If Strategy Is So Important, Why Don’t We Make Time for It?
Almost every leader wants to make more time for strategic thinking. In one survey of 10,000 senior leaders, 97% of them said that being strategic was the leadership behavior most important to their organization’s success.
And yet in another study, a full 96% of the leaders surveyed said they lacked the time for strategic thinking. Of course, we’re all oppressed with meetings and overwhelmed with emails (an average of 126 per day, according to a Radicati Group analysis).
^ADJ: Time, we all need more of it - making the most of what we have is an art, over the weekend read: A World Without Email by Cal Newport. Whilst I am not suggesting anything as radical as banning email, the book has lots of useful ideas as to how we can re-imagine work, how we can get more focus time and perhaps how we shift our culture of being busy. I think its time for a new conversation around expectations, how we manage projects and how we communicate with each other, with the goal of doing more in less time.
We owe it to ourselves to look at our own productivity, where do we really make a difference and where do we spend our time. I remember being challenged (in a good way) about the work that I like to do, versus the work that I should be doing and that I needed to show leadership in this area, not just talk about it.
Startups, It’s Time to Think Like Camels — Not Unicorns
The world has changed. In the wake of Covid-19, and the global recession it has caused, business leaders, innovators, entrepreneurs, and investors are all girding for a long period of extremely challenging conditions in the global market. How can startups and innovators of all stripes survive in such conditions? Many are not prepared.
The Secret to Becoming a Market Leader
The best-kept secret about strategy is that you are in control. You get to choose the game you want to play and how you might win it. Further, you can choose to lead on a variety of dimensions – market share, innovation, product quality, or customer service. You can tip the odds of success in your favor with these decisions.
A Deeper Dive into Semiconductor Foundries - Deep into the Forest
In this week’s issue, we will dive deeper into the construction of a foundry and learn about the actual physical edifice itself. Semiconductor foundries are large factories that place considerable burden on the surrounding community and infrastructure. We will learn more about locations that can support a foundry, the noise and architectural considerations needed, and analyze some trends for the future of semiconductor manufacturing.
China's Secret War for U.S. Data Blew American Spies' Cover
Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Chinese operatives began in some cases as soon as the CIA officers had cleared passport control. Sometimes, the surveillance was so overt that U.S. intelligence officials speculated that the Chinese wanted the U.S. side to know they had identified the CIA operatives, disrupting their missions; other times, however, it was much more subtle and only detected through U.S. spy agencies’ own sophisticated technical countersurveillance capabilities.
How Should the U.S. Respond to the SolarWinds and Microsoft Exchange Hacks? - Lawfare
Over the past two months, news has broken that Russia and China, the United States’s two primary geopolitical adversaries, have both executed major cyber operations against the networks of American companies and government agencies. On their faces, the two attacks share much in common. At least at this early stage, both appear to have been espionage operations designed to give foreign intelligence agencies access to sensitive targets and to steal emails, documents and other data that would be of value to the Russian and Chinese governments. Both attacks were far reaching, affecting tens of thousands of American networks and testing the limits of U.S cyber defense capabilities and the country’s broader cybersecurity strategy.
^ADJ: interesting perspective on this ongoing issue, and the approach taken.