Bits and Bytes

Thursday, August 11, 2011

management articles

http://problemboss.com/blog/mikec/cultivate-culture-of-quitting
http://problemboss.com/blog/mad-manager/if-youre-so-hot-why-are-you-working-me
http://problemboss.com/blog/boss-whisperer/how-not-lead
http://problemboss.com/blog/trisw/incompetent-boss-loyalty-based-hiring
Posted by Vade Mecum at 1:40 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: management

No comments:

Post a Comment

Older Post Home
Subscribe to: Post Comments (Atom)

My Blog List

  • Help Net Security - News
    NTLM relay attacks are back from the dead
    5 hours ago
  • Schneier on Security
    Surveillance Used by a Drug Cartel
    1 day ago
  • 3G and 4G Wireless Blog
    The Evolution of 3GPP 5G Network Slice and Service Types (SSTs)
    3 days ago
  • bunnie's blog
    Name that Ware, June 2025
    3 days ago
  • Light Blue Touchpaper
    Cambridge Cybercrime Conference 2025 – Liveblog
    1 week ago
  • blog.scottlowe.org
    Bootstrapping Dual-Stack Kubernetes on Flatcar with Kubeadm
    4 weeks ago
  • Security to the Core | Arbor Networks Security » 2009
    Decoding TCP SYN for Stronger Network Security
    5 weeks ago
  • ADD / XOR / ROL
    Some experiments to help me understand Neural Nets better, post 4 of N
    1 month ago
  • Occam's Razor by Avinash Kaushik
    Kill Data Pukes: Split KPIs, Diagnostic Metrics & Influencing Variables.
    1 month ago
  • Gestalt IT» Tech Archives - Gestalt IT
    What it Takes to Power AI at AI Infrastructure Field Day 2
    2 months ago
  • TaoSecurity
    Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7
    2 months ago
  • Bradley M. Kuhn's Blog ( bkuhn )
    I Signed an OSI Board Agreement in Anticipation of Election Results
    3 months ago
  • Inliniac
    Vuurmuur 0.8.2 release; development update
    5 months ago
  • Michael McNamara
    Why isn’t the Let’s Encrypt wildcard automatically renewing? GoDaddy $%&@
    8 months ago
  • Blog.Photobucket.com
    Photo Editing: What is Saturation and When Should You Change It?
    10 months ago
  • Zero in a bit
    Essential Cloud Security Tools for Effective DevSecOps
    1 year ago
  • Rusty Russell's Coding Blog
    Restoring Bitcoin’s Full Script Power
    1 year ago
  • PacketLife.net Blog
    Book Review: Model-Driven DevOps
    2 years ago
  • My Etherealmind
    Followup: IP Multicast – Good in Theory, Bad in Reality.
    2 years ago
  • Securosis Blog
    The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard
    2 years ago
  • dailywireless.org
    Protected: Demo Post
    2 years ago
  • CloudEnterprise.info
    How to Achieve Maximum Success with
    3 years ago
  • blog.reddit -- what's new on reddit
    It’s National Voter Registration Day! Register To Vote & Have Your Voice Heard In The 2020 Elections
    4 years ago
  • Cisco IOS hints and tricks
    MUST READ: Meaningful Availability
    5 years ago
  • Hex blog
    Hexblog is moving!
    5 years ago
  • Harald Welte's blog
    36C3 Talks on SIM card technology / Mitel DECT
    5 years ago
  • Carnal0wnage Blog
    Devoops: Nomad with raw_exec enabled
    5 years ago
  • Paul Melson's Blog
    BSides Augusta 2019
    5 years ago
  • A Networker Blog
    prometheus SNMP lab1
    6 years ago
  • CCDE Certification - CCIE Blog
    Interested in Microsoft Azure? Tune into James Rudley’s Newest Course
    6 years ago
  • The Spanner
    Rewriting relative urls with the base tag in Safari
    6 years ago
  • Dieter Spaar's blog
    A personal remark about security research
    7 years ago
  • HolisticInfoSec.org
    toolsmith #132 - The HELK vs APTSimulator - Part 2
    7 years ago
  • root labs rdist
    In Which You Get a Chance to Save Democracy
    7 years ago
  • Some Blog
    Static binaries (for Go with Docker)
    7 years ago
  • SecuriTeam
    Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability
    7 years ago
  • Cisco Study Blog
    Hello world!
    7 years ago
  • SIPVicious
    Fuzzing PJSIP and chan_skinny, vulnerability information and advisories
    8 years ago
  • Alpha Doggs's blog
    Maybe iPhone 8 will gain augmented reality — or maybe AR will replace the iPhone
    8 years ago
  • Techtalks
    Mobile App Development with iOS Swift - Top 3 Programming lessons
    8 years ago
  • WirelessMoves
    32C3 – An Angel In Retrospect – Being Part Of The Conference Instead Of Just Attending
    9 years ago
  • Jeremiah Grossman
    An idea to help secure U.S. cybersecurity…
    9 years ago
  • jdoyle's blog
    Clearing the fog around open switching terminology
    10 years ago
  • Routing Freak!
    Securing BFD now possible!
    10 years ago
  • Kalyan Varma Journal
    New Project – Second Nature
    10 years ago
  • Laramies Corner
    Scan for shellshock with wfuzz
    10 years ago
  • LTE watch
    LTE Tutorials at IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2014
    11 years ago
  • blindhog.net
    Cisco – Config Generator and Template Repository
    11 years ago
  • The Paradigm Shift
    Adsense Breakdown
    11 years ago
  • Amrit Williams Blog
    RSA Announces End of RSA Security Conference
    11 years ago
  • Chronicles of Darby Weaver
    Home Interior Decorating
    11 years ago
  • The OpenBTS Chronicles
    One Last Word...
    11 years ago
  • Richard Bannister's CCIE Blog
    A new blog!
    11 years ago
  • public int
    Spectrum of Integration Automation
    11 years ago
  • Armorize Malware Blog
    Proofpoint, Inc. to Acquire Armorize Technologies, Inc.
    11 years ago
  • tssci security
    Decoding and Tampering Protobuf Serialized Messages in Burp
    12 years ago
  • Wired n Wireless
    OpenFlow, GRE and VxLan Pcaps, Amazon EC2 BOTO (Python API)
    12 years ago
  • Nityas World - Official Blog Of Nityanand Parab
    How To Identify the phishing mail
    12 years ago
  • Thoughts of a Technocrat
    Somalia's al-Shabab Opens New Twitter Account
    12 years ago
  • jk
    I've moved!
    12 years ago
  • Educated Guesswork
    Initial notes on Microsoft's CU-RTC-Web Proposal
    12 years ago
  • CCIE Dreamer: Service Provider
    CCIE Data Center Coming Soon!!!
    13 years ago
  • pentestmonkey.net
    mimikatz: Tool To Recover Cleartext Passwords From Lsass
    13 years ago
  • Subreption Blog
    Ravings from Paradise Island: Part II "High dive of the cavemen"
    13 years ago
  • Notacon Newsfeed
    New website and newsfeed!
    13 years ago
  • Boaz Gelbord
    Comodo, RSA, and Security Priorities
    14 years ago
  • Nynaeve
    NWScript JIT engine: Wrap-up (for now)
    14 years ago
  • Mr. Configure: CCIE SP Mini-Scenarios
    Free DESGN (CCDA) Beta Class in Raleigh, N.C., August 30 – September 3, 2010
    14 years ago
  • D-kriptik Blog
    Quickies: Edu, rep, trust, ossl 1.0.0, ssl, rekey, body scan, leaks, net card exploit, runway
    15 years ago
  • TechMeditation
    Zeroing in on an AV signature to bypass detection
    15 years ago
  • Security Incite Rants
    The Pope Visits Security Incite + Securosis
    15 years ago
  • Spire Security Viewpoint
    Top Ten Web Security Risks
    15 years ago
  • CCIE Pursuit Blog
    Internetwork Expert Volume IV (Troubleshooting) Workbook Review: Part 3
    15 years ago
  • Network Ninja
    Digital Growth with your Job
    16 years ago
  • Zscaler Research
  • cloud computing
  • milw0rm.com
  • Malware Forge blogs
  • IDEAS IN FOOD
  • Cisco Blog
  • My place to share some bits and bytes
  • Free CCIE Service Provider Mini-Scenarios : 6200networks.com
  • David Litchfield's blog
  • More Thoughts on Network Engineers and the CCDE | NetworkWorld.com ...
  • has_many :bugs, :through => :rails
  • ardenpackeer.com
  • Open Information Security Foundation
  • Learn Security Online
  • Dean Bubley's Disruptive Wireless
  • RISE Security
  • Matasano Chargen
  • Emergent Chaos
  • 360 Security
  • ASA Project
  • BigAdmin Sun BluePrints: What's New and Recently Updated
  • Michael Lauer - Freelancer
  • honeyblog
  • sourcefrog
  • write mem
  • Scalable web architectures
  • Offensive Computing blogs
  • CCDE Study
  • The Cover of Night

Followers

Blog Archive

  • ▼  2011 (4)
    • ▼  August (1)
      • management articles
    • ►  March (3)

About Me

Vade Mecum
View my complete profile
Simple theme. Theme images by gaffera. Powered by Blogger.