Thursday, February 20, 2020

Good Deed Report (Part 1) + Professor Memo (Incident Report - Part 2) Assignment

Good Deed Report (Part 1) + Professor Memo (Incident Report - Part 2) - Assignment Example Immediately after college, I landed a part-time job in a fast food restaurant in the city before receiving my college results. After working for a few months, I received a notification that I had qualified to pursue a degree course at the University. When admissions were close, I was preoccupied with registration and admission procedures and seldom found time to attend work. In the last week of administration, I had many follow-up activities related to my university admission and did not find time to go to work. However, Allan multitasked and served customers at the counter and food service unit. I was new at work, and it was difficult finding an employee at the restaurant to cover for me. My colleagues in the food service unit were often overwhelmed in the afternoons after working throughout the morning. Therefore, my absence was unwelcome unless I had someone to replace me at the unit to avoid overworking my colleagues. Allan was the most unlikely colleague since he was working in the accounting department, but the only employee left. It was amazing when he agreed to my request after thoroughly explaining why I would be away. The fast food restaurant was small compared to other restaurants in the city. However, the increasing number of colleges surrounding the restaurant was a potential market for expansion and growth, especially during the fall. Many factors made Allan succeed in performing both duties and tasks. Firstly, I recognized Allan has exceptional customer relations skills. It is apparent many customers arriving in the evening had delayed service because he had to juggle between receiving money from customers and serving them food. Secondly, Allan is a team player. He has never worked in the food service unit, thus, not familiar with many employees there. However, he managed to get along with the employees to offer a lasting experience to customers. Finally, I was surprised by

Tuesday, February 4, 2020

How technologies can be used to make the border system stronger Dissertation

How technologies can be used to make the border system stronger - Dissertation Example The topic of research is based on the concept of border security. In the past, the researcher has worked in the Homeland Security Centers of Excellence and it is through his experience at the department that directed him towards basing his research project on border security. Homeland Security dispatches a range of resources and funds to the federal, state and the local governments, allowing the amalgamation of a number of individually-operating agencies into a collective whole. The agencies work in collaboration with each other for the achievement of shared objectives. These objectives aim to uphold the integrity and security of the country and subserve to provide the utmost protection to the US population. The Homeland Security Centers of Excellence operate under the Office of University Programs and aim to recruit and attract renowned researchers and enthusiasts for carrying out research programs. The research brings together professionals from various fields and uses their expert ise to come up with solutions for homeland security. Each research center is affiliated with a university and their research ventures are supported and collaborated upon by a number of agencies including think tanks, laboratories, and private institutions. The research work carried out at the Security Centers is in line with the research requirements of the divisions of the Department of Homeland Security  Science and Technology Directorate. The collaboration helps to deliver top-of-the-line technology solutions for the problems facing the Department as well as the country on the whole (U.S. Department of Homeland Security 2009). In particular, one of the Centers, National Center for Border Security and Immigration, is focused on the promotion and enhancement of border security. This was the Center that I was associated with. The Centre is led and supported by two universities: one being the research co-lead while the other is the education co-lead. The Center is committed to the development of technologies, tools and sophisticated procedures to regulate and monitor immigration and business across the borders. This involves the development of projects that promote border security and make it stronger and more effective. There are a number of aspects relating to borders security that the Center focuses on; these include risks and weaknesses, better surveillance and screening, analysis of immigration patterns and improvements in immigration law enforcement (U.S. Department of Homeland Security 2009). The conditions that have developed after the 9/11 have exposed many gaps in the security and surveillance mechanisms. These gaps and vulnerabilities have become yet more acute in light of pressing security demands after the rise in terrorism over the previous years. Besides the post-9/11 conditions and terrorism there are other factors that have necessitated a revision of the immigration and border security systems. These include greater security reviews, insuffic ient collaboration with NGOs and the government, disputed policy tensions etc (Kerwin 2011). My research question is how important is border security today and what measures can be taken to improve it? The research project focuses in particular on the development and enforcement of better surveillance mechanisms and advanced technologies for regulating the influx of immigrants as well as goods such as false documents, illegal medicines, drugs and other illegal items. The project focuses on various aspects associated with development of such technologies, including their pros and cons. One of the key features that guarantees the success of a research project is the amount of information collected regarding it. Keeping this in mind, the research objectives can be defined as follows: Revisiting the importance of border security Identifying the need to develop better methods of surveillance and border security Reviewing the available literature and successful technologies used