Hiring

Hire and promote first on the basis of integrity; second, motivation; third, capacity; fourth, understanding; fifth, knowledge; and last and least, experience. Without integrity, motivation is dangerous; without motivation, capacity is impotent; without capacity, understanding is limited; without understanding, knowledge is meaningless; without knowledge, experience is blind. Experience is easy to provide and quickly put to good use by people with all the other qualities.

Source: Dee Hock on Management

If You Accept It, Expect It

If the player lines up two yards over the start line in sprints and you do not correct him, do not jump his butt when he does it in the game . …If you do not correct the offensive lineman in practice for holding, do not bitch at the official for calling it in the game. If you accept it, you should expect it in the games, and that is on the coach.

– Chip Kelly

Source: The Tao of Chip Kelly by Mark Saltveit.

Retirement Savings Guidelines

Fidelity Investments has issued new savings guidelines suggesting that workers save at least eight times their final salary in order to meet basic income needs in retirement. In the set of age-based targets released Wednesday, Fidelity says employees should have the equivalent of their annual salary in savings by age 35 in order to reach the first benchmark en route to that goal.

Save the Equivalent Of By Age
1x your annual salary 35
2x your annual salary 40
4x your annual salary 50
5x your annual salary 55
8x your annual salary 67

Source: Fidelity issues new retirement savings guidelines and How much do you need to retire.

Deconstructing The Cyber Kill Chain

Giora Engel on The Cyber Kill Chain:

If you must use the Chain model, zero in on No. 7. Focus on detecting ongoing attacks — attackers that have already breached your perimeter — before the damage is done. Instead of analyzing old malware, deploy a breach detection system that automatically detects and analyzes the changes in user and computer behavior that indicate a breach. These subtle changes are usually low-key and slow, and affect only a small number of computers, but the right analysis and context can flag them as malicious.

Source: Deconstructing The Cyber Kill Chain

Preparation

Everyone has the will to win, that’s almost an ordinary trait, who doesn’t want to win? But very few have the will to prepare to win.

– Vince Lombardi