Feeds

Indian Nokia workers ready to up tools

'Misunderstanding' puts 2000 out on strike

High performance access to file storage

A two day strike at Nokia India is ending with most staff heading back to work, having been asked nicely and told that management will explain.

The strike, which involved nearly 2,000 of the 8,000 staff at the site, started on Tuesday and was triggered by the transfer of one staff member and the suspension of around 60 for "serious misconduct". But India's Labour Commissioner has asked the staff to get back to work, and has told the company to sort out the mess before Wednesday next week. Nokia hopes production will resume today.

The Employees Progressive Union, which represents workers at the site, told the Hindustan Times that production would resume immediately. Meanwhile, management are under instructions to investigate what went wrong, and how what appears to have been a relatively trivial matter spiralled out of control.

The call for a strike was triggered when one worker turned up and was told he had been shifted departments without his knowledge. Colleagues who remonstrated were suspended and more were suspended on Wednesday, by which time the strike was in full swing.

"The transfer and the miscommunication resulted in some misunderstanding and the strike," a Union rep told the Indo-Asian News Service. Tempers were obviously running high, with workers demanding personal apologies from specific managers for their treatment over the matter.

We won't know if production can be ramped back up again until the end of the day, when we'll know if the workers have all heeded their union's call, but even a two day interruption will cost Nokia dearly. It's hard to believe that simple mismanagement could disrupt the facility to such an extent, so it's probable that there are underlying problems which Nokia will need to address.

This might seem a stark contrast to the recent strike at WinTek, where workers were concerned about lethal chemicals and refusal to pay promised bonuses. But both were the result of failures to communicate - the chemicals weren't in use any more, and the bonuses are being paid.

It's seems ironic that those at the very bottom of the information technology industry should have such trouble getting access to the right information. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.