Hacking Leadership

Hacking Leadership

In this fifth installment of the Hack Learning Series, award-winning administrators Joe Sanfelippo and Tony Sinanis identify 10 problems with school leadership and provide right-now solutions for building a rich community, while brining fun ...

Author: Joe Sanfelippo

Publisher:

ISBN: 0998570524

Category: Education

Page: 160

View: 273

In Hacking Leadership, award-winning school administrators Joe Sanfelippo and Tony Sinanis demonstrate how to increase learning by leaving the office and engaging directly with all teachers and learners. They identify 10 problems with school leadership and provide right-now solutions for each, while showing you how to lead from the middle.
Categories: Education

Hacking Leadership

Hacking Leadership

" For the purposes of this book, all of the above apply.

Author: Mike Myatt

Publisher: John Wiley & Sons

ISBN: 9781118817414

Category: Business & Economics

Page: 208

View: 423

Hacking Leadership is Mike Myatt's latest leadership book written for leaders at every level. Leadership isn't broken, but how it's currently being practiced certainly is. Everyone has blind spots. The purpose of Hacking Leadership is to equip leaders at every level with an actionable framework to identify blind spots and close leadership gaps. The bulk of the book is based on actionable, topical leadership and management hacks to bridge eleven gaps every business needs to cross in order to create a culture of leadership: leadership, purpose, future, mediocrity, culture, talent, knowledge, innovation, expectation, complexity, and failure. Each chapter: Gives readers specific techniques to identify, understand, and most importantly, implement individual, team and organizational leadership hacks. Addresses blind spots and leverage points most leaders and managers haven’t thought about, which left unaddressed, will adversely impact growth, development, and performance. All leaders have blind-spots (gaps), which often go undetected for years or decades, and sadly, even when identified the methods for dealing with them are outdated and ineffective – they need to be hacked. Showcases case studies from the author’s consulting practice, serving as a confidant with more than 150 public company CEOs. Some of those corporate clients include: AT&T, Bank of America, Deloitte, EMC, Humana, IBM, JP Morgan Chase, Merrill Lynch, PepsiCo, and other leading global brands. Hacking Leadership offers a fresh perspective that makes it easy for leaders to create a roadmap to identify, refine, develop, and achieve their leadership potential--and to create a more effective business that is financially solvent and professionally desirable.
Categories: Business & Economics

Hacking Leadership

Hacking Leadership

A toxic work environment thrives off of everything great leadership stands in opposition to. The fuel for toxicity is conflict not resolution, ego not humility, self-interest not service above self, gossip and innuendo not truth, ...

Author: Mike Myatt

Publisher: John Wiley & Sons

ISBN: 9781118817353

Category: Business & Economics

Page: 208

View: 556

Hacking Leadership is Mike Myatt's latest leadership book written for leaders at every level. Leadership isn't broken, but how it's currently being practiced certainly is. Everyone has blind spots. The purpose of Hacking Leadership is to equip leaders at every level with an actionable framework to identify blind spots and close leadership gaps. The bulk of the book is based on actionable, topical leadership and management hacks to bridge eleven gaps every business needs to cross in order to create a culture of leadership: leadership, purpose, future, mediocrity, culture, talent, knowledge, innovation, expectation, complexity, and failure. Each chapter: Gives readers specific techniques to identify, understand, and most importantly, implement individual, team and organizational leadership hacks. Addresses blind spots and leverage points most leaders and managers haven’t thought about, which left unaddressed, will adversely impact growth, development, and performance. All leaders have blind-spots (gaps), which often go undetected for years or decades, and sadly, even when identified the methods for dealing with them are outdated and ineffective – they need to be hacked. Showcases case studies from the author’s consulting practice, serving as a confidant with more than 150 public company CEOs. Some of those corporate clients include: AT&T, Bank of America, Deloitte, EMC, Humana, IBM, JP Morgan Chase, Merrill Lynch, PepsiCo, and other leading global brands. Hacking Leadership offers a fresh perspective that makes it easy for leaders to create a roadmap to identify, refine, develop, and achieve their leadership potential--and to create a more effective business that is financially solvent and professionally desirable.
Categories: Business & Economics

Maintaining the Right Fellowship

Maintaining the Right Fellowship

In the Eastern District too , under Ray Hacker's leadership , John E. Fretz , and Marvin Rosenberger have been careful stewards of their growing collection , which was merged in 1967 with that of the Franconia Mennonite Historical ...

Author: John L. Ruth

Publisher: Wipf and Stock Publishers

ISBN: 9781725200036

Category: Religion

Page: 618

View: 696

Categories: Religion

Leadership Hacks

Leadership Hacks

hacking just means building something quickly or testing the boundaries of what can be done'. He added more around his belief that The Hacker Way is about continuous improvement and finding ways to get things done better and faster ...

Author: Scott Stein

Publisher: John Wiley & Sons

ISBN: 9780730359517

Category: Business & Economics

Page: 200

View: 534

A lifesaver for those drowning in the demands of leadership Leadership Hacks is the business leader’s guide to getting things done. Over the years, the leader’s role has expanded to encompass more duties, more responsibility and more accountability — yet we’re still stuck with the same 24 hours in every day. The evolving business environment leaves many of us struggling to achieve against constantly shifting priorities, competitors and deadlines, and we are forever expected to do more with less. Is it even possible to make a real impact? Yes! This book shows you how to sort through the madness and get back to getting results. Identify your major speed bumps, and let the action-focused discussion gives you practical workarounds that will streamline your day and help you make things happen. Covering hacks at personal, one-on-one, and team levels, this book is packed with tips, tricks and advice that will help you eliminate the distractions and harness technology; communicate effectively, delegate clearly and coach confidently; and make meetings and missions that matter for your team. You’ll achieve greater results, open the channels of communication and look like a rock star to those still struggling with the daily deluge. Identify what distractions slow you down Fast-track your productivity to do more in less time Streamline delegation so your people perform faster Re-route meetings into productive conversations Learn the communication and technology shortcuts that get faster results Leaders are recognised for their results, but judged by their impact. Don’t let yourself fall victim to ever-mounting demands. Leadership Hacks shows you how to hack your day, shift your approach, boost your communication and start making your way to the top.
Categories: Business & Economics

Secrets of a Cyber Security Architect

Secrets of a Cyber Security Architect

Hacking. “It's not policy, it's culture hacking.” Noopur Davis, to the author at McAfee Inc., 2014* Fortunately or unfortunately, ... any technical leadership role—is about culture and people, not about purely technical matters.

Author: Brook S. E. Schoenfield

Publisher: CRC Press

ISBN: 9781315352176

Category: Computers

Page: 222

View: 199

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
Categories: Computers

Restorative Practice Meets Social Justice

Restorative Practice Meets Social Justice

The framework of Hacking Leadership (Zoller & Issa Lahera, 2016) is used as a model to illustrate how to create new associations in existing relationships to build community. It is the people in the community who create solutions to the ...

Author: Anthony H. Normore

Publisher: IAP

ISBN: 9781681237299

Category: Education

Page: 235

View: 717

Restorative Practice Meets Social Justice: Un-silencing the Voices of “At-Promise” Student Populations is a collection of pragmatic urban school experiences that focus on restorative approaches situated in the context of social justice. By adopting this approach, researchers and practitioners can connect and extend long-established lines of conceptual and empirical inquiry aimed at improving school practices and thereby gain insights that may otherwise be overlooked or assumed. This holds great promise for generating, refining, and testing theories of restorative practices in educational leadership and will help strengthen already vibrant lines of inquiry on social justice. The authors posit that a broader conceptualization of social and restorative justice adds to extant discourse about students who not only experience various types of daily oppression in US schools but also regularly live on the fringes of society. Chapters are written by a combination of researchers and practicing school leaders who believe in the power of healing and restoring relationships within school communities as opposed to traditional punitive structures. The dynamic approaches discussed throughout the book urge school leaders, teachers, school community members, and those who prepare administrators to look within and build bridges between themselves and the communities in which they serve.
Categories: Education

Crossing the Bridge of the Digital Divide

Crossing the Bridge of the Digital Divide

Hacking Leadership” Overview “Hacking Leadership” is our iterative framework for implementation of the process of identifying issues and designing possible “hacks” (solutions). Figure 1 is a graphic representation of the model.

Author: Anthony H. Normore

Publisher: IAP

ISBN: 9781641133920

Category: Technology & Engineering

Page: 263

View: 378

Crossing the Bridge of the Digital Divide: A Walk with Global Leaders explores the combined effect of the rapid growth of information as an increasingly fragmented information base, a large component of which is available only to people with money and/or acceptable institutional affiliations. In the recent past, the outcome of these challenges has been characterized as the "digital divide" between the information “haves” and “have nots” along racial and socio economic lines that seem to widen as time passes. To address the issues of digital equity and digital inequality in an effort to bridge the digital divide, educational scholars, researchers and practitioners are in positions to ensure equitable opportunities are made available for people of all ages, races, ability, sexual orientation, and ethnicity in support of social justice for bridging the digital divide. The digital divide addresses issues concerning equal opportunity, equity and access that have an effect on the development of marginalized and otherwise disenfranchised populations within and across systems nationally and internationally. The contributing authors- representing Unites States, Canada, South Africa, New Zealand, and the UK - posit that education institutions can serve as the bridge to close the digital divide for students who do not have access to information technology in their homes. At a time when more computers are made available in schools than ever before, the digital divide continues to widen and fewer people in the lowest SES groups are given the opportunity to join the world of computer technology and the internet. As a result, the influence of leadership activity on institutional racism, gender discrimination, inequality of opportunity, inequity of educational processes, digital exclusion, and justice have gained currency and attention. The contributing national and international authors examine the digital divide in terms of social justice leadership, equity and access. It is within this context that the authors offer discussions from a lens of their choice, i.e. conceptual, review of literature, epistemological, etc. By adopting an educational approach to bridging the digital divide, researchers and practitioners can connect and extend long established lines of conceptual and empirical inquiry aimed at improving organizational practices and thereby gain insights that might be otherwise overlooked, or assumed. This holds great promise for generating, refining, and testing theories of leadership for equity and access, and helps strengthen already vibrant lines of inquiry on social justice.
Categories: Technology & Engineering

Congressional Record

Congressional Record

... coming forcommunications networks that will go over the top . ward as a result of the leadership by nect our BlackBerrys and our phones . ... LINS and Senator MCCAIN , who was on result of the very hacking that threatCyber ...

Author: United States. Congress

Publisher:

ISBN: OSU:32437123600039

Category: Law

Page:

View: 662

Categories: Law

Maturity and Modernity

Maturity and Modernity

... R. (1983) Political Leadership and Nihilism, Tampa, Fla. ... Hacking, I. (1982) 'Language, Truth and Reason', in M. Hollis and S. Lukes (eds) Rationality and Relativism, Oxford: Basil Blackwell, pp. 48—66.

Author: David Owen

Publisher: Routledge

ISBN: 9781135083007

Category: Social Science

Page: 272

View: 306

Maturity and Modernity is the first book to analyze Nietzsche, Weber and Foucault as a tradition of theorising and to chart the development of genealogy as a mode of critique. It provides clear accounts of the main ideas of Nietzsche, Weber and Foucault (as well as a useful Glossary) and illustrates the relations between these thinkers at methodological, substantive and politcal levels.
Categories: Social Science