Why waste voice in the wilderness!; Standing the test of a test; Make e-biz click, with essentials; Of what moves mind, and matter

Books2Byte – September 2003

Why waste voice in the wilderness!

D. Murali

Marketers need to make sure they are seen and heard. Here’s more on how one connects brands with consumers.


WHEN consumer attitudes change too fast, media costs spiral and there is a stiff resistance to marketing messages, how can your brand cut through in the communications landscape of the day, “where technology has exploded media channels and choices”? Mark Austin and Jim Aitchison provide `a 21st century blueprint for connecting brands and consumers holistically’ in their book “Is Anybody out there?” – to show brand owners how they can harness `millions of permutations of marketing disciplines and communications channels’. A sampler:

  • Armed with the ultimate consumer weapon – the TV remote control – audiences could wage war against big boring brand messages. A zapper combined with PC technology and hard drives can pause a `live’ TV programme so that you can eat dinner or go to the bathroom. You can fast forward thirty seconds and skip the commercial. Unless that commercial is so good that people want to watch it, it simply won’t be watched.
  • When marketers get it right and get under their radar, they can unleash a tidal storm of interconnectivity. Entertainment confers viral status on brand messages. “New media”, encompassing guerrilla marketing, viral marketing, buzz, street and womb marketing, work as catalysts to influence youth. As part of an idea currency, passed on and exchanged incessantly, they can deflect purchasing intentions, change the geographical footprint of a subject’s movement through a retail environment, alter seemingly repetitive purchasing behaviour, and increase frequency of purchase.
  • The Apple 1984 commercial is generally ranked the best TV commercial ever made in the US. It launched the Apple Mac and only ran once – in the 1984 Super Bowl telecast, a programme that historically attracts over half of all American homes. It was a huge idea, inspired by George Orwell’s novel. The commercial has stood as a beacon of bravery, creativity and innovation both in terms of the creative execution and the bold, unprecedented media strategy.
  • In Asia, incessant mobile phone calls today have reached epidemic proportions. Outwardly mild-mannered people think nothing of having loud conversations in cinemas, or disrupting meetings, plays and church services to take calls. Pre-concert announcements, in-flight messages and signs in hospital wards have failed to stop them. SMS as a new form of brand communications has already scored heavily in terms of irritation. Unwanted, irrelevant messages are sent to subscribers.
  • The sooner the agency commission system is abolished, the better. One factor that might act as a catalyst is when all media is bought online and the costs of service are based on a cost-per-transaction model. Were media to be bought online, vast media-buying empires would be aligned to do business with vast media-owning empires. On an operational level, one bank of computers would interact with another bank of computers.

Are you still out there?

No option but to Web


WEB services would be adopted not because of the desire to implement new technology, but because of its ability to deliver strategic business value. That is what Eric A. Marks and Mark J. Werrell argue in “Executive’s Guide to Web Services”, a book that untangles “the maze of standards, concepts, and terminology that blur Web services.” The blurb recapitulates how after the false promises and financial burden of the dotcom boom and bust, “many executives are understandably gun shy about new technology.” But, this time, “IT vendors have hit the mark, delivering tools that do not claim to reinvent the practice of business, but simply make it smoother, quicker and more efficient.” Read on:

  • The catalyst for Web services is agreement on the adoption of three fundamental standards for communicating between computer systems: TCP/IP, HTTP and XML. Much as the Internet broke the communication and information bottleneck for information consumers of the client-server computing model, Web services will break the communication and information bottleneck for business enterprises.
  • The services description layer is where WSDL – often pronounced “whiz-dull” – is used as a common XML framework for describing a Web service. A WSDL document describes a set of messages in terms of what they contain and how they are exchanged. WSDL file defines all the information required to invoke a Web service.
  • As collaborative Web service transactions become more complex, they will gain longevity. Long-running transactions that persist indefinitely will eventually become common. In this environment, once a complex set of transactions has been started, it will be necessary to know the success or failure of a number of related transactions to determine the overall success or failure status.
  • Web services are compelling for exchanges because they offer a low-cost, standards-based approach for integration of the systems necessary to exchange commerce transactions electronically in an exchange or online market. Previously, integration with exchanges demanded expensive interfaces via EDI, EAI, or other means.

The cost of integration to exchanges was often beyond the budget of smaller vendors, who often still rely on fax and phone channels of communication for orders, forecast sharing, and other related information.

  • Web services can be used to implement an SOA (service-oriented architecture). There are four primary characteristics of an SOA that differentiate it from previous architectural paradigms: interoperability, coarse grained, loosely coupled, and dynamically discoverable.

Do yourself a service – of getting introduced to Web services.

Secure knowledge


PROBLEMS, controls and auditors – all these go together. And if you are an audit professional, IS manager or a member of the audit committee, you would in all probability be called upon to assess the organisation’s information infrastructure. The second edition of Jack J.Champlain’s “Auditing Information Systems” packs between its covers scores of case studies, while dealing with an appropriate audit approach, security certifications, computer forensics, e-commerce, Net security, privacy laws, and IS project management. A few excerpts:

  • Information systems security standards are minimum criteria, rules and procedures established by senior management that must be implemented to help ensure the achievement of the IS security policy.
  • Despite their advantages over conventional key locks, electronic access badge locks can sometimes be circumvented with relative ease. Often overlooked is the fact that many doors to rooms housing computer equipment have both an electronic access badge lock and a conventional key lock. Persons holding the keys can simply unlock the door manually and walk in, thus avoiding the audit trail that is available with the electronic badge system.
  • A freeware program called L0PHTCRACK (zero, not oh), which has been around for several years, can extract the file containing the user Ids and passwords of Windows NT file servers and use brute force to determine many of them, especially the weak ones. The target files on NT operating systems are known as SAM files.
  • Applications exist that enable system security administrators to prevent users from accessing specifically named URLs. Such applications can create logs of URLs that have been accessed. The most frequently-visited URLs can be identified and the percentage of time users spend accessing non-work-related URLs can be approximated.
  • Microsoft is researching password technology whereby users click on a number of points within a screen of images. The points correspond to pixels, which are then converted into a random number that is stored in the computer.

Users only have to remember where on the images they clicked and in what sequence. They will essentially be creating a 20-or more character password without having to remember it.

Useful reference book with a lot of horror stories.

Books courtesy: Wiley http://www.wiley.com

Wednesday, Sep 03, 2003



Standing the test of a test

D. Murali

Good software is not the one that is proved okay by use, but one that has been made in such a way that it can be tested.


FAITH healing has no place in modern medicine. Ditto with untested software in business. And the second edition of “Software Testing Techniques” by Boris Beizer explicitly addresses the idea that “design for testability” is as important as testing itself is. It includes a new “taxonomy for bugs” containing bug statistics published to date. Read on:

  • Bugs are difficult to categorise. For instance, a one-character error in a source statement changes the statement, but unfortunately it passes syntax checking. If the bug is in our own program, we’re tempted to blame it on typewriting; if in another programmer’s code, on carelessness.
  • Nice domains are simply connected; that is, they are in one piece rather than pieces all over the place interspersed with other domains. Simple connectivity is a weaker requirement than convexity; if a domain is convex it is simply connected, but not vice versa. The smart strategy would be to do case logic first and let defaults fall through.
  • A useful metric should satisfy several requirements: (a) it can be calculated, uniquely, for all programs to which we apply it; (b) it need not be calculated for programs that change size dynamically or programs that in principle cannot be debugged; (c) adding something to a program (e.g. instructions, storage, processing time) can never decrease the measured complexity. The first requirement ensures a usable, objective, measure; the second says that we won’t try to apply it to unreasonable programs; and the third is formalised common sense. It’s another way of saying that the program is at least as complicated as any of its parts.
  • An unreachable state is one that no input sequence can reach. It is not impossible, just as unreachable code is not impossible. Unreachable states can come about from previously “impossible” states. A dead state is one that once entered cannot be left. This is not necessarily a bug, but it is suspicious. Legitimate dead states are rare. In normal software, if it’s not possible to get from one state to another, there’s reason for concern.
  • Testing is tool-intensive and will become more so as time goes on. Almost all current research in test techniques leads to methods that cannot be implemented by hand except by the most dedicated or desperate testers. There is a sharp trichotomy between private, commercial, and research tools. Some of the best tools are unpublished and likely to remain so.

A book to test out.

Bit by bit

If you want to begin from the beginning with IT, take a look at A. Jaiswal’s “Fundamentals of Computers and Information Technology”. The book starts with an overview of the subject, and goes on to cover CPU architecture, I/O devices, storage, software, virus, communication, network, OS, SQL and so on. A few building blocks:

  • The most intriguing output device is the robot. Most robots are not the way you may imagine; they have little resemblance to R2D2 of Star Wars. Most robotic devices consist of a single arm that can perform a pre-programmed task. Robotic devices are frequently used in manufacturing for tasks such as spray painting or assembling parts. Advanced robotic devices are used in scientific research, and undersea exploration.
  • A virus that has its own functions and uses them instead of the BIOS/DOS functions, cannot be detected by hooking interrupt vectors, simply because it does not use them. For instance, the Anthrax virus called instructions such as call, jump and so on, directly. With a bit of extra work, all partitions, and boot-sector viruses can easily adopt such an evasive strategy.
  • A network data model has a directed graph (or digraph) as its underlying structure. Digraph resembles a tree, but with a significant difference: there is not always a unique path between any two nodes. This feature makes a digraph more versatile than a tree. Not only can each parent have many children, each child can have any number of parents too.
  • When a program is submitted to the CPU, it may be in one of the three states: running, ready, or blocked (wait). A process is running when a processor is executing its instruction sequence. A process is ready if all conditions are satisfied for the process to be in the running state and it is waiting for a processor. A process is blocked when it is waiting for an event to occur before continuing execution.
  • Information superhighway is a network of networks that is fully scalable, with no central controlling entity, and does not determine the user’s profile.

Ride the highway with the right baggage – that includes a primer like this.

Talk the walk


What is beyond passwords and PINs, ID cards, keys and tokens? Biometrics, the science of recognising people by physical characteristics or personal traits, says “Biometrics: The Ultimate Reference” by John D. Woodward, Nicholoas M. Orlans and Peter T. Higgins. Pegged as the `identity assurance in the information age’ the book covers varied fields such as facial thermography, voice and finger printing, iris and retinal scan, hand geometry, vein patterns, keystroke dynamics and so on. A selection:

  • With the introduction of password hashing and other techniques for obscuring a password cryptographically, a different technique emerged: the offline attack. These attacks take a copy of a cryptographically protected password and use a computer to try to `crack’ it. An offline attack may succeed in two cases: when cracking small passwords and when using a dictionary attack.
  • Every hand is unique. Hand geometry scanners take measurements of the length, width, thickness, and surface area of the hand and four fingers. These features are distinctive enough to permit verification of a claimed identity; however, they are not enough for an identification search. The technology uses a 32,000 pixel CCD digital camera to record the hand’s three-dimensional shape from silhouetted images projected within the scanner.
  • Sweat pores are responsible for latent fingerprints. Location and densities of the minute sweat pores have been found to contain information helpful for distinguishing individuals.
  • Algorithm testing is concerned with understanding and comparing software techniques for acquiring, processing, and comparing biometric data. Scenario testing is concerned with the integration of biometric systems into existing business processes and real-world human transactions. Vulnerability tests have the goal of understanding how systems can be defeated or how they fail on their own.
  • William Shakespeare told us all we need to know about an esoteric biometric. In The Tempest, Ceres shouts, “Great Juno comes; I know her by her gait.” The theory behind gait biometrics is this: just as each person has a distinctive voice or fingerprint, each person also has a distinctive walk. The trick lies in translating body motion into numbers that a computer can meaningfully recognise. A person’s gait derives from his or her physical build and body weight, but it is also affected or altered by factors including shoe type, heel height, clothing, illness, injury, emotional state, environment and so forth.

A book that walks all over you!

Books courtesy: Wiley Dreamtech India P Ltd.www.wileydreamtech.com

Wednesday, Sep 10, 2003



Make e-biz click, with essentials

D. Murali

If you want to start an e-business, but are confused, here’s some help on the fundamentals to keep in mind. Only then can one e-volutionise business.


YOU want to be able to sell products or services on the Net. You want better electronic B2B communication. You know that there is a great deal of help, advice, guidance, free or subsidised consultancy. You feel a lot of this is partial, useless or wrong. You find it tough to know where to start. If this is `you’, Bruce Durie has the book to give you enough information to make an informed choice. “e-Business Essentials” from Vision Books discusses the “10 key steps to e-volutionise your business”. More:

  • To do e-Business you will need the following equipment and software: hardware – a computer, capable of connecting to the Internet and powerful enough to run the program you will need; dial-up software; an e-mail program; a Web browser; a news reader program; an FTP client; a connection to the Internet; and an account with an Internet Service Provider (ISP).
  • `Site pull’ is your Web’s ability to attract visitors and `stickiness’ is a measure of how long they stay and how often they come back. The best attraction is often a forum for visitors to communicate with you and each other. Does your site sell cars? Set up a discussion page on new models. Do you deal in comics? Give users a chance to rave about the latest X-Men. Lawyer? Provide a message board where clients and other lawyers can swap news about bits of legislation.
  • You can sell a domain name you own. But if you register domain names for the purpose of selling them on, be careful. Recent judgments in the UK and the US say that copyright carries over onto the Internet. For every genius who has made a fortune out of elvis.com or wallstreet.com there is some other poor soul being dragged through the courts by a large company or a well-known footballer.
  • Hits are not visitors. Why do you need that when your site has a counter? A `hit’ is counted each time a visitor clicks on part of the site, and for each graphic or link on a page. Loading a page with five graphics on it registers as six hits. So those 1,000 hits a week your counter registers may really only be 30 to 40 visitors.
  • What are the regular tasks? Daily: Answer your e-mail; do one marketing task – post an article to a bulletin board or bulk e-mail a newsletter; search for your company name, keywords or related information. Weekly: Add new keywords to your Web site meta tags; check what tags your competitors use and incorporate them; add something to your Web site. Monthly: Submit an article to e-zine publishers; submit your Web pages to a new search engine; add your e-mail address and contact details to a new directory. Quarterly: Set up a new automated marketing tool – e.g. a new autoresponder; establish a joint venture with someone who sells a similar product; join a new reseller or affiliate programme. Annually: Revamp your existing e-business; start a new e-business.

A book that can make e-business seem so easy that you would love to start one soon.

Magic hat


NAME a powerful, flexible open source operating system that is growing in popularity. If you wear your thinking hat, you would know the answer: Red Hat Linux. For those who want to move from Microsoft Windows, there is guidance available in a new book titled “Beginning Red Hat Linux 9” from a bunch of authors: Sandip Bhattacharya, Pancrazio De Mauro, Mark Mamone, Kapil Sharma, Deepak Thomas, Simon Whiting and Shishir Gundavaram. The back cover promises what the book would deliver: How to install the OS; how to use it to connect to networks, printers and the Net; how to get working; how to get the most from Linux by understanding its powerful file system and command line interfaces; how to set up a web server; how to secure your machine and so on. A few glimpses:

  • Installing an OS is often a long, drawn-out process that requires a lot of upfront planning. Installation of traditional Unix-based OSs seems to have been particularly painful in the past. Early versions of Linux were no different in this respect. The first version of Linux, back in 1993, could be booted up only using Minix (another Unix-like OS). That version of Linux could support only the Finnish keyboard because the author of Linux didn’t have access to a US keyboard.
  • For users coming from a Windows background, there are some notable differences in Linux. Here, the different hard disks and their partitions are not considered as different `drives’. Instead, when we need to use such a device, it is mounted to a directory within the file system hierarchy, which is called its mount point. Also, Linux treats every device as a file.
  • The GNU Image Manipulation Program (or GIMP, as it is affectionately known) is a very powerful piece of software used for graphic manipulation and is equally at home as a simple paint program as it is at retouching photographic images.
  • The distinction between superusers and normal users is enforced in all Linux installations – even on small Linux computers that are used by only one person. While the superuser account is very useful for performing certain tasks, it’s definitely a mistake to work as superuser when you’re performing more `everyday’ tasks such as reading e-mails. It’s not only that you don’t need superuser privileges to read your e-mail – it’s also about protecting yourself from accidentally damaging your system integrity.
  • Python is an object-oriented interpreted language that shares many similarities with Perl, such as: high-level syntax and constructs, complex data types, powerful regular expression support and active community of developers. This is one of the reasons why there is a fierce rivalry between Perl and Python users, each claiming that their language is better. In reality, these two languages support much the same functionality. The choice of language boils down to which syntax you prefer.

Open the doors to open source.

Wall in Java


DO ECC, RSA, MAC, Kerberos, JAAS, JSSE, IPSec and so forth sound like mumbo-jumbo? Watch out, we are treading the security ground. Rich Helton and Johennie Helton throw light on security in their book “Mastering Java Security: Cryptography, Algorithms and Architecture” – to describe not only the current technologies but also explain why they exist, when you should use what, and how to implement the same. Read on:

  • If a hacker is suspected, set up a machine and account just for the hacker. Isolate the hacker into a machine that can be monitored and controlled with almost no utilities and access on it. Have the keystrokes and commands captured to log files. In many cases, the hacker will not know that he has been isolated, but may think that he has accessed an organisation’s system.
  • Key material is any material used to generate or retrieve a public key. The first step in Java is to understand how Java generates and manages key material. Some keys are generated and then are used in JSSE. Other keys, such as Password Based Encryption (PBE) are generated from a password and salted with a pass phrase. The concept of a salt is to combine multiple inputs to generate a more complex key.
  • The notion of an access controller is an object encapsulating access of resources of other objects in the current thread creating a new thread context. The access control context is an object that encapsulates access of resources of other objects throughout the thread context. The guarded object is used to protect the object from another object. There are three pieces to understanding the guarded object: the guard, the protected object, and the requesting object.
  • The purpose of a firewall is to provide a single choke point to block out unwanted packets from possible attackers of an organisation’s system. A choke point is where many packets must enter to get routed into the organisation’s LANs. In most cases, a firewall is an addition to the gateway, or entry router, into an organisation’s network system.
  • The Java platform has two main goals for security: One is to provide a secure platform on which to run Java-enabled applications, and the other is to provide security tools and services to enable secure applications. The Java platform security at first used the sandbox model, a collection of safe resources that unauthorised code could access, and now it has evolved into a policy-based security model.

Be secure with a knowledge of security.

(Books courtesy: Wiley Dreamtech India P Ltdwww.wileydreamtech.com)

Wednesday, Sep 17, 2003



Of what moves mind, and matter

D. Murali

Here’s the latest on nanotechnology, successful job hunting, and effective management.


YOU know that small is beautiful. But small is what constitutes the science of nano. Not just small, but infinitesimally small. For instance, “if the measurement known as a nanometer were scaled up to the width of your fingernail, then your fingernail would be the size of Delaware and your thumb would be the size of Florida”, according to the blurb of “Nanocosm” by William Illsey Atkinson – a not-so-big book about nanotechnology and the big changes coming from the inconceivably small. Let’s measure it up:

  • Like all frontiers, a scientific frontier is a border zone: a dim, mysterious landscape where one thing becomes another. If you’re a scientist, you want to examine this conceptual interface with ever greater depth and precision. Interestingly enough, nanoscience has recently identified a material interface that exactly corresponds to this ideological one. This material frontier is proving to be the biggest single means to advance our knowledge of the nanocosm; it is on the stage of MatSci (materials science) that most other nanosciences are converging.
  • Fluidics is the science and technology of moving fluids through progressively smaller conduits. What the Swiss may lack in cutting-edge theory, they make up for in sheer accuracy. And in nanotechnology, more than in any other human endeavour, God is in such details. The Swiss have identified a subarea of moulded nanofluidics that not only penetrates but dominates its market. For Switzerland, soft nano could prove to be the third millennium’s commercial equivalent of the wristwatch.
  • Some of the biggest organisations in history owe their success less to merit than to rhetoric. This is as true today, in the third millennium A.D., as it was in the third millennium B.C. Orthodox religions; the personality cults of Mao, Stalin, or Mobutu Sese Seko; a computer operating system with spiffy graphic user interfaces based on ancient, creaky op systems – none of these rest on the objective supremacy of their moral or technical values. Instead, they all constitute triumphs of marketing. DOS routinely gums, jams, and slows down the most modern processing hardware because it has the architectural elegance of a Calcutta shantytown.
  • Say you’re a pharmaceutical scientist who wants to know the sum total of a new drug’s effect on human kidney cells. You merely expose two identical biochips to genetic DNA taken from two different cell groups: one treated with a drug, and one (called the `control’) left untreated. The biochips tell you within minutes which human genes are activated when the drug does its work.
  • A nanobot that fit into a 50 nm cube might require half a billion lines of ROM software, permanently embedded somewhere in its unthinkably miniscule frame. Even molecular memory would be too clunky for a working nanobot that was itself molecule-sized. Something else would have to be found.

Get on to a search for a god of little things.

Gliding into a job

OVER seven million copies in print, translated in a dozen languages, bought by 20,000 people every month, and this is no new book. “What Color is Your Parachute?” by Richard Nelson Bolles is a practical manual for job-hunters and career-changers – the sort of people that the tech world can boast of. The 2003 edition is out and the preface has `certain basic truths’ such as – there are always jobs out there; there are a number of ways to look for them; if you can’t find the jobs that are out there, it’s because you’re using the wrong method to look for them (only one job is offered and accepted for every 1,470 resumes floating around out there in the world of work); the key to job-hunting success is hope, and perseverance (because many people who are out of work fail to find work simply because they give up too soon). More picks:


  • Every job-hunting book should answer two main questions: “What is it I’m supposed to do, in order to get a job?” And, “But what if that doesn’t work?” It’s the second question that is the killer. And yet, no job-hunting plan is complete until you’ve got an answer to that question. That includes job-hunting on the Internet. According to one survey, 96 per cent of all online-job-hunters finally found their job in ways other than on the Internet. And employers find 92 per cent of their new employees in ways other than through the Internet.
  • What `does in’ so many job-hunters is some unspoken mental quota in their head, which goes like this: I expect I’ll be able to find a job after about 50 applications online, 25 e-mails, 15 calls in person, and three interviews. They go about their job-hunt, fill or exceed those quotas, and – finding no job – they then give up. Without a job. At least one out of every three job-hunters does. So, don’t let this happen to you.
  • Where can you do research about jobs? The Net and the libraries. The bad news, unfortunately – for the shy – is that the most dependable and up-to-date information on jobs and careers is not found in either of these two ways. It’s found by going and talking to people. Things are just moving too fast.
  • In general, the people who get hired are those who mix speaking and listening fifty-fifty in the interview. If you talk too much about yourself, you come across as one who would ignore the needs of the organisation; if you talk too little, they think you are trying to hide something about your background. A good answer to an employer’s question sometimes only takes twenty seconds to give. Do not speak any longer than two minutes at a time, if you want to make the best impression.
  • Every organisation has two main preoccupations for its day-to-day work: the problems they are facing, and what solutions to those problems people are coming up with, there. Therefore, the main thing the employer is going to be trying to figure out during the hiring-interview with you, is: will you be part of the solution there, or just another part of the problem.

Don’t jump head on into the job-hunt depths. Put on this parachute.

Books courtesy: Fountainhead fhbooks@satyam.net.in

Manager, inside out

SOFTWARE that is supposed to a job flawlessly should itself be flawless. Likewise `one should be able to successfully manage oneself before seriously attempting to manage others,’ writes Dr Gerald Kushel in “The Inside Track to Successful Management” – a new publication from Viva Books. It has many inputs for the stressed out managers – a no uncommon specie in the information technology world. Get on track:


  • Instead of making life difficult, make it easy for yourself, by not trying to swim upstream. Enjoy being carried and supported by the natural flow of the universe. The calmer you get, the easier it will be for you to clarify your passionate purpose. And the calmer you are and the clearer you are about your purpose, the easier it will be to take sensible risks, to have more fun and adventure. All this adds up to your having a richer, fuller and more satisfying life.
  • We egotistically believe that the world just can’t get along without us, but it will get along fine, long after you are gone. There will always be someone who will gladly take your place, and in fact, they may do an even better job than you did. You are not indispensable. No one is. So take time out to enjoy this relatively short life of yours and if you are fortunate enough to have some money, please don’t save all of it for a rainy day. Remember, there are no pockets in a shroud.
  • If we didn’t compare ourselves, we wouldn’t be fearful and jealous. Yet such comparisons are quite normal. It might help for a moment or two to compare yourself to someone who is worse off than you, but the satisfaction from this approach generally doesn’t last long. A little bit of jealousy can sometimes be useful. It could give you the impetus to get started on that project you’ve long had in mind.
  • Effective risk-taking requires that the prospective risk-taker go through four necessary steps usually, but not always, in this sequence: assess the prospects for success; imagine handling effectively the worst that could possibly happen in the event of failure; imagine completing the risk in ideal fashion; and keeping the positive fantasy in mind, let go, act and enjoy.
  • Effective thinkers listen according to the nature of the situations. They do not listen in the same way in all situations. When it pays to listen to the content, they do so. When it makes more sense to listen to feelings they do that, and when it’s wise to tune out altogether, they do that too.

You’d be lucky if your manager has read the book.

Wednesday, Sep 24, 2003




Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s