18. Name the Toxic Leader CEO, Energy Firm: Convicted of fraud, conspiracy and lying to banks CEO, Telecommunications Firm: Sentenced to 25 years for $11 billion accounting fraud CEO, Wall Street Giant: Playing at Bridge Tournament while firm on verge of bankruptcy James Cayne, Bear Stearns Kenneth Lay, Enron Bernie Ebbers, WorldCom
19. Name the Toxic Leader CEO, Financial Services Firm: Being sued for company bankruptcy and securities fraud CEO, Mortgage Firm: Charged with securities fraud and insider trading Richard Fuld, Lehman Brothers Angelo Mozilo, Countrywide Wall Street Genius: Led decades long $65 billion Ponzi scheme Bernard L. Madoff , Bernard L. Madoff Investment Securities LLC
39. “ Good to Great” “ It’s going to be a tough ride, a very demanding trip… Now’s the time to get off the bus… No questions asked, no recriminations… [ We need ] the right people on the bus, in the right seats.” - Excerpt from Good to Great, by author Jim Collins
40.
41. How To Survive The Crisis? “ People, People, People make the difference!” - M. Lewis Temares
42.
43. To Achieve Winning Results… … requires additional effort from teams AND from each individual team member.
69. Three Realms of Social Software Source: Gartner Symposium 2009 Social Software in the Workplace Externally Facing Social Software Public Social Media Your people, your place. Your people, other people, your place. Your people, other people, their place. Blogtronix, Google, IBM, Novell Liveworld, ONEsite, Pluck, ThePort Network Facebook, Linkedin, MySpace, Twitter, YouTube
70. Loyalty Hierarchy of Needs Relevancy Building: • Data Collecting • Understanding • Alignment • Communicating • Optimizing Achieve Loyalty by Becoming Increasingly Relevant. Source: Gartner Symposium 2009
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85. Questions & Answers Dr. M. Lewis Temares Vice President and CIO, Information Technology Dean Emeritus, College of Engineering University of Miami [email_address] Executive Information & Technology Institute www.UMeiti.com
Hinweis der Redaktion
Source: Krugman, Paul, the Return of Depression Economics and the Crisis of 2008, W.W. Norton, 2009.
Source: Jim Collins’ book GOOD TO GREAT: WHY SOME COMPANIES MAKE THE LEAP... AND OTHERS DON'T
Especially in economically and politically turbulent times, people make the difference between failure and success. They are flexible, learn on the fly, produce innovative solutions than machines designed to do a set tasks: routers,
Project teams require specialist process skills; star business performers may not be the best resource for staffing. From Gartner Three Examples of Business Process Management Worst Practices and How to Avoid Them 3 December 2007 Elise Olding We describe common pitfalls to watch out for when executing business process management projects, and offer tips for getting it right the first time.
Reference for last bullet statistic: Gartner Symposium ITxpo 2009
In their recent book, Connecting to the Net.Generation: What Higher Education Professionals Need to Know About Today's Students , Reynold Junco and Jeanna Mastrodicasa [17] (March 2007) found that in a survey of 7,705 college students in the US Educause reference for first bullet 18-29 More people get political news from John Stewart/John Cobert than on CNN
"The real difficulty in changing any enterprise lies not in developing new ideas, but in escaping from the old ones." --John Maynard Keynes
Gartner Symposim ITexpo 2009 stats
Gartner Symposim ITexpo 2009 stats Info: Representational state transfer ( REST ) is a style of software architecture for distributed hypermedia systems such as the World Wide Web . The term Representational State Transfer (REST) was introduced and defined in 2000 by Roy Fielding [1] [2] in his doctoral dissertation. Fielding is one of the principal authors of the Hypertext Transfer Protocol (HTTP) specification versions 1.0 and 1.1. Conforming to the REST constraints is often referred to as being ‘RESTful’
With increased adoption of Web-based applications come new business and security risks that go far beyond potential productivity losses. Yet most companies have outdated IT infrastructure and usage policies that may fail to protect them from these growing risks. (The Application Usage and Risk Report (Fall Edition, 2009) from Palo Alto Networks summarizes traffic patterns on more than 200 networks worldwide to reveal that the use of social networking and collaborative applications for business purposes has skyrocketed in the last six month period.
Lew leadership quotes… The more you sweat in training, the less you bleed in war. The more you plan in the beginning, the less you work at the end/later. ---------------------------- Lew forward social media and security issues article from Computerworld Business use of Twitter, Facebook exploding Study warns that companies should watch out for related security and productivity issues By Sharon Gaudin November 9, 2009 03:11 PM ET Computerworld - The use of social networking sites like Twitter and Facebook to promote businesses has exploded over the past six months, according to the results of a study that were released today. People using Twitter to get the word out about their company, sales and promotions jumped more than 250% from this past spring, according to a study done by Palo Alto Networks, a maker of firewall technology. The number of companies using facebook for such tasks grew by 192%, the sudy found. The report said that workers are using social networks as promotional vehicles both with and without management knowledge. The company said the report summarizes traffic assessments in more than 200 financial services, manufacturing, healthcare, government, retail, and education organizations worldwide that were performed between March and September 2009 Palo Alto Networks said it is using the results to warn businesses that the increased use of social networking sites and Web-based applications may leave them open to security problems. "We know that workers are using these applications to help them get their jobs done, with or without approval from their IT departments. And now we know this is happening much faster than anticipated," said Rene Bonvanie, Palo Alto Networks vice president of worldwide marketing, in a statement. "It's naive to think that old-school security practices can handle this deluge. Organizations must realize that banning or allowing specific applications in a black-and-white fashion is bad for business. They need a new approach that allows for shades of gray by enforcing appropriate application usage policies tailored for their workforce." Use of Twitter and Facebook both for business and personal use has definitely have been on a significant upswing over the past year-plus. Just last month, Experian Hitwise, an Internet monitoring firm, reported that visits to Twitter , the fourth most popular social networking site, increased by 1,170% in September compared to the year-earlier period. In the same time frame, market leader Facebook saw its already impressive market share increase by 194%, letting it easily maintain its recently attained place atop the U.S. social networking market . Facebook, which grabbed its 300 millionth user in September, captured 58.59% of all U.S. social network visits last month, compared to 19.94% the year before. But while the two social networking sites have been dramatic upswings in usage, companies have been moving to cut off access to them in the workplace. Early in October, a study commissioned by Robert Half Technology, an IT staffing firm, 54% of U.S. companies say that they have banned workers from using social networking sites like Twitter, Facebook, LinkedIn and MySpace while on the job. The study also found that 19% of companies allow social networking use only for business purposes, while 16% allow limited personal use. And executives may have good reason to ban employees from using the social networking sites during business hours. This summer, Nucleus Research, an IT research company, reported that companies that allow users to access Facebook in the workplace lose an average of 1.5% in total employee productivity.