|
Storytelling has come of age in the business world. Today, many of the most successful companies use storytelling as a leadership tool. At Nike, all senior executives are designated "corporate storytellers." 3M banned bullet points years ago and replaced them with a process of writing "strategic narratives." Procter & Gamble hired Hollywood directors to teach its executives storytelling techniques. Some forward-thinking business schools have even added storytelling courses to their management curriculum. The reason for this is simple: stories have the ability to engage an audience the way logic and bullet points alone never could. Whether you are trying to communicate a vision, sell an idea, or inspire commitment, storytelling is a powerful business tool that can mean the difference between mediocre results and phenomenal success. "Lead with a Story" contains both ready-to-use stories and how-to guidance for readers looking to craft their own. Designed for a wide variety of business challenges, the book shows how narrative can help: define culture and values; engender creativity and innovation; foster collaboration and build relationships; provide coaching and feedback; lead change; and more. Whether in a speech or a memo, communicated to one person or a thousand, storytelling is an essential skill for success. Complete with examples from companies like Kellogg's, Merrill-Lynch, Procter & Gamble, National Car Rental, Wal-Mart, Pizza Hut, and more, this practical resource gives readers the guidance they need to deliver stories to stunning effect. |
|
|
CCSP: Securing Cisco IOS Networks Study Guide (642-501)Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
- In-depth coverage of every SECUR exam objective
- Practical information on Cisco security solutions
- Hundreds of challenging practice
... | | CompTIA Security+ 2008 In DepthSecurity continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,... | | Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book... |
|