Throughout the year when I find or hear about a book I might find interesting, I send myself a note with the name of the book. This is an ongoing email throughout the year that I keep replying to and CC my wife. Then at Christmas when someone asks my wife what I might like, she sends them the list of books. It works out pretty well and I end up with a nice stack of books to start the year.
Here’s one from 2010, and one from 2011. Below is the stack I’m diving into for 2015. Most of the below were purchased from our local bookstore, Face In A Book.
The Forbidden Game by Dan Washburn – How the growth of once forbidden golf in China is a microcosm for how the country works.
One Lucky Bastard – Autobiography of Roger Moore. When I was a kid, he was James Bond and the epitome of a movie star.
Destiny of the Republic – Fascinating history of James Garfield. A president taken way too soon, that could have had a huge impact on our country.
Goodbye Darkness – I’m a huge fan of William Manchester (see the next book) and I highly recommend A World Lit Only by Fire, but in this book he writes about his own experiences as a US Marine during WWII and the war in the Pacific.
The Last Lion – The first book in a trilogy biography of Winston Churchill. I started with the final of this series, and now go back to the beginning.
As part of my job I spend a lot of time on college campuses talking with administrators, faculty and staff. One of the special things about higher education (for good or for ill) is the decentralization of basically everything. Since many parts of a college or university have control over their own funding they run a lot of their own systems. Right down to things like email servers. This decentralization can often lead to exposure for IT breaches.
Avoid FUD (Fear, Uncertainty and Doubt) tactics, but do articulate the risks and costs to both the institution and individuals (faculty, administrators and students) of a data breach. Each group will be impacted differently, from costs to the institution, potential loss of research and compromise of research data for academics and loss of individual privacy for students. The impact must be understood for end users to change current behaviors.
Communicate that the provided services meet the academic communities’ needs. Whether it be seamless file sharing or collaboration solutions, end users will gravitate towards the solutions that are easy to use.
Involve the campus community in the assessment of needs and deployment of IT solutions. A shared ownership in the end product increases the likelihood that the community will use the central services and encourage others to do the same.
How does your voice sound at work? Is it a little singsongy? Is it not as steady as it could be? If so, you might need to work on your “voice of authority.” I’ve been thinking about this for awhile and have heard of it referenced in various contexts. Just last night I was reading “Goodbye Darkness,” by William Manchester that is a memoir of his time in the Pacific theater of WWII and he talked about as a young NCO he didn’t have a “command voice.” This is described as DLIPS: Distinctness, Loudness, Inflection, Projection, and Snap. It’s a voice that makes people listen and commands authority.
While in PR we aren’t often barking commands to marching soldiers across a parade ground or battlefield, we often do need to take command of a situation or a room. Additionally we need to speak with a voice of authority about a topic if we are going to convince people that it’s important or worth their time.