Category: Social
-
The Most Common Leadership Model – And Why It’s Broken
The Most Common Leadership Model – And Why It’s Broken:
When organizations’ hire, develop, and promote leaders using a competency-based model, they’re unwittingly incubating failure. Nothing fractures corporate culture faster, and eviscerates talent development efforts more rapidly, than rewarding the wrong people for the wrong reasons.… Continued
-
Role of Positivity in Risk Management Communication
Role of Positivity in Risk Managerment Communication:
What is the cause of the stormy relationship [between Risk and Business]? Criticism and negative feedback! No one likes it, so why blame the business managers. What if risk managers change the approach?… Continued
-
Two-Step Verification Will End Consensual Impersonation
Two-Step Verification Will End Consensual Impersonation:
IT security pros are typically delighted to do away with employees’ option for consensual impersonation, and indeed, privileged identity management systems work really hard to make it impossible for those with superuser powers to do.… Continued
-
What Is: Product Management
In 140 characters or less, what is Product Management? Building. Communicating. Helping. Simplifying. Collaborating. (Sometimes) Crying. Leading.
Nice little article on Product Management. And more about PM in this portrait of Twitter’s Jason Goldman – The Silent Partner:
Jason Goldman helped build Google and Twitter into what they are today — but few outside of tech’s inner circle know his name.… Continued
-
Unique in the Crowd: The privacy bounds of human mobility
Unique in the Crowd: The privacy bounds of human mobility:
We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique.
Wow – they know who I am just from my location patterns.… Continued
-
Should I Work for Free?
Who’s ready to stop working for free? Hopefully you are! If you have any doubts, consult this handy chart below. Start in the middle and work your way to your answer! Download the original English jpg here!
Via Do not work for free and Should you work for free?… Continued
-
Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia
Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia:
Twenty years ago, it was cypherpunk that was happening.
Looking back in time: another history lesson.
-
I Need People to Work Overtime
Management Myth 15: I Need People to Work Overtime:
When a manager wants people to work overtime, to feel invested in an organization, what’s the real issue behind the words? It might be that the manager wants people to have the same sense of investment in the organization as the manager does.… Continued
-
What Coke Contains
The Vons grocery store two miles from my home in Los Angeles, California sells 12 cans of Coca-Cola for $6.59 — 54 cents each. The tool chain that created this simple product is incomprehensibly complex
Well written – hope he writes more like that.