Innovation is a lonely business. Innovators inside corporates face the risk of failure and misunderstanding, in their attempt to forge disruptive strategies.
But with the rate of change that technology has enabled, the bigger risk is NOT to innovate.
So the IAB Singapore Innovation Committee created this handy little guide to make innovation be a slightly less lonely proposition.
Please feel free to share and use in your own presentations, just remember to give IAB props!
As a Product Manager, you’re responsible for delivering products and features that both delight customers and move the company closer to its top-line metrics. However, how do you know whether the individual features you ship each sprint or each quarter are successful? So much about becoming a successful Product Manager is about leadership! And to be a leader you must learn how to be empathetic, a great communicator, and a decisive figure. Join us for this session to learn what other skills are required for bringing your team together and working towards success.
SAFe Meetup Stockholm Dec 19 2017 - My SAFe journey at ElektaMikael Broomé
I was invited to the SAFe Meetup in Stockholm to share my experiences from applying SAFe at Med Tech provider Elekta. I described challenges on timeline predictability when having around 300 people and 30 teams collaborating on same solution (HW&SW in regulatory environment). Specifically I explained how several unfortunate behaviours reinforced each other into a large invisible “Vicious Circle”. Several examples of actions on how to break it and improve the situation were also given.
Growing your business, making money, and increasing your employee base are all great business goals. But how do you achieve them? Where do you start? Follow these 4 steps to create the map that will help you attain your goals.
Myth & Fact Of SICER
Agile SICER Framework is a Silver Bullet for Agile Transformation :-
I wish this is True - but it isn't. You can fail just as spectacularly on an Agile transformation project if we don’t follow the principles. But here You'll fail faster as you will be using Agile (due to the transparency and visibility it brings) but unfortunately it's not a silver bullet or an excuse to stop thinking.
As a Product Manager, you’re responsible for delivering products and features that both delight customers and move the company closer to its top-line metrics. However, how do you know whether the individual features you ship each sprint or each quarter are successful? So much about becoming a successful Product Manager is about leadership! And to be a leader you must learn how to be empathetic, a great communicator, and a decisive figure. Join us for this session to learn what other skills are required for bringing your team together and working towards success.
SAFe Meetup Stockholm Dec 19 2017 - My SAFe journey at ElektaMikael Broomé
I was invited to the SAFe Meetup in Stockholm to share my experiences from applying SAFe at Med Tech provider Elekta. I described challenges on timeline predictability when having around 300 people and 30 teams collaborating on same solution (HW&SW in regulatory environment). Specifically I explained how several unfortunate behaviours reinforced each other into a large invisible “Vicious Circle”. Several examples of actions on how to break it and improve the situation were also given.
Growing your business, making money, and increasing your employee base are all great business goals. But how do you achieve them? Where do you start? Follow these 4 steps to create the map that will help you attain your goals.
Myth & Fact Of SICER
Agile SICER Framework is a Silver Bullet for Agile Transformation :-
I wish this is True - but it isn't. You can fail just as spectacularly on an Agile transformation project if we don’t follow the principles. But here You'll fail faster as you will be using Agile (due to the transparency and visibility it brings) but unfortunately it's not a silver bullet or an excuse to stop thinking.
Strategy to Execution: Tips to Execute Your Strategy With Excellence.Avi Mizrahi, MBA, BBA.
Strategy is sexy. Execution is really difficult. Perhaps that's why so many strategic initiatives fail. I believe that transitioning from strategy to execution is the biggest challenge facing today's organizations. Execution is a leader's job and this presentation will lay out a practical approach to ensure your strategy is executed with excellence.
9 Keys to Increasing Competitiveness through LeanVative
If you've been thinking about introducing Lean but aren't sure where to start, then this eBook is for you. And if you've attempted to introduce Lean, this book will help you assess what may be done better to ensure a smooth and profitable implementation.
How to get the most from an Innovation Programme in Your OrganisationBradley Pallister
Being innovative is not a skill that's easily learned.
In fact, companies big and small often struggle with encouraging innovation in their workplaces
Does that sound familiar to you?
If so, then an innovation programme may be all that lies between your company's struggles and a future that's filled with innovation and amazing new product launches.
Why an agile, distributed organisation makes sense and how to build it.
- Change is the NEW NORMAL
- How to change
- „Check & action“ over „See & mend“
- Remote is not distributed (a warning)
- Action recommendations
Regional innovation program operating model strawman v1Eric Tachibana
This document is a Request for Comment.
By way of background, the document came about as I was preparing to teach a course on “Organizing for Innovation” in an MBA class called “Technological Innovation.”
As I was reading through the material, it occurred to me that I was having a hard time finding practical advice on how one would realistically setup a holistic Innovation Program. There was lots of, “best practice advice”, but little concrete models.
In the field, I’d seen several companies try to roll out Innovation Programs, but because they only focused on one small part (such as Ideation), the programs ultimately failed to deliver real business results. My hypothesis was that you cannot run a Corporate Entrepreneurship program piecemeal, it needs to be holistic.
So the basic question is: Suppose you had to build the ideal holistic innovation program from the ground up for a large company / MNC. At some point, you would need to define a tangible operating model with specific streams of work against which, you would staff actual people. The Operating Model would need to cover the scope of the functions and a set of activities to deliver against goals over Period X. So what would the Operating Model look like?
This deck is a strawman.
PS: I also happen to be in Asia Pacific, so my context is a regional organization in a global MNC.
Becoming agile with Peapod Labs Sr. Product OwnerPromotable
What is Agile and what does it have to do with Product Management? We always hear companies use jargon like Agile. We know it's important, however many people don't understand what it is, when or why to use it and how to get started implementing Agile into your company's processes.
Takeways:
What is Agile? A mindset, not just a process
How to get started?
Development Cycle: From Project to Backlog
Agile Product Development Live cycle
Building an Agile Mindset into a Company’s Transformation.
About the Instructor: Rodrigue Carneiro is a Senior Product Manager at Peapod Digital Labs. He was previously a Sr. Product Manager at Ahold Delhaize, a large European company with a total of 21 brands with 6500 stores. Including Peapod Digital Labs, Food Lion, and Giant grocery stores.
Developing Leaders Who Thrive Amidst DisruptionTalentView
This global pandemic situation is truly a test of leadership. Our ways of working are rapidly changing. So how do you ensure that your leaders are equipped and empowered to thrive amidst disruption?
Specifically:
- What adjustments are people leaders making to their learning and development strategies?
- Which competencies are emerging as critical for team productivity and business continuity?
- How do we adapt our team’s learning journey with current business priorities?
I am a big fan of Kotter’s, 8-Step Process for Leading Change. I have seen it applied, and the system works. It should be a must read for anyone who has, or will, experience some sort of (work) change.
This presentation outlines the 8-steps and key points in the process.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Strategy to Execution: Tips to Execute Your Strategy With Excellence.Avi Mizrahi, MBA, BBA.
Strategy is sexy. Execution is really difficult. Perhaps that's why so many strategic initiatives fail. I believe that transitioning from strategy to execution is the biggest challenge facing today's organizations. Execution is a leader's job and this presentation will lay out a practical approach to ensure your strategy is executed with excellence.
9 Keys to Increasing Competitiveness through LeanVative
If you've been thinking about introducing Lean but aren't sure where to start, then this eBook is for you. And if you've attempted to introduce Lean, this book will help you assess what may be done better to ensure a smooth and profitable implementation.
How to get the most from an Innovation Programme in Your OrganisationBradley Pallister
Being innovative is not a skill that's easily learned.
In fact, companies big and small often struggle with encouraging innovation in their workplaces
Does that sound familiar to you?
If so, then an innovation programme may be all that lies between your company's struggles and a future that's filled with innovation and amazing new product launches.
Why an agile, distributed organisation makes sense and how to build it.
- Change is the NEW NORMAL
- How to change
- „Check & action“ over „See & mend“
- Remote is not distributed (a warning)
- Action recommendations
Regional innovation program operating model strawman v1Eric Tachibana
This document is a Request for Comment.
By way of background, the document came about as I was preparing to teach a course on “Organizing for Innovation” in an MBA class called “Technological Innovation.”
As I was reading through the material, it occurred to me that I was having a hard time finding practical advice on how one would realistically setup a holistic Innovation Program. There was lots of, “best practice advice”, but little concrete models.
In the field, I’d seen several companies try to roll out Innovation Programs, but because they only focused on one small part (such as Ideation), the programs ultimately failed to deliver real business results. My hypothesis was that you cannot run a Corporate Entrepreneurship program piecemeal, it needs to be holistic.
So the basic question is: Suppose you had to build the ideal holistic innovation program from the ground up for a large company / MNC. At some point, you would need to define a tangible operating model with specific streams of work against which, you would staff actual people. The Operating Model would need to cover the scope of the functions and a set of activities to deliver against goals over Period X. So what would the Operating Model look like?
This deck is a strawman.
PS: I also happen to be in Asia Pacific, so my context is a regional organization in a global MNC.
Becoming agile with Peapod Labs Sr. Product OwnerPromotable
What is Agile and what does it have to do with Product Management? We always hear companies use jargon like Agile. We know it's important, however many people don't understand what it is, when or why to use it and how to get started implementing Agile into your company's processes.
Takeways:
What is Agile? A mindset, not just a process
How to get started?
Development Cycle: From Project to Backlog
Agile Product Development Live cycle
Building an Agile Mindset into a Company’s Transformation.
About the Instructor: Rodrigue Carneiro is a Senior Product Manager at Peapod Digital Labs. He was previously a Sr. Product Manager at Ahold Delhaize, a large European company with a total of 21 brands with 6500 stores. Including Peapod Digital Labs, Food Lion, and Giant grocery stores.
Developing Leaders Who Thrive Amidst DisruptionTalentView
This global pandemic situation is truly a test of leadership. Our ways of working are rapidly changing. So how do you ensure that your leaders are equipped and empowered to thrive amidst disruption?
Specifically:
- What adjustments are people leaders making to their learning and development strategies?
- Which competencies are emerging as critical for team productivity and business continuity?
- How do we adapt our team’s learning journey with current business priorities?
I am a big fan of Kotter’s, 8-Step Process for Leading Change. I have seen it applied, and the system works. It should be a must read for anyone who has, or will, experience some sort of (work) change.
This presentation outlines the 8-steps and key points in the process.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
17. Structure Tip #4:
Build a rapid process to evaluate
learning, decide
go/ no-go, and move on
to the next iteration.
Google X does this daily.
18. Structure Tip #5:
Set clear criteria and
process to transition an
idea from the
Innovation track into a
Business As Usual
activity.
19. “FAILURE IS NOT FAILING.
FAILURE IS FAILING TO TRY.”
MARK WEBBER
20. With thanks to the members of the
IAB Singapore Innovation
Committee
Keith Timimi
Evelina Lye
Sergio Salvador
Balaji Ramanujam
Simon Kearney
Aaron Jackson
Gloria Mathis
Gerard Lechau
Fletcher Khoo
Carl Griffith
Miranda Dimopoulos
Tobias Wilson
VML Qais [Chair]
Sapient [Vice Chair]
Google
Potential Unlimited
Click2View
Effective Measure
R/GA
Outbrain
Adz Central
Havas Worldwide
Executive Director, IAB
@accomplice [Leadership Council Liaison]