As Italian political philosopher Niccolo Machiavelli implied, you're either predator or prey, and the animal you most resemble determines your position on the food chain. In The Wolf in CIO's Clothing Gartner analyst and author Tina Nunno expands on Machiavelli's metaphor, examining seven animal types and the leadership attributes of each. Nunno posits the wolf -- a social animal with strong predatory instincts -- as the ideal example of how a leader can adapt and thrive.
Technology may be black and white, but successful leadership demands an ability to exist in the grey. Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams.
Since it was first published almost a decade ago, Seth Godin's visionary book has helped tens of thousands of leaders turn a scattering of followers into a loyal tribe. If you need to rally fellow employees, customers, investors, believers, hobbyists, or readers around an idea, this book will demystify the process.
It's human nature to seek out tribes, be they religious, ethnic, economic, political, or even musical (think of the Deadheads). Now the Internet has eliminated the barriers of geography, cost, and time. Social media gives anyone who wants to make a difference the tools to do so.
With his signature wit and storytelling flair, Godin presents the three steps to building a tribe: the desire to change things, the ability to connect a tribe, and the willingness to lead.
If you think leadership is for other people, think again—leaders come in surprising packages. Consider Joel Spolsky and his international tribe of scary-smart software engineers. Or Gary Vaynerhuck, a wine expert with a devoted following of enthusiasts. Chris Sharma led a tribe of rock climbers up impossible cliff faces, while Mich Mathews, a VP at Microsoft, ran her internal tribe of marketers from her cube in Seattle.
Tribes will make you think—really think—about the opportunities to mobilize an audience that are already at your fingertips. It's not easy, but it's easier than you think.
Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
Master trainer Geri McArdle’s refresh of Training Design and Delivery makes accessible the proven principles and tools that countless trainers rely on.
Her third edition highlights new training delivery systems that have had an immediate and far-reaching impact on training. More importantly, it hones in on their technologies. McArdle has substantially added to the section on delivery and provides new chapters on project management and international training.
This simple, single-source guide to developing and implementing training belongs on the bookshelf of every trainer.
In this book you will learn:
· What it takes to meet standards of training design, development, and delivery
· How to use a multistep training program design tool to create a training module and program
· Which tools and techniques to use to open, conduct, and close a training.
For three centuries, Graham shows, Russia has been adept at developing technical ideas but abysmal at benefiting from them. From the seventeenth-century arms industry through twentieth-century Nobel-awarded work in lasers, Russia has failed to sustain its technological inventiveness. Graham identifies a range of conditions that nurture technological innovation: a society that values inventiveness and practicality; an economic system that provides investment opportunities; a legal system that protects intellectual property; a political system that encourages innovation and success. Graham finds Russia lacking on all counts. He explains that Russia's failure to sustain technology, and its recurrent attempts to force modernization, reflect its political and social evolution and even its resistance to democratic principles.
But Graham points to new connections between Western companies and Russian researchers, new research institutions, a national focus on nanotechnology, and the establishment of Skolkovo, "a new technology city." Today, he argues, Russia has the best chance in its history to break its pattern of technological failure.
Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.
This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.
The text explores and defines learning and Knowledge Management concepts, and deals with the elements that play an important part in determining implementation success in the organization. The chapters present a managerially oriented discussion of the following key areas:
* The role of processes in managing knowledge
* The behavioural side of Knowledge Management
* Leadership reflexes for knowledge management success
* The key features of Information Technology required for Knowledge Management
* The future of Knowledge Management as part of organization management.
There are many case studies which include:
The case studies encompass a diverse and broad range of sectors, maturity of practice, problems and approaches to Knowledge Management.
'Leveraging Communities of Practice for Strategic Advantage' combines theory and practice to outline a model for developing successful communities of practice and proposes a direction for establishing communities of practice as an integral part of the organizational structure. Saint-Onge and Wallace relate what worked, what didn't, and why as they tell the story from inception through implementation to assessment. Whether you're developing communities of practice or want to learn how to leverage existing communities for strategic gain, this book provides you with everything you need to launch successful communities of practice in your organization.
Intellectual Capital should be read as if the futures of your company and your career depend on it. They do.
From the Trade Paperback edition.
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited.
In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.
And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying code into production hundreds, or even thousands, of times per day.
Following in the footsteps of The Phoenix Project, The DevOps Handbook shows leaders how to replicate these incredible outcomes, by showing how to integrate Product Management, Development, QA, IT Operations, and Information Security to elevate your company and win in the marketplace.
Take the DORA DevOps X-ray Assessment and see where you stand! Visit devops-survey.com with your access code to take the DevOps X-ray Assessment.
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
This complete summary of the ideas from Jeffrey Pfeffer and Robert Sutton's book "The Knowing-Doing Gap" raises a crucial question: why do elements such as education, training and business research generate so little change in what managers and organisations do? According to the authors, knowledge is good, but action is better. They demonstrate that value in the real world is created by the transformation of knowledge into action.
Added-value of this summary:
• Save time
• Understand key concepts
• Expand your business knowledge
To learn more, read "The Knowing-Doing Gap" and find out how you can take your knowledge and turn it into valuable action.
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book!
With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.
Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
Coal, iron ore, and oil were the key productive assets that fueled the Industrial Revolution. The vital raw material of today's information economy is data.
In Data-ism, New York Times reporter Steve Lohr explains how big-data technology is ushering in a revolution in proportions that promise to be the basis of the next wave of efficiency and innovation across the economy. But more is at work here than technology. Big data is also the vehicle for a point of view, or philosophy, about how decisions will be—and perhaps should be—made in the future. Lohr investigates the benefits of data while also examining its dark side.
Data-ism is about this next phase, in which vast Internet-scale data sets are used for discovery and prediction in virtually every field. It shows how this new revolution will change decision making—by relying more on data and analysis, and less on intuition and experience—and transform the nature of leadership and management. Focusing on young entrepreneurs at the forefront of data science as well as on giant companies such as IBM that are making big bets on data science for the future of their businesses, Data-ism is a field guide to what is ahead, explaining how individuals and institutions will need to exploit, protect, and manage data to stay competitive in the coming years. With rich examples of how the rise of big data is affecting everyday life, Data-ism also raises provocative questions about policy and practice that have wide implications for everyone.
The age of data-ism is here. But are we ready to handle its consequences, good and bad?
Leading-edge companies like Amazon and Google are applying DevOps and Agile principles to deliver large software projects faster than anyone thought possible. But most executives don’t understand how to transform their current legacy systems and processes to scale these principles across their organizations.
Leading the Transformation is an executive guide, providing a clear framework for improving development and delivery. Instead of the traditional Agile and DevOps approaches that focus on improving the effectiveness of teams, this book targets the coordination of work across teams in large organizations—an improvement that executives are uniquely positioned to lead.
Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter
The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments.
This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.Authoritative, scholarly treatise sheds light on this increasingly important area of the lawHistorical background helps readers understand the present by seeing the full context of recent developmentsNational scope provides crucial parameters to security practitioners throughout the USNEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
Operations management is an important skill for current and aspiring business leaders to develop and master. It deals with the design and management of products, processes, services, and supply chains. Operations management is a growing field and a required course for most undergraduate business majors and MBA candidates. Now, Operations Management For Dummies serves as an extremely resourceful aid for this difficult subject.
Tracks to a typical course in operations management or operations strategy, and covers topics such as evaluating and measuring existing systems' performance and efficiency, materials management and product development, using tools like Six Sigma and Lean production, designing new, improved processes, and defining, planning, and controlling costs of projects.Clearly organizes and explains complex topics Serves as an supplement to your Operations Management textbooks Helps you score your highest in your Operations Management course
Whether your aim is to earn an undergraduate degree in business or an MBA, Operations Management For Dummies is indispensable supplemental reading for your operations management course.
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
Coverage IncludesHighlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0
all the music, film and text ever produced will be available on-demand in our own homesyour "bodynet" will let you make phone calls, check email and pay bills as you walk down the streetadvances in telecommunication will radically alter the role of face-to-face contact in our livesglobal disparities in infrastructure will widen the gap between rich and poorsurgical mini-robots and online care will change the practice of medicine as we know it.
Detailed, accessible and visionary, What Will Be is essential for Information Age revolutionaries and technological neophytes alike.
Flexibility, says Simchi-Levi, is the single most important capability that allows firms to innovate in their operations and supply chain strategies. A small investment in flexibility can achieve almost all the benefits of full flexibility. And successful companies do not all pursue the same strategies. Amazon and Wal-Mart, for example, are direct competitors but each focuses on a different market channel and provides a unique customer value proposition -- Amazon, large selection and reliable fulfillment; Wal-Mart, low prices -- that directly aligns with its operations strategy. Simchi-Levi's rules--regarding such issues as channels, price, product characteristics, value-added service, procurement strategy, and information technolog -- -transform operations and supply chain management from an undertaking based on gut feeling and anecdotes to a science.
* Completely updated with coverage of all core security principles
* Course text for the Certified Protection Officer (CPO) Program
* Includes all new sections on information security, terrorism awareness, and first response during crises
A new edition of the classic project management book is here, revised and updated with even more guidelines and real-world examples. This expanded fifth edition provides an applications-oriented understanding of the issues you must confront and important tips for passing the Project Management Professional exam.
The standard guidebook in the Project Management field for over 20 years Project Planning Scheduling and Control now offers more strategies for dealing effectively with team members, clients, senior managers and other key stakeholders and is the perfect prescription for project success.
NEW TO THIS EDITION:Chapters on Full-spectrum Project Management and how to manage a virtual project team Managing and facilitating project meetings Techniques for dealing with contractors Guidelines for setting up a project office
Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they can focus on their business. It also reveals the cloud's effect on corporate organization structures, the evolution of traditional IT in the global economy, potential benefits and risks of cloud models and most importantly, how the IT function is being rethought by companies today who are making room for the coming tidal wave that is cloud computing.Why IT and business thinking must change to capture the full potential of cloud computing Topics including emerging cloud solutions, data security, service reliability, the new role of IT and new business organization structures Other titles by Hugos include: Business Agility: Sustainable Prosperity in a Relentlessly Competitive World and Essentials of Supply Chain Management, 2nd Edition
Practical and timely, this book reveals why it's worth every company's time and effort to exploit cloud computing's potential for their business's survival and success.
THE PRACTICAL, EASY INTRODUCTION TO MODERN SUPPLY CHAIN/LOGISTICS MANAGEMENT FOR EVERY PROFESSIONAL AND STUDENT!COVERS CORE CONCEPTS, PLANNING, OPERATIONS, INTEGRATION, COLLABORATION, NETWORK DESIGN, AND MORE SHOWS HOW TO MEASURE, CONTROL, AND IMPROVE ANY SUPPLY CHAIN INCLUDES PRACTICAL ADVICE FOR JUMPSTARTING YOUR OWN SUPPLY CHAIN CAREER
This easy guide introduces the modern field of supply chain and logistics management, explains why it is central to business success, shows how its pieces fit together, and presents best practices you can use wherever you work.
Myerson explains key concepts, tools, and applications in clear, simple language, with intuitive examples that make sense to any student or professional. He covers the entire field: from planning through operations, integration and collaboration through measurement, control, and improvement.
You’ll find practical insights on hot-button issues ranging from sustainability to the lean-agile supply chain. Myerson concludes by helping you anticipate key emerging trends—so you can advance more quickly in your own career.
Trillions of dollars are spent every year on supply chains and logistics. Supply chain management is one of the fastest growing areas of business, and salaries are rising alongside demand. Now, there’s an easy, practical introduction to the entire field: a source of reliable knowledge and best practices for students and professionals alike.
Paul A. Myerson teaches you all you’ll need to start or move forward in your own supply chain career. Writing in plain English, he covers all the planning and management tasks needed to transform resources into finished products and services, and deliver them efficiently to customers.
Using practical examples, Myerson reviews the integration, collaboration, and technology issues that are essential to success in today’s complex supply chains. You’ll learn how to measure your supply chain’s performance, make it more agile and sustainable, and focus it on what matters most: adding customer value.MASTER NUTS-AND-BOLTS OPERATIONAL BEST PRACTICES
Improve procurement, transportation, warehousing, ordering, reverse logistics, and more BUILD A BETTER GLOBAL SUPPLY CHAIN
Manage new risks as you improve sustainability STRENGTHEN KEY LINKAGES WITH YOUR PARTNERS AND CUSTOMERS
Get supply chains right by getting collaboration right PREVIEW THE FUTURE OF SUPPLY CHAINS—AND YOUR SUPPLY CHAIN CAREER
Discover “where the puck is headed”—so you can get there first
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
From one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
Dave Kerpen is CEO of Likeable Local and Likeable Media, which has won two WOMMY awards from the Word of Mouth Marketing Association (WOMMA) for excellence in word-of-mouth marketing.
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
Today, number crunching affects your life in ways you might never imagine. In this lively and groundbreaking new book, economist Ian Ayres shows how today's best and brightest organizations are analyzing massive databases at lightening speed to provide greater insights into human behavior. They are the Super Crunchers. From internet sites like Google and Amazon that know your tastes better than you do, to a physician's diagnosis and your child's education, to boardrooms and government agencies, this new breed of decision makers are calling the shots. And they are delivering staggeringly accurate results. How can a football coach evaluate a player without ever seeing him play? Want to know whether the price of an airline ticket will go up or down before you buy? How can a formula outpredict wine experts in determining the best vintages? Super crunchers have the answers. In this brave new world of equation versus expertise, Ayres shows us the benefits and risks, who loses and who wins, and how super crunching can be used to help, not manipulate us.
Gone are the days of solely relying on intuition to make decisions. No businessperson, consumer, or student who wants to stay ahead of the curve should make another keystroke without reading Super Crunchers.
From the Hardcover edition.
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
This complete summary of the ideas from Larry Bossidy and Ram Chaean's book "Execution" shows that the gap between what a company promises and the results it actually achieves is the biggest issue facing businesses. This summary names and explains the key building blocks needed by a company for efficient and consistent execution, thus effectively giving you the tools to improve execution in your own company.
Added-value of this summary:
• Save time
• Understand key concepts
• Expand your business knowledge
To learn more, read "Excecution" and discover a corporate vision which is squarely grounded in reality.
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
With The Handbook of Program Management, you'll obtain the skills to incorporate new technology and people into your processes while delivering improved products and services that continually outpace your competition. In light of the Project Management Institute's new certification program for program managers, (PgMPSM) it's crucial that you have the understanding and processes necessary to deliver projects on schedule, within target costs, and that meet customer expectations.
Program and project management authority Dr. James Brown helps you create the necessary culture that will ensure the success of your project managers and teams by providing the “must have” insights you would only get from a trusted mentor, including:The price of delayed decision-making How calculated failure can drive organizational change Why your best people often make the biggest mistakes What the customer really needs to know (and not know) The essence of successful execution
Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.
Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.Provides clear direction on how to meet new business demands on the security professionalGuides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the programCovers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
For a manufacturing enterprise to succeed in this current volatile economic environment, a revolution is needed in restructuring its three main components: product design, manufacturing, and business model. The Global Manufacturing Revolution is the first book to focus on these issues. Based on the author's long-standing course work at the University of Michigan, this unique volume proposes new technologies and new business strategies that can increase an enterprise's speed of responsiveness to volatile markets, as well as enhance the integration of its own engineering and business.
Introduced here are innovations to the entire manufacturing culture:
An original approach to the analysis of manufacturing paradigms
Suggested methods for developing creativity in product design
A quantitative analysis of manufacturing system configurations
A new manufacturing "reconfigurable" paradigm, in which the speed of responsiveness is the prime business goal
An original approach to using information technology for workforce empowerment
The book also offers analysis and original models of previous manufacturing paradigms' technical and business dimensions—including mass production and mass customization—in order to fully explain the current revolution in global manufacturing enterprises. In addition, 200 original illustrations and pictures help to clarify the topics.
Globalization is creating both opportunities and challenges for companies that manufacture durable goods. The tools, theories, and case studies in this volume will be invaluable to engineers pursuing leadership careers in the manufacturing industry, as well as to leaders of global enterprises and business students who are motivated to lead manufacturing enterprises and ensure their growth.
"Those who write off Toyota in the current climate of second guessing and speculation are making a profound mistake and need to read this book to get the facts. Toyota is a company that will channel the current challenges to push themselves to even more relentless continuous improvement."
—Charles Baker, former Chief Engineer and Vice President for R&D, Honda of America
"Toyota Under Fire is a superb book and should prove very helpful to American industry's understanding of the problems faced and how any company can prevent similar occurrences in the future."
—Norman Bodek, author, founder of Productivity Press, and inductee in 2010 Industry Week Manufacturing Hall of Fame
"As a former automotive supplier executive and student of Toyota, I was concerned to see the many negative reports and investigations into the quality and safety of its vehicles. Toyota Under Fire tells the story of how this great company is growing wiser and stronger by living its culture and values."
—Michael Fisher, CEO, Cincinnati Children's Hospital Medical Center
"Just as Toyota has put itself through excruciating soul-searching in order to understand what went wrong, so should we all take advantage of the opportunity for learning presented to us by Toyota's misfortune. In these pages, you will find that the actual circumstances were far more complex, nuanced, and uncertain than you saw reported in the news."
—John Y. Shook, Chairman and CEO, Lean Enterprise Institute
"The most comprehensive and detailed review to date of the circumstances that led to the crisis, and the events and contexts that caused it to escalate.”
—Strategy & Business
About the Book
For decades, Toyota has been setting standards that are the envy—and goal—of organizations worldwide. Its legendary management principles and business philosophy, first documented by Jeffrey K. Liker in his influential book The Toyota Way, changed the business world's approach to operational excellence.
Granted unprecedented access to Toyota's facilities worldwide, Liker, along with Timothy N. Ogden, investigated the inside story of how Toyota faced the challenges of the recession and the recall crisis of 2009–2010. In both cases, the company was caught off guard—and found that a root cause of the challenges it faced was its failure to live up to its own principles. But the fundamentals were still there, and the company has ultimately come out of the most challenging years of its postwar existence even stronger than before.
Toyota Under Fire chronicles all the events of the recession and the recall crisis in detail, providing valuable lessons any business leader can use to survive and thrive in a crisis, no matter how large:Crisis response must start by building a strong culture long before the crisis hits. Culture matters far more than decisions made by top executives. Investing in people, even in the depths of a recession, is the surest path to long-term profitability.
Because it had founded its culture on such principles, Toyota didn’t need to amass an army of public relations, marketing, and legal experts to "put out the fire"; instead, it redoubled efforts to live up to its founding tenet, going "back to basics." Toyota began solving this crisis more than 70 years ago, when its organizational culture was first established.
Apply the lessons of Toyota Under Fire to your company, and you'll meet any future management challenge calmly, responsibly, and effectively—the Toyota Way.
of setting up the field operations needed to provide adequate protection to the client, firm or individual. The Standard Operating Procedure System asks all
the questions required to survey any protection objective. In addition, the system provides all the basic information needed to answer those questions and leads to the implementation of the tactical or mission standard operating procedure. The Standard Operating Procedure System may be applied to any type of security or protection operation and may be modified, expanded or contracted, without needing to rewrite or redesign an existing security program.
Details a system to survey, implement, and maintain at full operational
effectiveness many types of assets protection programs.
Provides the basis for the vital training required by every security or physical
This book is for IT managers and company managers who need to understand how PCI DSS applies to their organizations. It is for the small- and medium-size businesses that do not have an IT department to delegate to. It is for large organizations whose PCI DSS project scope is immense. It is also for all organizations that need to grasp the concepts of PCI DSS and how to implement an effective security framework that is also compliant.Completely updated to follow the PCI DSS standard 1.2.1Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secureBoth authors have broad information security backgrounds, including extensive PCI DSS experience