Book picks similar to
Supply Chain Redesign: Transforming Supply Chains Into Integrated Value Systems by Robert B. Handfield
technology
top-influencers
business
business-models
Help! I'm a Manager: A practical guide to success as a first time people manager in professional services
Sue Willcock - 2016
Years hunched over books and articles, writing essays late into the night on the science and art of your chosen profession. Through hard work and determination, alongside lots of experience, you’ve now become pretty good at it. So good in fact, that you have been asked to stop doing it all the time. You’ve been asked to manage a team.Now, you’ve got to assess people, develop them, write their appraisals and help them to help you, and the business you work for, deliver results.This is the book that will get you there fast.Authored by Sue Willcock, who with 25 years of experience in professional services, wrote this book with the busy professional in mind – easy to read and packed full of tips you can use straight away.Sue originally qualified as a Chartered Surveyor before moving into business management roles, including a period as a Partner at a Top 5 Construction Consultancy. For the last 10 years, Sue has worked as a people development consultant focusing on professional services, working with individuals, teams and organisations.
When Digital Becomes Human: The Transformation of Customer Relationships
Steven Van Belleghem - 2014
In a recent global market study, 73% of respondents stated that even when a company’s digital channels work perfectly, they still want access to a real person.Steven Van Belleghem explores and explains the new digital relationships and offers a strategic guide to combining a business's two most important assets — its people and its digital strengths. He shows marketing managers, directors and commercial decision makers how to positively transform customers’ digital experiences by adding a human touch. He covers the latest issues in digital marketing and CRM including: omnichannel and multichannel experiences, big data and predictive analytics, privacy concerns, and crowdsourcing.Packed with examples from organizations that have successfully transformed their customer relationships, such as Amazon, Toyota, ING, Nike and Starbucks, the book presents a clear model that illustrates how to integrate an “emotional” layer in any digital strategy to achieve consumer engagement and loyalty.
The Little Go Book
Karl Seguin - 2014
It's aimed at developers who might not be quite comfortable with the idea of pointers and static typing.http://openmymind.net/The-Little-Go-B...
Steve Jobs: His Own Words and Wisdom (Steve Jobs Biography)
Steve Jobs - 2011
Because almost everything -- all external expectations, all pride, all fear of embarrassment or failure -- these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart. ... Stay hungry. Stay foolish."DESCRIPTIONA remarkable collection of quotations by one of the most influential visionaries of our time. Given up for adoption by his biological parents, and never having graduated from university, Steve Jobs subsequently became the most admired businessperson of his generation. A man who invented or revolutionized five major global industries (personal computer, music, film, mobile phone, and tablet computers), Steve Jobs was a brilliant, enigmatic, and flawed individual, whose personal contradictions were often overshadowed by his public persona.For the first time, his own words have been collected and edited by the Cupertino Silicon Valley Press in a special exclusive Kindle Edition.TABLE OF CONTENTSABILITY TO CHANGEACCEPTANCEADJUSTING WITH DIFFICULTIESADOBE FLASH MISTAKEANDROIDANTI-PORN APPSAPPLE INNOVATIONAPPLE LEGACYAPPLE SUPREMACYAPPLE'S BUSINESS STRATEGIESAPPLE'S DOWNFALLAPPRECIATIONAPPRECIATION OF LIFEBEING THE BESTBEING FRANKBEING UBIQUITOUSBEST FOR APPLEBETTER EXPERIENCEBORROWING IDEASBUILDING THE BESTBUSINESS IDEASBUSINESS SUCCESS IDEASBUSINESS TRANSITIONSBUYING MUSICCALLIGRAPHYCHALLENGE TO MICROSOFTCHANGECOMMUNICATING WITH FEELINGCOMPETITIONCOMPUTER AS SERVANT, GUIDE, AND AGENTCOMPUTER EFFICIENCYCOMPUTER LITERACYCOMPUTERSCONFIDENCE IN APPLE AS A COMPANYCONSUMERS AS THE USERCONTENTMENT AND ADVENTURECOOPERATIONCOURAGECREATING SOFTWARECREATIVITYCUSTOMER SATISFACTIONDEATHDESIGNING PRODUCTSDESKTOP METAPHORDETERMINATIONDISCIPLINEDISNEY'S SEQUELSDOING GREAT WORKDOING SOMETHING INSANELY GREATDROPPING OUTEDUCATIONEFFICIENCY THROUGH PROCESSEMPLOYMENTENCOURAGEMENTENTHUSIASMEXCELLENCEEXPOSUREFAITH IN PEOPLEFAITHFAMILY RELATIONSHIPFEDEX PACKAGE-TRACKING SYSTEMFOCUSFOLLOWING YOUR INSTINCTSFRIENDSHIPFUTURE PRODUCTSGETTING OLDGLOBAL ISSUESGOOD CONTENTGOOGLE RIVALRYHARD WORKH
Humans vs Computers
Gojko Adzic - 2017
You'll read about humans who are invisible to computers, how a default password once caused a zombie apocalypse and why airlines sometimes give away free tickets. This is also a book on how to prevent, avoid and reduce the impact of such problems. Our lives are increasingly tracked, monitored and categorised by software, driving a flood of information into the vast sea of big data. In this brave new world, humans can't cope with information overload. Governments and companies alike rely on computers to automatically detect fraud, predict behaviour and enforce laws. Inflexible automatons, barely smarter than a fridge, now make life-changing decisions. Clever marketing tricks us into believing that phones, TV sets and even cars are somehow smart. Yet all those computer systems were created by people - people who are well-meaning but fallible and biased, clever but forgetful, and who have grand plans but are pressed for time. Digitising a piece of work doesn't mean there will be no mistakes, but instead guarantees that when mistakes happen, they'll run at a massive scale. The next time you bang your head against a digital wall, the stories in this book will help you understand better what's going on and show you where to look for problems. If nothing else, when it seems as if you're under a black-magic spell, these stories will at least allow you to see the lighter side of the binary chaos. For people involved in software delivery, this book will help you find more empathy for people suffering from our mistakes, and discover heuristics to use during analysis, development or testing to make your software less error prone. <
SOA Design Patterns
Thomas Erl - 2008
More than three years in development and subjected to numerous industry reviews, the 85 patterns in this full-color book provide the most successful and proven design techniques to overcoming the most common and critical problems to achieving modern-day SOA. Through numerous examples, individually documented pattern profiles, and over 400 color illustrations, this book provides in-depth coverage of:• Patterns for the design, implementation, and governance of service inventories–collections of services representing individual service portfolios that can be independently modeled, designed, and evolved.• Patterns specific to service-level architecture which pertain to a wide range of design areas, including contract design, security, legacy encapsulation, reliability, scalability, and a variety of implementation and governance issues.• Service composition patterns that address the many aspects associated with combining services into aggregate distributed solutions, including topics such as runtime messaging and message design, inter-service security controls, and transformation.• Compound patterns (such as Enterprise Service Bus and Orchestration) and recommended pattern application sequences that establish foundational processes. The book begins by establishing SOA types that are referenced throughout the patterns and then form the basis of a final chapter that discusses the architectural impact of service-oriented computing in general. These chapters bookend the pattern catalog to provide a clear link between SOA design patterns, the strategic goals of service-oriented computing, different SOA types, and the service-orientation design paradigm.This book series is further supported by a series of resources sites, including soabooks.com, soaspecs.com, soapatterns.org, soamag.com, and soaposters.com.
Who's in Your Room: The Secret to Creating Your Best Life
Ivan R. Misner - 2018
THE SIMPLE AND POWERFUL IDEAS IN THIS BOOK CAN CHANGE YOUR LIFE FOREVER. Who’s in Your Room? introduces you to the concept of your life being like a room—a room where anyone who enters affects your life . . . forever. Although this concept may sound frightening, this book gives you the tools and exercises you need to take control of your room and live the life you desire.This book brings in experts to describe how people leave you with memories that cannot be erased but can be managed. You manage them by determining what’s really important to you, and then you can determine how to spend your time and whom you should be spending it with. Stop living according to everyone else’s rules. Shape your life by taking control of your room. Live your life by your design!
Thinking in CSS
Aravind Shenoy - 2014
Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Social Media Marketing when you have NO CLUE!: Youtube, Instagram, Pinterest, Twitter, Facebook (Beginner Internet Marketing Series 4)
Gundi Gabrielle - 2017
What is unique about each Social Media Platform?
We'll cover what is unique about each social media platform and how best to use them, so you don't post the same everywhere. You'll be able to decide which social networks are best suited for your particular business and brand and how to use all the unique features available.Tips for creating great graphical posts and how to research viral topics are discussed as well as a number of great training resources (both free and paid) to take your social media marketing to the next level. Interactive with many Videos and Outside Resources Social Media Marketing has become one of the most effective strategies to build your brand online, spread your message and attract new clients and customers.This book will help you take your social media game to the next level.
FREE Bonus Report: “Words that Sell”
The Psychology behind the 10 most Influential Words in the English Language and how you can use them to GrowYour Following and turn Readers into Buyers
Would You Like To Know More? Download now and start your Social Media Portfolio on a road to SuccessScroll to the top of the page and select the BUY button.
RHCE Red Hat Certified Engineer Linux Study Guide: Exam (RH302)
Michael Jang - 2002
100% complete coverage of all objectives for exam RH302 Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Real-world exercises modeled after hands-on exam scenarios Two complete lab-based exams simulate the format, tone, topics, and difficulty of the real exam Bonus content (available for download) includes installation screen review, basic instructions for using VMware and Xen as testbeds, and paper and pencil versions of the lab exams Covers all RH302 exam topics, including: Hardware installation and configuration The boot process Linux filesystem administration Package management and Kickstart User and group administration System administration tools Kernel services and configuration Apache and Squid Network file sharing services (NFS, FTP, and Samba) Domain Name System (DNS) E-mail (servers and clients) Extended Internet Services Daemon (xinetd), the Secure package, and DHCP The X Window System Firewalls, SELinux, and troubleshooting
Entrepreneurship: Theory/Process/Practice [With CDROM]
Donald F. Kuratko - 1994
Using exercises and case presentations, you can apply your own ideas and develop useful analytical skills. Cases found throughout the text present the venture creations or managerial ideas confronted by real-world companies.
Skip the Flip: Secrets the 1% Know About Real Estate Investing
Hayden Crabtree - 2020
Breakdown: The Inside Story of the Rise and Fall of Heenan Blaikie
Norman Bacal - 2017
When it collapsed in February 2014, lawyers across Canada and the business community were stunned. What went wrong? Why did so many lawyers run for the exit? How did it implode? What is it that holds professional partnerships together?This is the story of the rise and fall of a great company by the ultimate insider, Norman Bacal, who served as managing partner until a year before the firm's demise. Breakdown takes readers into the boardroom offices during the heady growth of a legal empire built from the ground up over 40 years. We see how after a change of leadership tensions erupted between the Toronto and Montreal offices, and between the hard-driving lawyers themselves. It is a story about the extraordinary fragility of the legal partnership, but it's also a classic business story, a cautionary tale of the perils of ignoring a firm's culture and vision.Normal0falsefalsefalseEN-USJAX-NONE<!--StartFragment--><!--EndFragment--><!--EndFragment-->
Professional ASP.NET MVC 5
Jon Galloway - 2013
Like previous versions, this guide shows you step-by-step techniques on using MVC to best advantage, with plenty of practical tutorials to illustrate the concepts. It covers controllers, views, and models; forms and HTML helpers; data annotation and validation; membership, authorization, and security.MVC 5, the latest version of MVC, adds sophisticated features such as single page applications, mobile optimization, and adaptive rendering A team of top Microsoft MVP experts, along with visionaries in the field, provide practical advice on basic and advanced MVC topics Covers controllers, views, models, forms, data annotations, authorization and security, Ajax, routing, ASP.NET web API, dependency injection, unit testing, real-world application, and much more Professional ASP.NET MVC 5 is the comprehensive resource you need to make the best use of the updated Model-View-Controller technology.