. Science Applications International Corporation (SAIC) The 9/11 attacks increased political pressure for better homeland security and data sharing between 6 agencies. Responding to this pressure, the FBI made promises to bring forward deployment of the new VCF case management system by 6 months - to December 2002. Then they received an additional $78m of funding and promised to chop off another 6 months from the schedule. The classic symptoms of waterfall project failure started to reveal themselves. Project plans were found to be unrealistic, and the oversight of project spend was inadequate. It became obvious that the project would not meet its accelerated deadlines. A commitment to using unproven thin client technology had been made - and the design for a web-like access to a centralised database was deeply flawed - BUT: up-front contracts with suppliers bound the project to this technology and the testing that could have revealed these flaws came too late to allow a change of direction. After...

Words: 531 - Pages: 3

Premium Essay

Richman Investments

...The article that I read was about the FBI and how it blew $170 million dollars trying to modernize the FBI’s technology. They had a $581 million dollar budget on this transformation which they called “Trilogy”. They referred to this project as “Tragedy” because the new software that they were trying to use which is called Virtual Case File, was not in production and was said to probably never be in production. With that being said, the September 11 attacks dropped a heavy load of pressure onto the project and derailed the course that they were taking on it. I think that the information provided was great considering that this was an FBI project. There was some information that could not be released and some details that could not be discussed. Overall the article was presented in a very professional manner and I was actually kind of surprised that any issues that occur in the FBI could be discussed. It was an article that they could make a one hour show about on television. The one thing that kind of had me confused was how they could have IT workers whom they considered “not capable” of doing what they were asked to do as far as modernizing the technology infrastructure. After years of failure they did ultimately decide to take the project in another direction but to think that they wasted so much money on software that did not hold up, is just crazy. In my opinion, this article was very informational but at the same time it gives a little insight as to just how much technology...

Words: 316 - Pages: 2

Free Essay

Judeg

...Statistics and Actuarial Science September 1, 1998 Table Of Contents Page Before Using This Manual……………………………………………………………………………….3 Introduction to SPSS……………………………………………………………………………………..4 SPSS Basics……………………………………………………………………………………………... 5 Tutorial 1: SPSS Windows.…………………………………………………………………………5 Tutorial 2: Starting A SPSS Session.……………………………………………………………...6 Tutorial 3: Getting Help on SPSS.………………………………………………………………… 6 Tutorial 4: Ending A SPSS Session.……………………………………………………………… 6 Creating and Manipulating Data in SPSS.……………………………………………………………. 7 Tutorial 1: Creating a New Data Set.……………………………………………………………... 7 Tutorial 2: Creating a New Data Set From Other File Formats.……………………………….10 Tutorial 3: Opening an Existing SPSS Data Set.………………………………………………. 16 Tutorial 4: Printing a Data Set.…………………………………………………………………… 16 Generating Descriptive Statistics in SPSS…………………………………………………………...17 Tutorial 1: Mean, Sum, Standard Deviation, Variance, Minimum Value, Maximum Value, and Range.……………………………………………………….. 17 Tutorial 2: Correlation.…………………………………………………………………………….. 18 Generating Graphical Statistics in SPSS……………………………………………………………..20 Tutorial 1: How to Generate Scatter Plots.………………………………………………………20 Tutorial 2: How to Generate A Histogram.………………….…………………………………... 22 Tutorial 3: How to Generate A Stem and Leaf Plot……………………………………………..23 Tutorial 4: How to Generate A Box Plot………………………………………………………….26 Statistical Models in SPSS……………………………………………………………………………..28 Tutorial 1: Linear Regression.……………………………………………………………………...

Words: 5895 - Pages: 24

Premium Essay

Case

...Chapter 6 Problem Summary |Prob. # |Concepts Covered |Level of |Notes | | | |Difficulty | | |6.1 |Decision Making Under Uncertainty -- maximax, maximin, |1 | | | |minimax regret and principle of insufficient reason criteria | | | |6.2 |Expected Value Criterion, EVPI |1 | | |6.3 |Decision Making Under Uncertainty -- Maximax, Maximin, and |1 | | | |Minimax Regret Criteria | | | |6.4 |Expected Value Criterion, EVPI |2 | | |6.5 |Bayesian Probability Revision, EVSI |4 | | |6.6 |Expected Value and Expected Utility Criteria |4 | | |6.7 |Utility, Expected...

Words: 2679 - Pages: 11

Free Essay

Pr Motorcycle Till We Meet Again

...12/13/2015 MBA case till we meet again ­ CASE: PR MOTORCYCLES: Till We Meet Again 1.   MBA case till we meet again - CASE: PR MOTORCYCLES: Till We... Home  Southwestern University (Philippines), Cebu City  MBA  MBA 503  MBA case till we meet again 1 of 2  Download Document  This preview has blurred sections. Sign up to View Full Document  CASE: PR MOTORCYCLES: Till We Meet Again 1. What, if any, did the president fail to do? This is an issue of ethical management. Managing employees can be a daunting prospect. Many business owners started their businesses because they wanted to be their own boss, but what happens when there is a conflict of your interest versus the company policy – what kind of leader will you be, how will you juggle your business and the regulatory requirements of being the boss? While great leadership is often measured by your ability to lead and mentor your employees, it’s also important to remember that as an employer and manager you are required to treat all employees equally and fairly. This is something that Mr. Pedro Reyes failed to do when he took the responsibility that Ms. Amelia Rivera should have done as the head of the HR department. It was a gross disrespect on the part of Ms. Rivera. Mr. Reyes could have allowed Ms. Rivera to take action on the matter as it was the latter’s responsibility. https://www.coursehero.com/file/12214602/MBA­case­till­we­meet­again/ 1/7 12/13/2015 MBA case till w...

Words: 850 - Pages: 4

Premium Essay

Comp230 Course Project

... . . . . . . . . . 2 Description of Program . . . . . . . . 3 Source Code with Description . . . . . . . . 9 Output Explanation . . . . . . . . . 15 Conclusion . . . . . . . . . . 16 References . . . . . . . . . . 17 1 Introduction The work of an IT professional heavily relies on the knowledge of his network. Any companies network can easily become vast and expansive, creating issues when trying to memorize the IP addresses of every individual machine and printer that comes through the door. That is why the IT Professional must develop tools that will easily aid in any situation that can come forward. Keeping a database of all machines and their IP addresses is a large task and one that can be used with great benefit to any IT department. Such a struggle will be medicated throughout the use of the following script. Rooms will be stored individually in different files that will be kept under the title of the room number/name, allowing for easy organization of IP Addresses. Maintaining a database if IP’s and using that to test connectivity of systems via ping. This document will provide a full description of the program itself and what each option will execute, the full source code with an explanation of each output given and explanations of coding inside the script. The...

Words: 1574 - Pages: 7

Free Essay

Thesis

...This watermark does not appear in the registered version - http://www.clicktoconvert.com 1 BACHELOR OF COMPUTER APPLICATIONS (BCA) COBOL CONTENTS Syllabus UNIT –1 Lesson-1 Lesson-2 Lesson-3 Lesson-4 Lesson-5 Introduction to COBOL Divisions of COBOL Picture clause characteristics Editing Level Structure PAGE NO 1 9 16 20 26 UNIT – 2 Lesson-6 Lesson-7 Lesson-8 Lesson-9 Lesson-10 Data Movement verb: MOVE Arithmetic Verbs Input and Output Verbs Corresponding Options Programs using Arithmetic Verbs 30 34 41 48 54 UNIT – 3 Lesson-11 Lesson-12 Lesson-13 Lesson-14 Lesson-15 Conditions Conditionals Statements PERFORM statements RENAMES & REDEFINES Clauses Programs 60 70 77 82 86 UNIT– 4 Lesson-16 Lesson-17 Lesson-18 Lesson-19 Lesson-20 Sequential Files Direct Access Files Indexed Sequential Files Sorting and Merging of Files Programs 92 98 102 107 114 UNIT – 5 Lesson-21 Lesson-22 Lesson-23 Lesson-24 Lesson-25 Table Handling Indexed Tables & Index Names Search & Start Verbs Programs using OCCURS & Screen Section List of Programs 123 128 132 136 142 This watermark does not appear in the registered version - http://www.clicktoconvert.com 2 UNIT – I LESSON – 1: INTRODUCTION TO COBOL CONTENTS 1.0 Aims and Objectives 1.1 History of COBOL 1.2 FORMAT FOR COBOL PROGRAMS 1.3 STRUCTURE OF A COBOL PROGRAM 1.4 CHARACTER SET 1.5 COBOL WORDS ...

Words: 43822 - Pages: 176

Free Essay

Project to Simulate the Behaviour of Move Command and Develop a New Command That Does the Work.

...colleagues who helped us to complete this project. Without their help and support it would not be possible for us to complete this project. CONTENTS TOPICS INTRODUCTION System Calls Command line Argument Program Bibliography PAGE NO. 4 4 5 6 10 INTRODUCTION In this program various operations are performed using move command like moving half of the content from one file to another, move the complete information from one file to another, append the file using move command etc. by using system call in linux. MOVE COMMAND This command will move the content of one file to another and delete the first file. SYSTEM CALLS Various system calls used are:• OPEN system call:- it will help in opening a new file. Syntax:- fd=open(“const-char-pathname”, flag, mode); • READ system call:- to read the contents from a file. Syntax:- read(fd, buff, size_count); • WRITE system call:- it is used to write some content into the file. Syntax:- write fd,&buffer address,size_count); • LSEEK system call:- to move the curser in the file Syntax:- lseek(fd, offset, whence); • REMOVE system call:- to delete a particular file Syntax:- rm(“filename”); COMMAND LINE ARGUMENT The arguments which are passed during the run time are called command line arguments. In this GETOPT function is used. Inside main we are using it as: • Int main(int argc, char *argv[]) • Syntax:- int getopt(int argc, char *argv[], const char *optstring); extern char *optarg;...

Words: 815 - Pages: 4

Premium Essay

Forensic Investigations Case Summary

...This case report was created Wednesday, September 03, 2014 at 3:56:30 PM. Both an Investigator/Forensic Examiner Jeremy Muraskiis assigned to investigate this Forensic Software Report. Investigator Jeremy Muraskiis received a tip coming from a woman who claims her ex-husband told her about a crime he had committed. Investigator Muraskiis questions the woman for more information involving the crime the ex-husband is said to have told her about it. It has come to the investigator attention that the crime that her ex-husband has been involved in, is a crime that is formerly known as computer crime. The ex-wife goes on and begins to give certain details about what her ex-husband has told her. Upon probable cause, Investigator Muraskiis called out the computer forensic examiner to examine the computer that is known to be used in this computer crime. Upon investigating this case, this Forensic Software Report contained 2 evidence, which are JPEG file which is known as images files. These two images files are Andromeda Galaxy M31 and Southern Pinwheel which are the 2 evidence that needs to be recover and sent to the lab to be examine and used in the court of law to prosecute the lady’s ex-husband....

Words: 565 - Pages: 3

Free Essay

New Techniques for Real-Time Fat File System in Mobile Multimedia Devices

...S. Park and S.-Y. Ohm: New Techniques for Real-Time FAT File System in Mobile Multimedia Devices 1 New Techniques for Real-Time FAT File System in Mobile Multimedia Devices Sunhwa Park and Seong-Young Ohm Abstract — Flash memory has become the most important storage media in the mobile multimedia products such as MP3 players, mobile phones, and digital cameras. Most mobile multimedia devices, however, use one of the conventional FAT file systems slightly modified for flash memory environments. Our analysis shows that theses file systems have some restriction in recording a live multimedia stream stably because they have irregular write response times. In this paper, we have considered the problems of the existing FAT file system and propose two new techniques to solve the problems. The first technique called Sector Reservation method reduces internal overhead effectively. And the other method called ACPA avoids the periodic cluster allocation of the conventional FAT file system and removes the frequent modifications on the file allocation table in the FAT file system. To evaluate our new techniques, we implemented a prototype Real-Time FAT file system on ARM9 board with our two novel techniques. The experimental results show that our system achieves our goal successfully in that its write response times are very deterministic and more uniform1. Index Terms — Flash memory, FAT file system, FTL, Mobile multimedia device. I. INTRODUCTION One of the distinct trends in...

Words: 7197 - Pages: 29

Free Essay

Engineering

...(For Course participants only) Reading Material & Work Book On Effective Noting & Drafting (Edited by Smt. Jayanthi Sriram, Asst.Director) GOVERNMENT OF INDIA INSTITUTE SECRETARIAT TRAINING & MANAGEMENT DEPARTMENT OF PERSONNEL & TRAINING ADMINISTRATIVE BLOCK, JNU CAMPUS (OLD) OLOF PALMS MARG, NEW DELHI-110067 TEL. 26105592 TELEFAX: 26104183 Revised - 2005 FORWARD In responsive administration it is obvious that the response has to be meaningful. Yet, it may not be effective unless the response time is optimised. This twin objective can be achieved through streamlining of the decision making process itself. In the Central Secretariat, as in other spheres of Government, contribution by all rungs of employees particularly by those at the cutting edge level, namely the Section Officers and Assistants, generally helps arriving at the right decision. Besides collection of information, such contributions are rendered through Noting & Drafting. Effective noting & drafting at every level, therefore, is a matter of prime concern. 2. To address this concern, we in ISTM have been according utmost importance to the inclusion of 'noting and drafting' as a subject in all our foundational and refresher Courses. Besides, focussed workshops on effective noting & drafting are also organised in large numbers. To help participants team effectively, the need for practical exercises cannot be overemphasised. Similarly,...

Words: 16883 - Pages: 68

Free Essay

Virus

...Detection, Removal & Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory) triggers the anti-virus...

Words: 4870 - Pages: 20