Thursday, October 31, 2019

Reflect on a Recent Change Management Project or Strategy Essay

Reflect on a Recent Change Management Project or Strategy - Essay Example Because of MediSys’ partnership with the local hospital, the health care organization requires specialized technology systems not commonly found in most independent care facilities. The change management strategy was to implement an EMR system, the electronic medical record, designed to change the methodology behind how MediSys communicates with the hospital, its patients, and external service providers. The goal was to implement a paperless health clinic and also improve the quality of patient-related information related to database storage and as it relates to patient referrals. This paper describes the change management project in detail, the systems and its function within the facility, and the barriers that were incurred during its launch and implementation phases. What is EMR? The electronic medical record provides a paperless environment in which clinical information is shared via electronic communications and transactions within an entire health network. It allows for information exchanges between hospitals, employers, patients, network payers, and even ambulatory clinics (Garets & Davis, 2006). Patient data is recorded in a database that can be easily accessed via various point-of-contact electronic service devices. Another reason for implementing EMR was to ensure less liability for the health care clinic related to errors. The Institute of Medicine offers that there are nearly a million injuries caused to patients and approximately 100,000 deaths each year due to dosing errors or adverse drug effects caused by health care worker neglect (Hook, Pearlstein, Samarth & Cusack, 2008). These errors cost the entire health care system over $2 billion yearly related to dispensing errors, transcribing errors, and medicinal administration. The change management goal was to remove such liabilities from MediSys and improve its reputation as a quality leader. The EMR provides nurses with pre-printed batch forms each month that provide resident information, their health identification number, special allergy concerns, dietary needs, and all medications previously and currently ordered for the patient (e-infomax.com, 2009). In addition, to improve service time and efficiency/productivity, a digital pen is included that allow the nursing and physician staff to carry the device that contains an infrared camera and digital processer so that they can read digitized words. At the end of the shift rounds, nurses and physicians simply dock the pen into a processing station and the information from the digital pen is transmitted to the appropriate external and internal units related to health care provision. When a physician or nursing signature is required related to patient care, the electronic pen immediately records this data and can be accessed within seconds. The implementation of the EMR system was to radically change the timeframe between when a signed document is retrieved, thus improving productivity, and also to avoid the lag times i n attempting to communicate when nurses or physicians are not readily available in the organization. The auto-generated reports can then be accessed and printed from a variety of stations set up at the organization and the system immediately identifies and prints a batch report when any document has not been properly signed, thus removing even more errors in processing paperwork. The Change Effort

Tuesday, October 29, 2019

Florida Emergency Response Plan Essay Example | Topics and Well Written Essays - 1750 words

Florida Emergency Response Plan - Essay Example However, the question is now to judge whether what is on paper is as good when it is tested by nature. Based on the experience of Hurricane Andrew, the federal government and its local counterparts have implemented the need to formulize specific plans and operating procedures to cope with these calamities but the Andrew experience has now been overshadowed by another Hurricane. Katrina hit the Bahamas, South Florida, Cuba, Louisiana, Mississippi, Alabama, Florida Panhandle, and most of eastern North America on August of 2005 costing the US almost 82 billion in damages and the lives of 1836 people ("Hurricane Katrina", 2006). This happened after the requirement of each state to have its own emergency response systems and the institution by the federal governing bodies solely focused on did after preparation and mitigation. The devastation brought on by Hurricane Katrina most recently has further emphasized the need to have these disaster plans carefully examined, updated and monitored . The Florida Fire Chiefs' Association has created the FFCA Statewide Emergency Plan (SERP) is an effort to coordinate and mitigate response during emergencies. It is not limited to situations brought on by hurricanes that frequent the state but also provides standard operating procedures for various types of emergencies either brought by natural or contrived circumstances. It is based on a collective of experience from emergency services and the methods that have been established during the ordinary course of their service. The FFCA SERP covers local, county, state and federal level of intervention that delegates primary accountability with the lowest level of government and assistance can be requested following the same hierarchy the apex being Florida Division of Emergency Management (DEM)Assessment of damages or calamity costs is evaluated by the Rapid Impact Assessment Teams(RIAT) which will also be the basis of declarations of state of emergency by the Governor which will in turn initiate the State Emergency Operations Center (SEOC) that will serve as the coordinating body of county-based emergency operations centers. In the event that local and state resources prove to be inadequate, the Governor may seek the assistance of the Federal Emergency Management Agency (FEMA). At the same time, existing government agencies may be asked to extend their functions as may be required by the situation. The other key elements that have been established through FFCA-SERP are deployment time frames, pre-identified strike teams, and pre-staged resources. Another key element to the plan is the considerable focus on the pre and post event concerns. As preparation for any event it is a requirement that a proper assessment of anticipated needs, both supplies and services, is done and that each level shall consider these as current requirements. However, even if emergency response primary follows a hierarchy, counties are encouraged to support and coordinate with each other closely at all times. Consequently, the manner of dealing with reimbursements, service rates of personnel, equipment rates and other expenses, has already been established. Disasters and Realities It has been claimed that Hurricane Andrew laid bare the

Sunday, October 27, 2019

ISP Network Potential Threats

ISP Network Potential Threats Threat Identification A danger is an event which could take benefit of the vulnerability and make a terrible effect at the ISP network. potential threats to the ISP network need to be diagnosed, and the associated vulnerabilities need to be addressed to reduce the danger of the threat. Trends Driving Network Security As in any rapid-growing enterprise, modifications are to be predicted. The varieties of capability threats to network protection are usually evolving. If the security of the network is compromised, there may be extreme effects, like lack of privateness, stealing of information, and even legal potential.      Ã‚   Figure () illustrates several threats and their potential consequences. Figure () Introduction to Vulnerabilities, Threats, and Attacks: Although studying network security, the three usual terms used are as follows: Vulnerability-A weak point that is essential in every network and device. This contains routers, switches, desktops, servers, and similar security gadgets themselves. Threats-The people keen, prepared, and eligible to take advantage of each security flaw, and they frequently examine for new exploits and weaknesses. Attacks-The threats use a selection of kits, scripts, and software to release attacks towards networks and network devices. Normally, the network devices beneath attack are the endpoints, such as servers and PC. The sections that comply with talk vulnerabilities, threats, and attacks in more detail. First aspect: lets talk about vulnerabilities in ISP Vulnerabilities within ISP network security can be summed up as the soft spots which can be found in each network. The vulnerabilities are be found in the network and separate devices that build up the network. Networks are classically troubled by unique or all of three main vulnerabilities or weaknesses: Technology weaknesses Configuration weaknesses Security policy weaknesses The sections that follow inspect separately of those weaknesses in further detail. Technological Weaknesses: Computer and network technologies have intrinsic security weaknesses. These include TCP/IP protocol weaknesses, operating system weaknesses, and network equipment weaknesses. Table () describes these three weaknesses. Table ( ) Network Security Weaknesses Weakness Description TCP/IP protocol weaknesses FTP, HTTP, and ICMP are naturally insecure. (SNMP), (SMTP), and SYN floods are linked to the naturally insecure building upon which TCP was created. Network equipment weaknesses Many types of network tools, such as switches, routers, IDS, and firewalls have security flaws that should be known and shielded against. Example of These flaws are as follows Protocols Firewall Holes Password Protection Absence of authentication Routing Configuration Weaknesses Network administrators or network engineers must  ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­discover what the configuration flaws are and perfectly setup their computing and network devices to balance. Table () includes usual setup weaknesses. Table ( ) Configuration Weaknesses Security Policy Weaknesses Security policy flaws can generate unexpected security risks. The network can pose security threats to the LAN if workers do not follow the security policy. Table () lists selected usual security policy weaknesses and how those flaws are misused. Table () security policy weaknesses Threats There are four main classes of risks to network security, as Figure (-) depicts. The list that follows defines all class of risk in additional detail. Figure () Variety of Threats Unstructured threats these types of threat happen when users with little experience try to be hackers by using some ready hacking software like shell scripts and knowing password. Even these types of threats which only comes hackers can form a significant harm to companies. Structured threats the source of these threats are hackers who have more technical knowledge and with stronger drive. Such hackers are equipped with knowledge about the weaknesses in the system and are willing to misuse codes and programs. They study, make and use advanced hacking methods to enter business systems without their awareness of the hacking. External threats these threats come from persons or groups outside the business without having an official and legal access to businesss system. Internal threats these threats come from people with official access to the system by having an online account or physical access to the system. Attacks: There are four main types of attacks: Reconnaissance Access Denial of service Worms, viruses, and Trojan horses each of the above-mentioned attacks will be explained in the next paragraphs. Reconnaissance It is the unapproved revelation or the systems vulnerabilities, planning, or services (see Fig à ¢Ã¢â€š ¬Ã‚ ¦) There are some elements of similarities between reconnaissance and a robber who watches areas to notice any easy target to enter like empty houses, unlocked doors and windows. Figure () Reconnaissance Access This attack can take place when an unapproved interloper gets an access to the system without an account or a password. Denial of Service (DoS) This attack is the most worrying type of attacks. It means that hackers make the intended users no longer able to access services, systems or networks. Dos attacks make the systems useless by damaging it or making it too slow. Mostly attacks happen by a hack or a script. Worms, viruses, and Trojan horses This type of attack is widespread online through an internet. Attack Examples The next section is dedicated to representing examples of attacks to elaborate and explain it more. Access Attacks Access attacks take advantage of recognized vulnerabilities in authentication services, FTP services, and internet services to benefit access to internet accounts, private databases, and different private info get entry to attacks can include the following: Password attacks Port redirection man-in-the-middle attacks Social engineering Password attacks Password attacks may be applied using multiple techniques, such as brute-force attacks, malicious program applications, IP spoofing, and packet sniffers. (see figure - for an example of a try to attack the use of the administrators profile) brute-force attacks. Figure () Password Attack Example  ¨ Port Redirection This type of attack (please see Fig) happens when there a trust is taken advantage of through cooperated host to penetrate a firewall which originally is hard to penetrate. For example, when a firewall has a host for each of its three interfaces. External host can contact the public services segment host but not the internal host. The public service segment is also known as a demilitarized zone (DMZ). Figure () Protocol Analyser Port redirection may be mitigated typically via using right trust models, that are network (as referred to in advance). Assuming a system underneath attack, a host-based IDS can assist discover a hacker and save you set up of such utilities on a host. Man-in-the-middle attacks a person-in-the-middle attack calls for that the hacker has get admission to to net packets that come upon a net. A sample might be operating for (ISP) and has access to all net packets transferred among the ISP net and some other net. man-in-the-centre attack mitigation is performed by encrypting traffic in an IPsec tunnel, which might permit the hacker to look only ciphertext. Social Engineering simplest hack (social engineering) If an outsider can trick a member of an corporation into giving over valued data, which includes places of documents, and servers, and passwords, the technique of hacking is made immeasurably simpler. 90 percent of workplace workers gave away their password in trade for a cheap pen. Denial-of-Service (DoS) Attacks This is definitely the most common method of attack. DoS are also one of the hardest attacks to remove entirely. Even amongst hackers, DoS hackers are seen unimportant due to the fact that this method is easy to perform. In spite of that, this form of threat requires high security attention because it can cause a possible huge harm using easy steps (also clarified in Figà ¢Ã¢â€š ¬Ã‚ ¦..). Figure (). Denial of Service The next example of a some common type of DoS threats: Ping of death-This attack changes the IP part of the header to deceive others into thinking that there is extra data in the packet than the reality, as a result the system which plays the recipient part will fall apart, as explained in Figure (à ¢Ã¢â€š ¬Ã‚ ¦..). Figure (). Ping of Death Distributed Denial-of-Service Attacks Distributed denial-of-service attacks (DDoS) these attacks take place by filling the network links with false data. This data can crush the internet link, which means that consequently the genuine traffic will be denied. DDoS attacks use similar techniques to those used by DoS attacks but the former is performed on a wider scale. They usually use thousands of attack centers to overpower a target (see an example in figure à ¢Ã¢â€š ¬Ã‚ ¦..) Figure () DDos Attack Malicious Code The main vulnerabilities for end-consumer workstations are next: Trojan horse-A software created to seem like something else that in reality is an attack app Worm-A software that performs random program code and installs duplicates of itself within the RAM of the infected PC, which then infects different hosts Virus-Malicious program is connected to some other software to perform a specific undesirable function on the user computing device Worms The types of a worm attack is : The enabling vulnerability-A computer virus installs itself the usage of an take advantage of the vector on a susceptible system. Propagation mechanism-After having access to PC, a worm repeats and selects new devices. Payload-After the PC or device is hit with a worm, the attacker has to get entry to the host- frequently as a privileged user. Attackers may want to use a local exploit to increase their privilege degree to the admin. Vulnerability Analysis It is vital to analyse and study the present state of network and the administrative practice to know their present amenability with the security needs. This step is needed before working on the addition of new security solutions to an established network. This study will create a chance to find potential enhancements and the possible requirement to reshape part of the system or reconstruct it entirely to meet the requirement. The study/analysis can take place through these steps identifying the policy, analysing the network and analysing the host. The previous sections attempted to present different types of attacks and suggested some solutions. However, the next table summarises different attacks and presents more solutions to these attacks Threats Good practices Assets, assets covered Gaps (assets not covered) Routing threats AS hijacking Internet protocol addressing, Routing protocols, Administrators Administrators Make use of useful resource certification (RPKI) to offer AS authentic validation. The reader needs to be conscious that on the time of writing, its far impossible to discover AS hijacking mechanically. Internet protocol addressing, Routing protocols Administrators Address space hijacking (IP prefixes) Routing, Internet protocol addressing, System configurations, Network topology Make use of resource certification (RPKI) to offer AS authentic authentication. Routing, Internet protocol addressing, System configurations, Network topology set up the best Use policy (AUP), which promotes guidelines to safe peering. Routing, Internet protocol addressing, System configurations, Network topology set up access filtering from the edge router site to the net. Routing, Internet protocol addressing System configurations, Network topology set up Unicast opposite direction path Forwarding to conform the legitimacy of the main sources IP address. Routing, System configurations, Network topology Internet protocol addressing set up egress filtering on the boundary router to proactively clear out all traffic going to the client that has a source address of any of the addresses which have been assigned to that client. Routing, Internet protocol addressing System configurations, Network topology filter out the routing announcements and apply methods that decrease the danger of placing an extreme load on routing created via illegitimate path updates/announcements. for example, Route Flap Damping (RFD) with a properly-described threshold might also make a contribution to lowering router processing time Routing, Network topology Internet protocol addressing, System configurations filter out the routing announcements and apply methods that decrease the danger of placing an extreme load on routing created via illegitimate path updates/announcements. for example, Route Flap Damping (RFD) with a properly-described threshold might also contribute to lowering router processing time Routing, Internet protocol addressing, System configurations Network topology Setup updates for the routing organization infrastructure may simply be accomplished via a described authority the usage of solid authentication. Routing, System configurations, Network topology Internet protocol addressing Manage the status of BGP to discover uncommon activities like path modifications or uncommon announcement. Routing, Internet protocol addressing, System configurations, Network topology Route leaks Routing, Network topology Configure BGP Max-prefix to make sure the legitimacy of routes broadcast. If extra prefixes are received, its miles a signal of a wrong behaviour and the BGP session stopped. Routing, Network topology Utilize useful resource certification (RPKI) to offer AS source authentication. Routing, Network topology BGP session hijacking Routing, Internet protocol addressing, System configurations, Network topology set up prefix filtering and computerisation of prefix filters. Routing, Internet protocol addressing, System configurations, Network topology Use AS route filtering. Routing, Internet protocol addressing, System configurations, Network topology Employ (TCP-Authentication option) to safe secure BGP Validation so that you can update TCP- MD5.TCP-Authentication option to make it simple to a trade of keys. Routing, Internet protocol addressing, System configurations, Network topology DNS registrar hijacking Domain name system, Addressing units, Applications, Credentials, Administrators Registrants need to defend account credentials and outline authorized customers, at the same time as registrars need to offer a secure and safe authentication technique. Addressing units, Credentials, Administrators Domain name system, Applications Registrants need to defend account credentials and outline authorized customers, at the same time as registrars need to offer a secure and safe authentication technique. Addressing units, Applications Domain name system, Credentials, Administrators Registrants need to keep documentation to show registration. Addressing units, Applications Domain name system, Credentials, Administrators Registrants should usage isolated identities for the registrant, admin, technical, invoicing contacts. therefore, registrars should permit an extra complicated user rights control. Credentials, Administrators Domain name system, Addressing units, Applications Registrars have to set up an effective sector information control. Domain name system, Addressing units, Applications Credentials, Administrators Registrars must keep in mind assisting DNSSEC. Domain name system, Addressing units, Applications Credentials, Administrators Registrars can also manage DNS exchange events. Addressing units, Applications, Administrators Domain name system, Credentials DNS spoofing Domain name system, Addressing units, Applications, System configurations, Essential addressing protocols DNS, Administrators Administrators Deploying DNSSEC ambitions to extra secure DNS customers (resolvers) source authentication of DNS information, authentic denial of existence, and info or data integrity. Domain name system, addressing units, Applications, System Configurations, Essential addressing protocols DNS Administrators DNS poisoning Domain name system, Addressing units, Applications, System configurations, Executable programs, Essential addressing protocols DNS, Administrators, Operators Administrators, Operators Deploying DNSSEC ambitions to extra secure DNS customers (resolvers) source authentication of DNS information, authentic denial of existence, and info or data integrity. Domain name system, Addressing units, Applications, System configurations, Executable programs, Essential addressing protocols DNS Administrators, Operators Restrict zone transmissions to decrease load on network system Applications, Executable programs Domain name system, Addressing units, System configurations, Essential addressing protocols DNS, Administrators, Operators Limited active updates to only official sources to keep away abuse. Such abuse include the misuse of a DNS server as an amplifier, DNS cache poisoning Addressing units, applications, System configurations, Executable programs Domain name system, Essential addressing protocols DNS, Administrators, Operators configure the trusty name server as non-recursive. Discrete recursive name servers from the trusty name server. Domain name system, Addressing units, Applications, Executable programs System configurations, Essential addressing protocols DNS, Administrators, Operators Permit DNS transference over TCP to provision non-standard demands. Furthermore, TCP could be essential for DNSSEC. Addressing units, Applications, System configurations, Executable programs Domain name system, Essential addressing protocols DNS, Administrators, Operators Domain name collision Domain name system, Applications Dont use any domain names which you dont own for your inner infrastructure. For instance, do not take into account non-public domain name area as top-level domains. Domain name system, Applications Stopping DNS demand for inside namespaces to leakage into the net via making use of firewall policies. Applications Domain name system Usage booked TLDs such as. invalid, test, localhost, or. example. Domain name system, Applications Denial of Service Amplification / reflection Applications, security, Generic Internet provider, Hardware, Executable programs, System configuration, Application protocols, Administrators, Operators System configuration, Essential addressing protocols, Administrators, Operators Undertake source IP address deal with authentication at the edge of net organisation to avoid network address spoofing via egress ingress filtering. Applications, Security, Generic Internet provider, Hardware, Executable programs, Application protocols System configuration, Administrators, Operators Workers of official name server operative must apply (Response Rate Limiting). Applications, Security, Generic Internet provider, Hardware, Executable programs System configuration, Application protocols, Administrators, Operators ISPs and DNS name server operatives must to deactivate exposed recursion on name servers and may just allow DNS requests from reliable sources. Applications, Security, Generic Internet provider, Hardware, Executable programs System configuration, Application protocols, Administrators, Operators Flooding Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators System configuration, Essential addressing protocols, Administrators, Operators Industrialists and configurators of net tools must take footsteps to protected and secure all equipment . One option is to have them update by patching mistakes. Applications, Security, Generic Internet providers, Hardware, Executable programs System configuration, Essential addressing protocols, Administrators, Operators Protocol exploitation Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators Malformed packet attack Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators Application Applications, Security, Generic Internet provider, Hardware, Executable programs, System configuration, Application protocols, Administrators, Operators

Friday, October 25, 2019

The Taming of the Shrew Essay: The Taming of Katherina -- Taming Shrew

The Taming of the Shrew: Katherina - the Woman Formerly Known as Shrew    The Katherina that gives the final speech in The Taming of the Shrew is quite a departure from the Katherina we were introduced to in Act I. This new Kate is modest, quiet and obedient. All of these qualities were not present until Act V. Such a profound personality change prompts the questions how this happened and what purpose do her changes serve?    The answer to the first question, how did this happen, is simple to answer: Petruchio has tamed her. His taming tactics are comparable to that of a military officer and a patient mentor: He is ruthless and unwilling to bend the rules in order to make her learn, however, he is content to let her learn at her own pace. The text for his lessons is Kate's own temper, actions and words. By spewing her deeds back into her face at an unrelenting pace, she is forced to see how ridiculous she has been acting, and it is at this point that the transformation begins.    Due to the nature of Petruchio's teachings, The Taming of the Shrew can be see...

Thursday, October 24, 2019

Family life Essay

Family life is full of challenges, but when we make wise choices, it is also rewarding. Family Life includes dozens of practical units on human development (childhood, teen years, adulthood, and aging), and living in a family (couple relationships, parenting, strengths, connections). All of these materials are intended to help you make choices that will make your family life more effective and satisfying. Family Life. A family is a household of people related by blood or marriage. More specifically, we can define a family as husband and wife (or one parent), with or without never-married children, living together in the same dwelling. A household may contain more than two generations of people. The family is the foundational institution of society ordained by God. It is constituted by marriage and is composed of persons related to one another by marriage, blood or adoption. A safe haven in which family members esteem and honor one another. A place where words and actions communicate value and respect to everyone, young and old. A reliable sanctuary where each person receives grace – unconditional acceptance and extravagant generosity with no strings attached. A place where a person finds others available, attentive, and emotionally connected to them. A community of celebration, laughter, and play. A safe haven where family members can let their hair down, reveal themselves fully, and know one another intimately. Family roles are the recurrent patterns of behavior by which individuals fulfill family functions and needs. Individual members of families occupy certain roles such as child, sibling, grandchild. Along with roles come certain social and family expectations for how those roles should be fulfilled. For example, parents are expected to teach, discipline, and provide for their children. And children are expected to cooperate and respect their parents. As family members age, they take on additional roles, such as becoming a spouse, parent, or grandparent. A person’s role is always expanding or changing, depending upon his or her age and family stage. Individuals within a family have both instrumental and affective roles to fulfill. Each serves an important function in maintaining healthy family functioning. Instrumental roles are concerned with the provision of physical resources (e.g., food, clothing, and shelter), decision-making and family management. Affective roles exist to provide emotional support and encouragement to family members. Both sets of roles must be present for healthy family functioning. In addition, families must also consider issues of roles allocation and accountablility. Communication is the way you let other people know about your ideas and feelings. It is much more than the words you say. It is what you say, how you say it, why you say it, when you say it, and what you don’t say. It is your facial expression, your gestures, your posture, and your vocal tones. Good communication isn’t something that just happens between members of strong families; they make it happen. Good family communication involves being both an active listener and a thoughtful speaker. In this way children can see how to communicate well and how to have more control of their lives. A good man leaveth an inheritance to his children’s children: and the wealth of the sinner is laid up for the just. – Proverbs 13:22 The Bible speaks often about leaving an inheritance for our children – not necessarily as a command, just as prudent advice. Applying this principle to material things, it is easy to see how helpful it would be to have the parent generation jump-starting their children’s generation with sound financial teaching and the means for them to start their own families with tangible goods rather than debt. This second generation will then, in turn, be able to help the third generation so much more, and so on. I am not talking about amassing and hording money. Rather, I was thinking along the lines of how in the old days, families would pass part of their land on to each of their children, and help them build a house/farm on it, or how the family business would be passed down from father to son for generation after generation. The lines are fallen unto me in pleasant places; yea, I have a goodly heritage. – Psalm 16:6 Regardless of your financial standing, this same principle can be applied to the spiritual realm, which is also infinitely more important than the physical/material. The testimonies have I taken as an heritage for ever: for they are the rejoicing of my heart. – Psalm 119:111 When we think about the importance of passing on to our children a heritage of godliness, living a life that strives to be in line with Bible principles becomes a much more urgent responsibility.

Wednesday, October 23, 2019

M3.04 Achieving Objectives Through Time Management

Andrew Wilson. Level 3 Award in First Line Management. M3. 04. Achieving Objectives through Time Management. Set SMART Objectives. Results can be achieved by setting objectives, either for yourself or your team. Objectives also provide structure in the workplace, if people know what to aim for; it will be easier for them to hit the target. Objectives set should be SMART, see below, S – Specific, M – Measurable, A – Achievable, R – Realistic / Relevant, T – Time bound, Objective1 – Relief Team Leader to close all completed work orders on the backlog list. Measurable by the reduction in the amount of completed work orders on the backlog list. Easily achievable, given the time to carry out the task. Relevant because all completed work orders closed, will be added to the Plant Asset Records, providing maintenance history for items of plant. Task to be carried out for the first 2 hours of every working day. Objective 2 – Housekeeping tours to be carried out in Plant areas. Measurable by the reduction of scrap/waste in Plant areas and the completion of the spreadsheet on the computer. Easily achievable, given the time to carry out the task. Relevant because areas of Plant are becoming untidy. Task to be carried out on the first Thursday of every month, to involve the whole of the Maintenance Team. Objective 3 – Plan a package of maintenance work on No4 Distiller. Measurable by the completion of various maintenance tasks . Achievable given time and resources. Relevant because production levels will increase due to the maintenance being carried out. Package of work to be completed by 5pm 17/03/2011. Objective 4 – Arrange training for maintenance team members on overhead crane operation. Measurable by the successful completion of training. Achievable because all team members have the ability to learn. Relevant because the team will be more flexible in the workplace. Training to be completed by 31/07/2011. Andrew Wilson March 2011. Plan the Achievement of SMART Objectives. Tasks can be broken down into more manageable smaller tasks, each with its own deadline. The completion of each â€Å"sub-task† to its set deadline, will inevitably lead to the achievement of the overall objective. Objective No3 on my list is a perfect example of planning requirement. The main objective is to carry out a package of maintenance work on No4 Distiller, which, when completed, will increase production rates, to be completed by 5pm on the 17th March 2011. Below is a workplace planning sheet, clearly outlining all the sub-tasks required to be completed, the times they must be completed by, resources required, results of completion of sub-tasks and constraining factors to be considered, before the main objective is achieved. Workplace Planning Sheet | |Objective/Task |Completion |Resources |Results on |What do I need to do |Constraining | | |Time | |Achievement |first |factors | | | | | | | | |Process to Isolate the |07:30 |Process Operators |Distiller made |Arrange isolation |Process unable to| |Distiller | |ready for |with Process Manager |isolate due to | | | | |maintenance | |faulty equipment | | | | |activities | | | | | | | | | | | | | | | | | |Insert isolation plate into |08:30 |4x Mechanical |Distiller made safe|Ensure scaffold is in|Scaffold Tag out | |Distiller Exit Gas main. | |Technicians |for maintenance |place and tagged & |of date | | | | |work |all parts to hand. | | | | | | | | | | | | | | | |Removal of spool to Heat |09:00 |2x Mechanical |Heat Exchanger |Request isolation |Process unable to| |Exchanger for cleaning | |Technicians |available for |with Process |isolate due to | | | | |cleaning | |faulty equipment | | | | | | | | | | | | | | | |Replacement of damaged pipe |11:00 |4x Mechanical |Damaged pipe |Request isolation |Spares not | |to VLS | |Technicians |section replaced |with Process & ensure|available | | | | | |all spares available | | | | | | | | | | | | | | | | |Replacement of damaged pipe |14:00 |2x Mechanical |Damaged pipe |Request isolation |Spares not |to VLS drain | |Technicians |section replaced |with Process & ensure|available | | | | | |all spares available | | | | | | | | | | | | | | | | |Replacement of spool to heat|15:00 | 2x Mechanical |Heat Exchanger |Ensure cleaning is |Cleaning not | |exchanger | |Technicians |available for duty |completed |completed | | | | | | | | | | | | | | | |Removal of isolation plate |16:00 |4x Mechanical |Distiller available|Check all work is |Delay in work | |into Distiller Exit Gas | |Technicians |for handback to |completed and all |completion | |main. | |process |work permits signed | | | | | | |off | | | | | | | | | | | | | | | | |Process to De- Isolate the |17:00 |Process Operators |Distiller back on |Hand back Distiller |Any delay in | |Distiller | | |work & production |to Process |prior tasks | | | | |increased | | | | | | | | | | | | | | | | | Andrew Wilson March 2011. Monitor the Objectives. The completion of sub-tasks is monitored throughout the day in order to evaluate the likelihood of achieving the main objective. The easiest way of doing this, is by visually checking the progress of each sub-task and communicating this to the relevant people. Each sub-task re quires a Permit to Work to be issued before work can commence, these Permits must be signed off by the Technician to whom the Permit was issued. Another method of monitoring progress is to check that the Permits that have been issued, have been signed off, this will indicate the time that the task was completed and whether the task was completed successfully. Regular update meetings would be held throughout the day to keep relevant people informed of progress and give insight into whether the main objective will be achieved. E-mails would also be sent out as confirmation of progress. When all outstanding Permits have been signed off as successfully completed, then the Distiller can be officially handed back to Process for de-isolation and then brought on for production. Andrew Wilson March 2011.