jerryking + pre-emption   15

On the Other Side of Terror’s Boom
JUNE 5, 2017 | The New York Times | By JULIETTE KAYYEM.

[Currently, in the aftermath of politician's comments on acts of terror like London (June 3, 2017)], there is an exclusive [over]focus on what is called in the crisis management lexicon “left of boom.” The measure of success, in other words, is simply whether or not an attack happened. It’s a simple metric, and surely one that terror organizations want us to adopt. It is a calculation weighted in their favour. Any attack, no matter how successful, is a victory for them and a defeat for us....The measure of success in counterterrorism efforts is not simply whether an attack occurred or not. Another measure must be whether fewer people died or were harmed because of the actions of police, fire fighters, emergency managers, public health officials and the voluntary efforts of the public.

But it is the other side of that spectrum — “right of boom” — where nations must also begin to define victory, especially in an age when we can’t prevent every attack no matter how much we would like to. We can still succeed, however, by making these attacks less effective and therefore less scary. While governments are already focusing on both sides of the boom, prevention takes too much of the spotlight from the more familiar, and often rote, activities of first responders.....“Right of boom” policies are not merely luck; they are the product of sophisticated planning and heeding the lessons learned from previous attacks...... Any successful terror attack is going to elicit fear, but fear is intensified when the consequences of the attack are not minimized and managed effectively. Admittedly, right of boom planning can seem defeatist or less aggressive than saying that we will stop all the terrorists. It shouldn’t......Right of boom planning is no more fatalistic than aggressively treating the growth of a cancer cell or building a sea wall as the oceans rise. They are all an acknowledgment that the harm has happened, but that we ought to try to command the depth of the loss.
terrorism  resilience  crisis  crisis_management  lessons_learned  pre-emption  left_of_the_boom  right_of_the_boom 
june 2017 by jerryking
China’s Cheating Husbands Fuel an Industry of ‘Mistress Dispellers’ - The New York Times
By EMILY FENG and CHARLOTTE YANG JULY 29, 2016

Typically hired by a scorned wife, they coach women on how to save their marriages, while inducing the mistress to disappear. For a fee that can start in the tens of thousands of dollars, they will subtly infiltrate the mistress’s life, winning her friendship and trust in an attempt to break up the affair. The services have emerged as China’s economy has opened up in recent decades, and as extramarital affairs grew more common.....Mistress dispelling typically begins with research on the targeted woman, said Shu Xin, Weiqing’s director. An investigation team — often including a psychotherapist and, to keep on the safe side, a lawyer — analyzes her family, friends, education and job before sending in an employee whom Weiqing calls a counselor.

“Once we figure out what type of mistress she is — in it for money, love or sex — we draw up a plan,” Mr. Shu said.

The counselor might move into the mistress’s apartment building or start working out at her gym, getting to know her, becoming her confidante and eventually turning her feelings against her partner. Sometimes, the counselor finds her a new lover, a job opening in another city or otherwise persuades her to leave the married man. Weiqing and other agencies said their counselors were prohibited from becoming intimately involved with the mistresses or from using or threatening violence.
China  relationships  marriage  marital_strife  marital_breakdowns  infidelity  pre-emption  humint  spycraft  countermeasures  infiltration 
august 2016 by jerryking
The Chinese Hackers in the Back Office - The New York Times
By NICOLE PERLROTHJUNE 11, 2016
a murky and much hyped emerging industry in selling intelligence about attack groups like the C0d0s0 group. Until recently, companies typically adopted a defensive strategy of trying to make their networks as impermeable as possible in hopes of repelling attacks. Today, so-called threat intelligence providers sell services that promise to go on the offensive. They track hackers, and for annual fees that can climb into the seven figures, they try to spot and thwart attacks before they happen.
China  hackers  cyber_security  data_breaches  pre-emption  security_&_intelligence  threats  offensive_tactics  threat_intelligence  back-office 
june 2016 by jerryking
Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers - The New York Times
By NICOLE PERLROTH SEPT. 13, 2015

iSight Partners, a company that provides intelligence about threats to computer security in much the same way military scouts provide intelligence about enemy troops....For the last eight years, iSight has been quietly assembling what may be the largest private team of experts in a nascent business called threat intelligence. Of the company’s 311 employees, 243 are so-called cyberintelligence professionals, a statistic that executives there say would rank iSight, if it were a government-run cyberintelligence agency, among the 10 largest in the world, though that statistic is impossible to verify given the secretive nature of these operations.

ISight analysts spend their days digging around the underground web, piecing together hackers’ intentions, targets and techniques to provide their clients with information like warnings of imminent attacks and the latest tools and techniques being used to break into computer networks.

The company’s focus is what John P. Watters, iSight’s chief executive, calls “left of boom,” which is military jargon for the moment before an explosive device detonates.... iSight's services fill a critical gap in the battle to get ahead of threats. Most security companies, like FireEye, Symantec, Palo Alto Networks and Intel’s security unit, focus on blocking or detecting intrusions as they occur or responding to attacks after the fact.

ISight goes straight to the enemy. Its analysts — many of them fluent in Russian, Mandarin, Portuguese or 21 other languages — infiltrate the underground, where they watch criminals putting their schemes together and selling their tools.

The analysts’ reports help clients — including 280 government agencies, as well as banks and credit-card, health care, retail and oil and gas companies — prioritize the most imminent and possibly destructive threats.

Security experts say the need for such intelligence has never been greater....the last thing an executive in charge of network security needs is more alerts, he said: “They don’t have time. They need human, actionable threat intelligence.”
cyber_security  security_&_intelligence  dark_web  hackers  intelligence_analysts  iSight  Symantec  threats  humint  spycraft  pre-emption  actionable_information  noise  threat_intelligence  left_of_the_boom  infiltration 
september 2015 by jerryking
Successful people act quickly when things go wrong - The Globe and Mail
HARVEY SCHACHTER
Special to The Globe and Mail
Published Sunday, Aug. 02, 2015

Productivity

Pivot quickly to maximize success
Airplanes are off course 90 per cent of the time but incessantly correct their direction, . Similarly, successful people correct their course quickly when off-kilter. They also set short timelines, have small daily to-do lists and drop stuff that isn’t working. Lifehack.org

Branding

Learn from but don’t live in the past
It’s great to know your company history but senseless to live in the past,Your company’s history is valuable only if customers and prospective clients believe it defines your brand and success, and differentiates you from competitors. If it doesn’t, build a new history.

Leadership

Pre-empt attacks with regular audits
To pre-empt an activist investor’s attack, eliminate financial and operational underperformance. Conduct regular vulnerability audits, looking at factors such as how earnings per share, profit and price-to-earnings ratios in the past 18 months compare with peers. If necessary, create an aggressive turnaround plan. ChiefExecutive.net

Human resources

Ask potential hires where they’ll go next
It sounds weird, but LinkedIn asks potential employees what job they want to have next after they leave the company. Founder Reid Hoffman says it signals the intent to have a huge impact on the individual’s career, helping to develop them for whatever they choose, and invites honesty. Vox.com

Tech tip

Use phone’s camera as portable copier
Productivity blogger Mark Shead recommends using your phone’s camera as a portable copy machine/scanner when on the road, photographing paperwork, train schedules or other information. Many new camera phones have the resolution to provide readable copies. Productivity 501.com
branding  productivity  human_resources  leadership  Harvey_Schachter  character_traits  habits  pre-emption  course_correction  Reid_Hoffman  career_paths  beforemath  overachievers  affirmations  pivots  audits  signals  vulnerabilities  hiring  interviews  high-achieving 
august 2015 by jerryking
In the Dark Corners of the Web, a `Spider' Intercepts Hackers
April 22, 2015 | Bloomberg Business| by Edward Robinson

Encircling enterprises with digital force fields to protect against invasion is an outdated strategy, as the intrusions at JPMorgan Chase, Sony, and Target have demonstrated, according to James Chappell, Digital Shadows’ co-founder and chief technology officer. IT systems have simply become too open and diffuse to keep the bad guys out.
“Social media, long supply chains, mobile technology. There is now so much that no longer lives within the castle walls; it lives beyond them,” he says. “You can no longer assume that you’ll never be hacked. You have to assume that you will be.”
Enter the spider, a program of the firm’s own design. Crawling through shadowy corners such as the Deep Web and the Tor network, the program searches 80 million data sources in 26 languages for signs that Digital Shadows’ clients are at risk.
cyberattacks  Digital_Shadows  cyber_security  banks  hackers  malware  United_Kingdom  London  data_breaches  dark_web  pre-emption  network_risk  cyberintrusions  left_of_the_boom 
may 2015 by jerryking
Yossi Klein Halevi: A Lesson From the Yom Kippur War for a Perilous Time - WSJ.com
October 3, 2013 | WSJ | By YOSSI KLEIN HALEVI.
A Lesson From the Yom Kippur War for a Perilous Time
Golda Meir didn't strike pre-emptively in 1973 because she was 'scared' of angering the White House.
security_&_intelligence  Yom_Kippur_War  pre-emption  Israel  lessons_learned  Iran  diplomacy  Mideast_Peace  IDF  Egypt  Syria  war  militaries 
october 2013 by jerryking
How to battle a dominant brand
Nov. 29 2012| The Globe and Mail | SUSAN KRASHINSKY - MARKETING REPORTER.

This emphasis on customer service, insinuating that dominance has made the competitor lazy because they can afford not to try as hard, is one way to challenge a highly dominant competitor.

Another way is to chip away at a niche segment the competitor may not be looking at. The sweetener product Stevia is currently attempting this. It is facing a very crowded market for sugar alternatives: Globally, roughly 50,000 tonnes of high-intensity sweeteners will have been consumed by the end of 2012. Aspartame accounts for about half of the market in terms of volume, according to Euromonitor International. Saccharine and sucralose, the ingredient in Splenda, also each have a healthy share.

The marketing for Stevia, like other sweeteners, revolves around a reduced calorie option for consumers attempting to keep a healthy lifestyle; with one difference. While other sweeteners are associated with being highly processed, chemical products, Stevia markets itself as natural.

“There’s such a demand for reduced calorie products, and because Stevia has that added natural benefit, it’s doing fairly well and competing for space,” said Lauren Bandy, an ingredients analyst with Euromonitor. That is despite the healthy debate around just how natural the product really is.

That niche demand has helped it land deals to be included in some high-profile company’s products, such as PepsiCo’s reduced-sugar juice Trop50, in Coca-Cola’s Sprite on a test basis in France and Australia, and in some Danone yogurt products. Stevia still only has about 2 per cent of the global market in sweeteners by volume, but that’s doubled since last year. Euromonitor expects its growth to continue at a compound annual rate of 23 per cent from 2011 to 2016.

But that strategy can also be used against underdog brands. One of the most powerful ways for a company to protect its dominance is to fragment the market pre-emptively, giving challenger brands no niche to use as a foot in the door, said Niraj Dawar, a marketing professor at the Richard Ivey School of Business at the University of Western Ontario.
brands  Nike  Stevia  Susan_Krashinsky  Google  search  Bing  market_leadership  Microsoft  underdogs  branding  product_extensions  niches  fragmentation  customer_service  pre-emption  sweeteners  sub-brands  category_killers  habits  barriers_to_entry 
december 2012 by jerryking
Bid for Nortel patents marks Google's new push into mobile world - The Globe and Mail
IAIN MARLOW — Telecom Reporter
From Tuesday's Globe and Mail
Published Monday, Apr. 04, 2011

“Google’s lawyers see much more clearly than I do what patent litigation
they’re open to – they’re the ones who are best in a position to
judge,” he said, noting that this investment could, theoretically,
insure the company against some very expensive litigation.
patents  Nortel  Google  mobile  Iain_Marlow  litigation  pre-emption 
april 2011 by jerryking
Don’t outlaw human smugglers – drive them out of business
Dec. 4, 2010 | The Globe and Mail | Doug Saunders.
We can drive the worst of the smugglers (who are also the most
expensive) out of business by making our legitimate pathways work as
they should. This efficiency doesn’t raise the number of refugees coming
in; rather, by killing the market for private-sector alternatives, it
can reduce them....Canada has less of a problem than other countries in
large part because we know how to pre-empt the smugglers at their own
racket. The largest “smuggling” operation in this country is the one
overseen by the Department of Citizenship, Immigration and
Multiculturalism, in which Ottawa authorizes private agents (i.e.,
charities and church groups) to bring in 11,000 sponsored refugees from
United Nations camps every year. The minister, Jason Kenney, a huge
proponent of the program and its record of integration success, raised
the number this summer by 2,000 more. This does more to make smuggling
marginal than any further criminalization would.
human_trafficking  Doug_Saunders  problems  outlaws  problem_solving  migrants  illicit  piracy  pre-emption  smuggling 
december 2010 by jerryking
Loblaw takes aim at rivals
Feb. 11, 2010 | The Globe & Mail | by Marina Strauss.
Loblaw Cos. Ltd., a trailblazer in low-cost private labels such as
President's Choice, is testing an array of new “discount” store brands
aimed at attracting more shoppers and fending off a legion of new
players in the grocery business. The strategy of promoting what some
retail experts refer to as “fighter” brands is similar to one being used
by grocery giant Tesco PLC in Britain to take on mighty Wal-Mart Stores
Inc. and other discounters. Now, Loblaw is borrowing a page from the
British private-label playbook by introducing a bevy of brands at its No
Frills discount stores, a move that could spiral into a new food fight
in Canada.

The move comes amid rising competition in the grocery sector. Retailers
ranging from Canadian Tire to Shoppers Drug Mart and Wal-Mart are adding
more food products to their shelves.
Marina_Strauss  grocery  private_labels  Loblaws  Wal-Mart  Tesco  retailers  sub-brands  product_extensions  niches  fragmentation  pre-emption  playbooks 
february 2010 by jerryking
Fire Yourself -- Then Come Back and Act Like a New Boss Would
OCTOBER 9, 2006 | Wall Street Journal | by CAROL HYMOWITZ.
..."companies must repeatedly reinvent themselves to stay
strong...companies can't survive as they once did by churning out the
same products or services in the same way year after year. The most
successful companies don't wait until they're in trouble or are
overtaken by rivals to make changes. The trick is to analyze portfolios
constantly, to move quickly to shed weak businesses and to gamble on new
opportunities without making the company unstable...."Windows of
opportunity open and close so quickly today, you can't just mull
decisions right in front of you. You have to look around the corner and
figure out where you need to go,...learn how to change directions fast.
...
IBM  Intel  Andy_Grove  reinvention  opportunities  nimbleness  speed  agility  windows_of_opportunity  accelerated_lifecycles  portfolios  pre-emption  kill_rates  portfolio_management  unstable  instability  assessments_&_evaluations  Carol_Hymowitz 
december 2009 by jerryking
Shielding Intellectual Property - WSJ.com
NOVEMBER 30, 2004 | Wall Street Journal | by BHARAT ANAND and
ALEXANDER GALETOVIC. Below we set out a selection of strategies that
have allowed companies highly dependent on their intellectual property
to live to fight another day.
(1) Nip it in the Bud. Some companies combat infringement by acting
before competitors can catch their breath. Intel famously pre-empts
misappropriation of its core assets by dominating the market long enough
to realize huge profits before reverse engineering, imitation, or
piracy can eat into them.(2) Overwhelm competitors by fashioning
internal operations into an engine of innovation.(3) Make a Bundle. If
one danger of piracy is to drive down a company's prices, why are smart
companies charging nothing for some of their products? (4)Move the
Goalposts. When the threat to their core assets is overwhelming,
companies must take more extreme action -- sometimes expanding into
related businesses.
bundling  competitive_strategy  copycats  core_businesses  counterfeits  Intel  intellectual_property  internal_systems  piracy  pre-emption  property_rights  reverse_engineering  threats 
december 2009 by jerryking

related tags

accelerated_lifecycles  actionable_information  advertising  affirmations  agility  Andy_Grove  assessments_&_evaluations  audits  back-office  banks  barriers_to_adoption  barriers_to_entry  beforemath  Bing  Bottom_of_the_Pyramid  branding  brands  bubbles  bundling  business_planning  career_paths  Carol_Hymowitz  category_killers  character_traits  China  Communicating_&_Connecting  competitive_strategy  copycats  core_businesses  counterfeits  countermeasures  course_correction  crisis  crisis_management  customer_service  cyberattacks  cyberintrusions  cyber_security  dark_web  data_breaches  definitions  descriptors  Digital_Shadows  diplomacy  diversification  Doug_Saunders  Egypt  focus  fragmentation  Google  grocery  GTA  habits  hackers  harvesting  Harvey_Schachter  high-achieving  hiring  housing  human_resources  human_trafficking  humint  Iain_Marlow  IBM  IDF  illicit  infidelity  infiltration  instability  Intel  intellectual_property  intelligence_analysts  internal_systems  interviews  Iran  iSight  Israel  Ivey  kill_rates  leadership  left_of_the_boom  lessons_learned  litigation  Loblaws  London  low-income  malware  Marina_Strauss  marital_breakdowns  marital_strife  marketing  market_entry  market_leadership  marriage  metrics  Microsoft  Mideast_Peace  migrants  militaries  mobile  network_risk  new_products  niches  Nike  nimbleness  noise  Nortel  offensive_tactics  opportunities  outlaws  overachievers  patents  personal_selling  piracy  pivots  playbooks  portfolios  portfolio_management  pre-emption  pricing  private_labels  problems  problem_solving  productivity  product_extensions  profit_dynamic  property_rights  Reid_Hoffman  reinvention  relationships  resilience  retailers  reverse_engineering  right_of_the_boom  ROI  search  security_&_intelligence  signals  smuggling  speculation  speculators  speed  spycraft  Stevia  sub-brands  Susan_Krashinsky  sweeteners  Symantec  Syria  terrorism  Tesco  threats  threat_intelligence  Toronto  underdogs  United_Kingdom  unstable  vulnerabilities  Wal-Mart  war  windows_of_opportunity  Yom_Kippur_War 

Copy this bookmark:



description:


tags: