Monday, October 18, 2010

When the "vision" into a "trap"



As Jim Collins's "From A to A +" hot book in Taiwan, many of the company's vision has turned into "from the good company into a great company." However, the trend is driven vision, employees can receive recognition from the heart of the real you? "Company Light scream銆?銆巉rom good to great, but not the exact implementation of the plan, but also not seen how much the company made changes to the system, things are still bound hand and foot. Nevertheless, the small number of middle level managers, top executives continue to please have been advocating for, the staff feel a strong political flavor .... "I complained to a friends in the industry.

Vision to become trendy political slogan, not a practical long-term goal

Enterprise's "vision" (Vision) trend can be traced back to Peter. Senge's "Fifth Discipline." Originally, the company refers to the enterprise vision shared by people in the scene, people on the scene of great concern and co-operation through various actions to practice it. Peter. Senge even believe that there is no common vision, there is no learning organizations. However, when vision is used by companies large and small, we encounter many pitfalls and problems. Vision into a trendy above the political slogan, not a practical long-term goal is one.
Some people think that content should be ambitious vision. But business history, too much "great" but it is difficult to implement the vision, anti-easy to make business resources to invest in inappropriate places and lead to policy failure. This is the vision of the second trap.

Ambitious but unrealistic vision, leading to failure of corporate strategy

The time back to 1978. Wang computer was the United States ranked the world's 32nd-largest computer supplier, the company said the head of Chinese-American Wangan Xuan, Wang computers will replace in the mid-1990s, Big Blue IBM, the world's largest computer company. Wang fascination with their own products - word processor, it underestimated the threat of IBM personal computers, said "personal computer is the world's most stupid things." Bent to make the company and its growing advantage in the personal computer, the IBM confrontation, not only underestimated the strength of IBM personal computers, but also insist on their own R & D is not compatible with the IBM computer operating system. Later, when Wang computer products found in the main market, has become a personal computer, word processor, not when I have to. In 1992, this had an annual turnover of 30 billion U.S. dollars, has 30,000 employees in large companies, to the courts for bankruptcy. Vision shattered.

Wang Computer's grand vision of the relative, who created "Spirited Away" and many other blockbuster Japanese animation Hayao Miyazaki and Studio Ghibli belong (Studio Ghibli), but never "intended" to make its great. "Business Week" Recent reports that the "strategy", "change", "profit" is not always the words in their dictionary. They only insisted that Ghibli film will be "interesting and useful", the "human interest" as the spirit is the most important works, to tremendous amount of attitude to make the highest quality work. 90% of the entire studio of human and 98% of the time only do one thing, animation. Hayao Miyazaki and Studio Ghibli did not intend to let his great modesty, but in practice they are doing is a great vision.

Vision is to make out, not to tell

Of the ambitious enterprises, the establishment of the vision of course is necessary. However, many companies have the vision, we all want to be winners, but who have real power? When the vision becomes trendy and sets the contents of the theoretical formula of cheap popular slogan, a tool for political maneuvering within the organization, or exaggerate the target has not been implemented, the vision but it will hurt hazardous enterprises, such as loss of people (including employees and customers ) support. Moreover, the true meaning of the vision is action, not words beautiful. Company leaders and management team, with a magnificent vision of shouting, we had better clarify the company's basic mission and values, identify the competitive positioning, and then encouraged to go and practice them in fear.

A Zen master once said: "Who in this world, reasoning many people, Realizing the fewer people; know many people, way street are few." Think about the vision is not true?







相关链接:



Concerned about the anti-monopoly law enforcement agency Jurisdiction overlap



Recommend Source Editors



Comments: Baidu More Recent Non-



Step by step teach you UNCOVER and remove Trojan horse disguised



Streaming audio format, the entire 10-year-old REAL companies will have a new action



Rooted In The Free Soil-FastCGI



Ashes of modern CAE



Graphic Viewers WIZARD



CGI Tutorial: Chapter cgilib cases



ASF To MPG



Automation Is everywhere



Review ASP And PHP



Fit, is the best



comments COMPONENTS And Libraries



FLV to 3GP



exe crash kernel32 dll Repair it in seconds



AVI to MKV



Tuesday, October 12, 2010

Tongfang response to piracy crisis: is the distributor of pirated security


Dealers of pirated software is safe for 顥?顥?br />
HP, Shenzhou, Tsinghua Tongfang, Acer (Acer) and other four manufacturers of computer sales stores were found to pirated Microsoft operating system installed yesterday, Tsinghua University, said in an interview with the party, which is dealer's personal behavior, will strengthen the dealer with the management and education.

Hewlett-Packard and other reporters had not been the attitude of the other three companies.

Tongfang regard a telephone interview, said that Microsoft in China as a partner in one of the most closely, with the side always recommend users to install genuine operating systems, adhere to legitimate strategy, it remains unchanged.

However, since different users have different versions of the operating system needs, in order to give the user plenty of their own choice, now part of the factory with side computer models, not pre-installed operating system, but in the sales process, with the side would urge all distributors, the user is better to play the machine functions, choose to install genuine software.

The store's display of individual agents to identify pirated software prototype in the same side that was very concerned about, though this is a distributor of personal behavior, but at the same side will strengthen the dealer's management, education, and said it would through their own efforts in the fight against piracy to do to their responsibilities.

Yesterday, China's also the matter to the Hewlett-Packard Co., Public Relations fax the interview outline, would like to know the company installed pirated operating system product attitude, but as of 8 pm last night, reporters did not receive a response.






相关链接:



Wait mature open SOURCE model



Download Shockwave Flash To Zen Vision Software



YUV To AVI



Wave of mergers BI have a happy life



Spot cash: how a "worry" Zile!



MTS to AVI



LG Fourth Quarter Net Profit Surged 91 Percent Net Profit 319 Million U.S. Dollars



MPEG4 to WMV



Dell Digital denial distribution relationship with HP induced breakdown



What is the JPEG2000



Best Telephony



Note That The Specifications Of DVD Burners Support



Comment Password Managers



[Death Spy: decision time] menu option to translate



Yu Zhicheng: How scientific orientation 3G problems



Tuesday, October 5, 2010

Symantec said the new storm worm detected



April 12, Symantec detected a new spam attack complex, using Trojan.Peacomm (also known as Storm Worm) or Storm Trojan, through spam e-mail password protected Zip files to send a large number. Symantec Security Response Center will increase its risk index to five in the second level. Symantec this month in the Global Fan Wei monitored a total of more than 200 million spam messages, to reach the maximum number of recent months, mainly for English district's enterprises and individual users. This year in January, Symantec will detect Storm Trojan started evolving, and the spam attack is part of the performance.

The attacks also appeared a new type of change, an attacker using social engineering means to spread Trojans. The junk e-mail to remind users to be careful of false virus detected (for example, Trojan Detected!, Virus Activity Detected) for the title, and then entice users to open a Zip file.

With the release earlier this year, the virus definition, Symantec customers are eligible for comprehensive protection against the threat of attacks in the Zip file. Symantec recommends that enterprise and individual users to download the latest virus definitions, self-detection of Zip files.








Recommended links:



DVR-MS to MPEG



MKV to Xbox 360



how to carry out the Database connection in



QuickTime to MPEG