Skip to main content

Home/ E-learning Innovations/ Group items tagged defense

Rss Feed Group items tagged

Robyn Jay

Why Don't Managers Think Deeply? - HBS Working Knowledge - 1 views

  •  
    A since deceased, highly-regarded fellow faculty member, Anthony (Tony) Athos, occasionally sat on a bench on a nice day at the Harvard Business School, apparently staring off into space. When asked what he was doing, ever the iconoclast, he would say, "Nothing." His colleagues, trained to admire and teach action, would walk away shaking their heads and asking each other, "Is he alright?" It is perhaps no coincidence that Tony often came up with some of the most profound insights at faculty meetings and informal gatherings. This story captures much of the sense of the responses to this month's question about why managers don't think deeply. The list of causes was much longer than the list of proposed responses. But in the process, some other questions were posed. Ben Kirk kicked off the list of reasons for the phenomenon when he commented, "… what rises to the top levels are very productive and very diligent individuals who tend not to … reflect and are extremely efficient at deploying other people's ideas," implying that this type of leader is not likely to understand, encourage, or recognize deep thinking in others. Adnan Younis added the possibility that "… managers are not trained for it." Dianne Jacobs cited the possibility that persisting assumptions borne out of success serve as "roadblocks to act on needed change" (proposed by those who engage in deep thinking?). Ulysses U. Pardey, whose comment triggered my recollection of Tony Athos, wrote that "Time-for-thinking is a special moment which can be resource consuming and an unsafe activity …" (Fortunately, Athos held a tenured position in an academic organization.) A number of comments alluded to the triumph of bureaucracies and large organizations over deep thinking. As Lorre Zuppan said, "I think Jeff Immelt's efforts to protect deep thinking reflect a nice sentiment but … If his team could carry the ball, would he need to announce that he's protecting it?" Tom Henkel was more succinct: "Ther
surani demel

Kick Boxing Athlete - 0 views

  •  
    Self defense tips and striking techniques. Self defense tips and striking techniques.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
officesetuphe

Four reasons why governments trust Microsoft - www.office.com/setup - 0 views

  •  
    As governments strive to become more responsive and transparent, it's important for them to make public information easily accessible to citizens. At the same time, it's critical that they protect confidential data. A key reason why governments choose Microsoft Office 365 is Microsoft's leadership in the industry when it comes to privacy, security, and compliance practices. In short, governments know they can trust Microsoft to help protect their data. So how does Microsoft demonstrate leadership and why exactly do governments trust Office 365 to help protect their data? Here are four reasons: We respect your privacy. Google is under criticism for its privacy practices. Office 365 does not build advertising products out of customer data, unlike other companies. Nor do we scan your email or documents for building analytics, data mining, or advertising, or to improve the service. What's more, you own your data. Office 365 customer data belongs to the customer. Customers can remove their data whenever they choose. Office 365 is independently verified. Office 365 is compliant with many world-class industry standards, and it is verified by third parties. For example, Office 365 is the first major business productivity public cloud service to have implemented the rigorous set of physical, logical, process, and management controls defined by ISO 27001, one of the best security benchmarks available in the world. In addition, Office 365 is the first major business productivity public cloud service provider to sign the standard contractual clauses created by the European Union ("EU Model Clauses") with all customers. Office 365 also implements security processes that adhere to the Federal Information Security Management Act (FISMA) required by U.S. federal agencies and to the Health Insurance Portability and Accountability Act (HIPAA). With Office 365, you know where your data is located. Office 365 customers know where major Office 365 datacenters are located
officesetuphe

New Office 365 capabilities help you proactively manage security and compliance risk - ... - 0 views

  •  
    www.office.com/setup Blogs: Missing a key security signal could mean not catching a breach, but the number of security signals is increasing exponentially. It's becoming impossible to manually prioritize them. That's why Office 365 applies intelligence to help you proactively manage risk and ward off threats. Today, we're pleased to introduce several new capabilities in Office 365 that help you manage risk and stay ahead of threats: Office 365 Secure Score-A new security analytics tool that applies a score to Office 365 customers' current Office 365 security configuration. Office 365 Threat Intelligence Private Preview-Service that leverages billions of data points from the Microsoft Intelligent Security Graph to provide actionable insights to the global threat landscape and help customers stay ahead of cyber threats. Office 365 Threat Intelligence is now in private preview, with general availability planned for later this quarter. Office 365 Advanced Data Governance Preview-Applies machine learning to help customers find and retain the most important data to them while eliminating redundant, obsolete and trivial data that could cause risk if compromised. Office 365 Advanced Data Governance is now in preview, with general availability planned for later this quarter. KNOW YOUR OFFICE 365 SECURE SCORE Do you know how you'd be rated if someone were to evaluate your security configuration? To give you better visibility into your Office 365 security configuration and the security features available to you, we're pleased to introduce Secure Score-a new security analytics tool. Secure Score helps you understand your current Office 365 security configuration and shows you how implementing additional controls can further enhance your security and reduce risk.* Here's how it works: Secure Score Summary-Displays your Secure Score and provides access to view your Score Analyzer. Your Secure Score, the numerator, is the sum of the points associated wi
surani demel

The Social Form of Political Cartoons - 0 views

  •  
    Republicans have doubled down on obstructionism with their unprecedented filibuster of secretary-of-defense nominee Chuck Hagel. Picking a member of the opposite party to serve in a cabinet is usually an olive branch, a sign of outreach. However, GOP senators have long been critical that Hagel does not reflect the values or positions of the Republican Party.
  •  
    Join Polvaulting, a political satire website that YOU can customize! Instead of just reading satirical political cartoons, now you can contribute! No artistic expertise required.
  •  
    Join Polvaulting, a political satire website that YOU can customize! Instead of just reading satirical political cartoons, now you can contribute! No artistic expertise required.
1 - 6 of 6
Showing 20 items per page