Stereotypes at pitney bowes

Assignment Help Basic Computer Science
Reference no: EM133158737

Stereotypes at Pitney Bowes

Many times, we think of stereotypes or discrimination only being an issue when it comes to things like gender, race, or religion. However, at Pitney Bowes Inc., the toughest stereotype to overcome is age.

Brigitte Van Den Houte starts her day in the normal way; however, she has taken a keen focus on persuading employees in their 20s that they have a future at Pitney Bowes.

For almost 100 years, Pitney Bowes, founded in 1920, has been all about commerce. But as the world turned to technology, the definition of what that meant for the traditional postage-meter equipment company had to change as well.

One of the biggest challenges of this ever-changing technological world is how the generations of employees can step aside from their stereotypes and understand one another to better work effectively.

At Pitney Bowes, their proactive approach puts younger colleagues with older colleagues in a mentoring situation. This is not the typical older mentor to younger mentor setup, however. Every few months, Houte arranges for the younger employees to spend the day with a seasoned executive with the plan of sharing experiences and ideas and offering advice. Houte states, "the old way of working no longer works," and she's right.

With over one-third of the workforce aging to 50 or older and millennials (young people aged 22-37) being the largest workforce group, it is imperative to put stereotypes aside and learn to work together. One big mistake for a manager would be to focus on the age difference rather than on what skills each person individually can bring to the table.

Stereotypes such as "older individuals don't know about technology" or "millennials are constantly job hopping and feel entitled" are put aside at Pitney Bowes in order to get the job done. With a more proactive approach, the range of variables within each generation can be utilized in the most effective way possible for an organization.

Questions:

1. What are other ways that a company can utilize a multigenerational team to their advantage?

2. What challenges does a multigenerational team pose for management?

3. What should the company and management team consider when attracting new employees of all generations?

Reference no: EM133158737

Questions Cloud

Malware developers to disguise their code : Discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.
Computerized baggage handling system : Discuss how the computerized baggage handling system (CBHS) project at Denver International Airport (DIA) could have been a success with proper control.
Organizational behavior : Human creativity is needed in any sort of enterprise; yet, at Apple, it is the chief source of their competitive advantage.
Network standards are essential in network communications : Computer networking has made some significant changes in all our lives. Network standards are essential in network communications.
Stereotypes at pitney bowes : What are other ways that a company can utilize a multigenerational team to their advantage?
Value of risk management for enterprise security : Discuss the value of risk management for enterprise security. Recommend formal risk management processes for enterprise security,
Role playing sim-cruisin fusion : you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al.
What data to use in that examination and the risk appetite : Consider risks that exist in a typical small business. How would you determine what to examine, what data to use in that examination, and the risk appetite?
Enterprise resource planning systems : Why is standardization so important in supply chain management? How is My Coke Rewards an example of a switching cost?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How might you want to follow up with your manager later

I'm on my way into a meeting to discuss potential candidates. What do you think?" How would you respond? How might you want to follow up with your manager later?

  How have these reinventions personally affected you

What other industries might have to realign their business model because of digital information?

  Preconditions and postconditions

Rewrite the function pentagonal using recursion and add preconditions and postconditions as comments.

  What is referential transparency

What is functional programming? What is referential transparency? What is SIMD and MIMD? Specify what each is short for and briefly describe.

  A subroutine in marie assembly that multiplies two value

1)Write a subroutine in MARIE assembly that multiplies two values where the arguments for this subroutine are two pointers(each pointing to a value). The routine, multiply(a,b), performs *a x *b where a's value is the address storing the value being ..

  Different units-length-volume and mass-weight

Create a unit conversion calculator which will calculate three different units, length, volume and mass/weight.

  Complete this array-based implementation of the adt queue

Note that adding to a full queue invokes ensureCapacity, which sets frontIndex to 0 and backIndex to the index of the entry at the back of the queue. Complete this array-based implementation of the ADT queue.

  What experience and interest do you have in cybersecurity

What experience and interest do you have in cybersecurity? How might the knowledge and skills associated with this course support your career or life aspiration

  High-level comparison between radius-tacacs

Your company has decided to allow employees to work from home two days a week. Your CISO has requested a high-level comparison between RADIUS, TACACS and VPN.

  What is scalable clustering algorithm

What are the characteristics of anomaly detection? What are the characteristics of data? What is a scalable clustering algorithm?

  What will happen to congestion window in each case

Suppose TCP Vegas sends over the above connections, with an initial Congestion Window of 3 packets. What will happen to Congestion Window in each case? Assume Base RTT = 1 second and β is 1 packet per second.

  Report writing on wearable computers

What are wearable computers and how are they currently being used. You should explore a range of applications of wearable computers, for example, in areas such as healthcare, the military and entertainment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd