Nationality: Lebanese • DOB: September 18‚ 1977 • Marital status: Single E-mail: ghida_assaad@hotmail.com Mobile : +9613-686587 GHIDA ASSAAD PROFILE Human Resources Management Results-driven‚ ambitious team player‚ seeking an opportunity in a challenging progressive organization. PROFESSIONAL EXPERIENCE Transmed − Lebanon‚ Mars 2008 – Till present Transmed is an exclusive distributor of P&G and Mars International among other multinational brands Human Resources Coordinator Recruitment
Premium Human resource management Recruitment
As the Assistant to the HR manager‚ I would make a mandatory requirement that all incoming employees must complete a new program that was created by me with in their first 90 days. This program would be designed to ensure that our new talent understands the importance of working together. My program would include these three key principles of working together. The first principle would be on how to effectively communicate as a team. It is very important when working together as a team that all vital
Premium Communication Management Teamwork
Abstract This paper is a continuation of our previous scenario of developing a Wide Area Network for an audio and video special effects company with worldwide offices in the U.S.‚ Europe‚ Japan‚ and South America. This part of the project details the types of network protocols we’re proposing to utilize for the WAN and LAN throughout the corporation. Keywords: WAN‚ Wide Area Network‚ LAN‚ Local Area Network‚ Global Corporate Communication Network Structure‚ Networking Protocols Protocol Choices
Premium Internet IP address
1. INTRO 2. WHY AMONG TOP 10 ? 3. WHY 2ND ? 4. Hr policies 5. Unique features 6. Conclusion Hr policies : 1. Maternity leave “My aim is that every employee at Intel Israel can honestly say: I believe in the company‚ I belong to the Intel team and I matter to the company and its success” said Nirit . Good example is the “Gradual Return from MLOA” program. It all started when we noticed women working in our manufacturing operation were not returning to their jobs
Premium Employment Minimum wage Wage
REAL TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS REAL TIME POWER SYSTEM SECURITY ASSESSMENT USING ARTIFICIAL NEURAL NETWORKS Abstract Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive security analysis involving
Premium Artificial neural network Neural network
Types of Networks Title of Paper Networks are the connections between two devices. How they are interconnected changes the type of network‚ while the principle is the same as our communication. Networks are made to exchange information in the shortest path possible with the best replication of the original data. Local Area Networks (LAN)‚ Wide Area Networks (WAN)‚ Campus Area Networks (CAN)‚ Metropolitan Area Networks (MAN) and Home Area Networks (HAN) are all varieties of how devices can be interconnected
Premium Computer network Ethernet Local area network
Suppose you were assigned to write job descriptions for a shirt factory in British Columbia employing mostly Chinese immigrants who spoke little or no English. What methods would you use to collect job analysis data? Answer: When choosing a method‚ HR managers should consider time‚ cost and human efforts included in conducting the process. Taking these criteria into consideration‚ I would use the Observation Method. As a job analyst I would observe the employees and record all their performed and
Premium Observation Peer-to-peer Scientific method
Introduction Network architecture is a combination of topology and protocols. In this paper‚ I will discuss topology‚ which is the defined as the shape of a network or how a network is laid out. Topology also consists of how the different components or nodes of a network are connected and how they communicate with each other. Topologies are either logical or physical. In addition‚ in the sections of this paper‚ I will compare and contrast some different conventional architecture and what types of
Premium Network topology
Objective: The main objective of the research paper is to illustrate most common network threats and provide solution to protect users from threats‚ hackers and ensures that the data travelling across the networks is safe. Introduction: Computer and network security is a new and fast moving Technology and as such‚ is still being defined and most probably will always be “still defined”. Security incidents are rising at an alarming rate every year [Figure - 1]. As the complexity of the threats
Premium Computer security Attack Computer network
Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant‚ flat topology. Your assignment must
Premium Times Roman Typography Hierarchy