Jak být správný manažer a leader? Jaké metody a nástroje použít na řízení projektů? Jak vést lidi k dosažení cílů projektu? Metody GTD a NLP. Pojmy MVP, agile, scrum, storypoints, user story, use case, typologie, temperament, IQ vs EQ. Jestli Vás zajímají odpovědi na otázky výše či Vás zajímá něco z pojmů, které jsem vyjmenoval - SLEDUJTE tento podcast, kde uslyšíte zkušenosti mé a mých významných hostů!
…
continue reading
CIGI Senior Fellow David Welch and Senior Fellow Andrew Thompson co-host a podcast series with global governance experts. Episodes feature timely and candid discussions on issues related to the core areas of CIGI expertise: Global Economy, Global Security & Politics, and International Law.
…
continue reading
CIGI Senior Fellow David Welch and Senior Fellow Andrew Thompson co-host a podcast series with global governance experts. Episodes feature timely and candid discussions on issues related to the core areas of CIGI expertise: Global Economy, Global Security & Politics, and International Law.
…
continue reading
Building Security In
…
continue reading
V této zajímavé epizodě našeho podcastu Cigiho Managemet se zaměříme na tweet, který nedávno zaujal vývojářskou komunitu. Vývojář, který tvrdil, že Scrum je rakovina, dostal velký ohlas. Vzal jsem si tento tweet pod lupu. Během epizody budeme analyzovat, co vedlo k takovým negativním pocitům vývojáře. Prozkoumáme, zda jsou jeho obavy oprávněné, neb…
…
continue reading
Dnes jsem si připravil jen krátkou vzdělávací lekci, kde bych Vám chtěl říci úplné základy o soft skills. Co to vlastně je, proč jsou důležité a zaměstnavateli tolik vyhledávané? Poslechněte a budete chytřejší.
…
continue reading
1
Workshop pro zahájení agilního projektu 3/3
14:57
14:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
14:57
Třetí a závěrečný díl minisérie, kde popisuji jednodenní workshop pro zahájení agilního projektu. V podcastu popisuji rady a tipy, jak vést každý blok workshopu, jak motivovat lidi a uvádím příklady pro lepší pochopení každého cvičení. Kdybyste jich v podcastu slyšeli málo, neváhejte mi napsat na jakub.cigl@gmail.com. Také se samozřejmě neváhejte o…
…
continue reading
1
Workshop pro zahájení agilního projektu 2/3
20:54
20:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
20:54
Druhý díl minisérie, kde popisuji jednodenní workshop pro zahájení agilního projektu. V podcastu popisuji rady a tipy, jak vést každý blok workshopu, jak motivovat lidi a uvádím příklady pro lepší pochopení každého cvičení. Kdybyste jich v podcastu slyšeli málo, neváhejte mi napsat na jakub.cigl@gmail.com. Také se samozřejmě neváhejte ozvat se zpět…
…
continue reading
1
Workshop pro zahájení agilního projektu 1/3
9:38
9:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:38
Po Covid pauze jsem se rozhodl připravit opět menší sérii. Série se bude zabývat zahájením menšího až středního agilního projektu. Je to takový návod, jak vést workshop se zákazníkem a získat od něho během jediného dne veškeré potřebné info k zahájení prací. Díky tomuto workshopu bude i Váš tým lépe naladěn na projekt a pochopí jeho pointu. Vtáhnut…
…
continue reading
1
Kritické myšlení a host Lukáš Hána
1:01:09
1:01:09
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:01:09
Oblíbená epizoda s hostem je tady! Dnes jsem si pozval významného hosta a člověka, který je hodně slyšet v oblasti kritického myšlení. Je jím Lukáš Hána, blízký spolupracovník Petra Ludwiga, takže teď už asi tušíte, že Lukáš je hodně nabitý! Neznáte-li ho, tak si poslechněte, kde všude se tento člověk angažuje a vychutnejte si naší debatu o aktuáln…
…
continue reading
Podcast se věnuje, v dnešní době Covidové, velmi důležitému tématu, v kterém bychom se měli všichni pravidelně vzdělávat. Je to kritické myšlení, které neznamená, že někdo přemýšlí negativně, ale že…no, to už si poslechněte sami. V podcastu otevírám toto téma a dávám příklady, na kterých si uvědomíme, že možná tak trochu všichni občas chybujeme a n…
…
continue reading
Připravil jsem si pro Vás díl, který je určený spíše pro začátečníky. Pro lidi, kteří chtějí porozumět základnímu rozdílu mezi Agilem (Agile) a Vodopádem (Waterfall). Takže middlové a senioři, můžete s čistým svědomím přeskočit. Nicméně samozřejmě klidně poslechněte a dejte vědět zpětnou vazbu. V podcastu se dozvíte hlavní rozdíly, které rozlišují …
…
continue reading
1
Závěr minisérie NLP a host Leoš Kubíček
38:06
38:06
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:06
V tomto díle vám přináším pohled na NLP očima také někoho jiného. Jde o mého kamaráda Leoše Kubíčka, který se živí jako kouč už pěkných 15 let se svou vlastní firmou. Společně projdeme všechny vzorce a doporučení z jednotlivých dílů o NLP a Leoš přidá ještě něco navíc, ze svojí dlouholeté praxe. Více o Leošovi, jeho firmě a NLP se dozvíte v podcast…
…
continue reading
1
Tajné spojky, vzorec uvědomění a jak vás roky cíleně hypnotizoval McDonald's
14:21
14:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
14:21
Dnes jsem si pro Vás připravil, za mě, jeden z nejlepších dílů. Díl, kde opravdu uvidíte sílu NLP, protože se minulé vzorce začnou propojovat s tím, co se naučíme dnes. Navíc ukážu krásný příklad, jak McDonald's cíleně hypnotizoval lidi z celého světa, aby prodal více produktů... a nikomu to nevadilo. Konkrétně dneska půjde o: Spojky A a ALE Vzorec…
…
continue reading
Jestli Vás zajímá, jak zaujmout něčí pozornost či druhou stranu přimět naslouchat, tak si pusťte tento díl! Vzorec z tohoto dílu pomáhá překonat něčí obranu a můžete se plynule začít bavit o tom, na čem záleží. Souhlasný postoj se zabývá vzorcem, který ve spojení s minulým, z epizody Předefinování tématu, až nahání hrůzu, jeho schopností dostat se …
…
continue reading
1
NLP - první vzorec "předefinování tématu"
6:02
6:02
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
6:02
První základní vzorec NLP tzv. předefinování tématu! Dozvíte se co to je, kdy to použít, jaký má vzorec a příklady použití z praxe. Při pochopení vzorce odhalíte manipulátory. Přesvědčíte ostatní o svém nápadu či argumentu. Vysvětlíte jim, proč je vaše zboží, tak skvělé. Prodáte myšlenku a spousty dalších využití... Dále to zřejmě není třeba okecáv…
…
continue reading
1
Úvod do NLP (neurolingvistické programování)
4:23
4:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
4:23
Úvod do tématu NLP neboli neurolingvistického programování. V tomto úvodním díle Vám řeknu o co jde, co je to za prapodivný název a na co se těšit. V dalších dílech Vám přinesu příklady z praxe, které budete moci okamžitě začít používat. Zajímá Vás toto téma? Napište mi, prosím, na jakub.cigl@gmail.com, jestli s tím máte nějaké zkušenosti, co si o …
…
continue reading
V tomto díle jsem se zaměřil na věc, které se, alespoň v mé sociální bublině, nevěnuje moc lidí. Většinou ten začátek schůzek všichni nějak přetrpí a to divné ticho časem vymizí. Mluvím o icebreakers cvičeních, které mají pomoci zbavit se knedlíku v puse na začátku každé schůzky s novým klientem nebo třeba na začátku projektu s novými lidmi. Na int…
…
continue reading
1
Jak mít vše hotovo (GTD) a host Daniel Gamrot
39:40
39:40
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:40
Po teoretickém díle číslo 2 tu máme díl z praxe! Hostem je Daniel Gamrot, který již 8 let školí na volné noze a vzdělává jednotlivce či firmy v oblasti osobního produktivity, timemanagementu, plánování a v oblastech, které s tím souvisí. Dan se podílel i na revizi překladu aktualizovaného vydání "Mít vše hotovo" z roku 2016, takže je to opravdu člo…
…
continue reading
Getting Things Done. Jedna z oblíbených metod time-managementu. Poslechněte si popis metody, doplněný o mé zkušenosti z praxe. Dozvíte se o každém kroku metody, ty jsou: Sesbírej Zpracuj Zorganizuj Kontroluj Udělej Povím Vám také o důležitém pravidlu dvou minut, které Vám ušetří spousty času! Díl podcastu, který byste určitě neměli vynechat! Trochu…
…
continue reading
1
Na co se těšit v manažerském podcastu?
9:18
9:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:18
V prvním díle se Vám představím. Vysvětlím, proč si myslím, že Vám mám co říci a projdu stručně témata, kterým se chci věnovat. Patří mezi ně: GTD NLP MVP Scrum vs Waterfall Hodiny vs StoryPointy User story vs Use case IQ vs EQ Timemanagement Temperament lidí Motivace a spousta dalšího... Užijte si tento úvodní díl a těším se další!…
…
continue reading
1
Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management
31:56
31:56
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:56
Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, enterprise-wide information and product security organization. She started her career consulting in Paris prior to joining Lilly France in 1995. Before being named CISO, Wafaa held several international leadership responsibi…
…
continue reading
1
Show 136: Pavi Ramamurthy discusses the relationship between development and software security
31:51
31:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:51
Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bug herding, application vulnerability response, program management, and security positioning for partn…
…
continue reading
1
Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS
25:55
25:55
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:55
Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including static analysis tool design and execution, customization, and deployment. She is also an expert in the areas of penetration testing and threat modeling. Throughout her car…
…
continue reading
1
Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism
24:54
24:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:54
Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include Network Computing, Secure Enterprise Magazine, Communications Week, and more. Kelly’s coverage of com…
…
continue reading
1
Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security
29:06
29:06
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:06
Cheryl Biswas is a Cyber Security Consultant focusing on threat intelligence at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSec researcher at JIG Technologies where she advised her team and clients on security matters and weekl…
…
continue reading
1
Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech
32:16
32:16
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:16
Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty member at Carnegie Mellon University. She holds a Ph.D. in Computer Science from the University of Virgini…
…
continue reading
1
Show 131: Kate Pearce Discusses the Relationship Between Biology and Security
31:47
31:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:47
Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, academic, and assessment contexts with a clear focus on evidence-driven security approaches. Kate hol…
…
continue reading
1
Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible
31:05
31:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:05
Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and awareness. As an outspoken advocate, she writes and speaks publicly about security research, strong cry…
…
continue reading
1
Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security
33:14
33:14
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:14
Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate Computer Networking and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government and financial services spaces. Kelly is also a frequent speaker on the Black Hat SummerCon Counterme…
…
continue reading
1
Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics
27:49
27:49
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:49
Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of which focus on incident response and digital forensics. Lesley holds a BS in Network Technologies from …
…
continue reading
1
Show 127: Dr. Marie Moe Discusses Medical Device Security
32:31
32:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:31
Dr. Marie Moe is a Security Researcher at SINTEF and an Associate Professor at the Norwegian University of Science and Technology. She was previously a Team Leader at NorCERT, the Norwegian national CERT, where she managed incident response to cyberattacks against national critical infrastructure. Marie’s recent work focuses on public safety and se…
…
continue reading
1
Show 126: Mike Pittenger Discusses Open Source Software Security
31:17
31:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:17
Mike Pittenger is the VP of Security Strategy at Black Duck Software where he is responsible for strategic leadership of security solutions, including product direction and strategic alliances. He has 30 years of experience in technology and business, more than 25 years of management experience, and has spent the past 15 years focusing on security.…
…
continue reading
1
Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training
31:51
31:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:51
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and secure engineering. He is also the founder of Brakeman Security which produces a Ruby on Rails security scanner. He is a volunteer and Former Global Board Member of the Open Web Application Security Project (OWASP) and the author of Iron-Clad Jav…
…
continue reading
1
Show 124: Lance Cottrell Discusses Anonymity and Privacy
32:47
32:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:47
Lance Cottrell is the Chief Scientist at Ntrepid where he works on the Passages product. He founded Anonymizer, Inc. in 1995, which was later acquired in 2008. Lance has been at the cutting edge of Internet privacy, anonymity, and security for over 20 years. He is on the board of the North Bay Angels and is a mentor for SoCo Nexus Sprout. He lives …
…
continue reading
1
Misperceptions, Threat Inflation, and Mistrust in China-Japan Relations | Inside the Issues 6.13
6696:39:28
6696:39:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
6696:39:28
In episode six of season six, CIGI Senior Research Associate Benoit Hardy Chartrand joins CIGI Senior Fellow and co-host David Welch for a discussion on the politics of enmity in the Chinese-Japan relationship.De către CIGI
…
continue reading
1
Misperceptions, Threat Inflation, and Mistrust in China-Japan Relations | Inside the Issues 6.13
172513:27:16
172513:27:16
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
172513:27:16
In episode six of season six, CIGI Senior Research Associate Benoit Hardy Chartrand joins CIGI Senior Fellow and co-host David Welch for a discussion on the politics of enmity in the Chinese-Japan relationship.De către CIGI
…
continue reading
1
Show 123: Yanek Korff Discusses How to Build a Successful Technical Team
27:40
27:40
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:40
Yanek Korff is the owner of Korff Consulting, LLC where he is a strategic consultant advising firms on information security topics. Having worked at Bell Atlantic, Cigital, AOL, and Mandiant, Yanek has well over a decade of experience in security operations, development, and infrastructure. Listen as Gary and Yanek discuss outsourcing, people vs. a…
…
continue reading
1
Sustainability Codes of Conduct in Green Banking | Inside the Issues 6.12
108245:06:41
108245:06:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
108245:06:41
In this episode of Inside the Issues Olaf Weber, CIGI Senior Fellow joins Andrew Thompson to discuss Sustainability Codes of Conduct in the Green Banking Sector.De către CIGI
…
continue reading
1
Sustainability Codes of Conduct in Green Banking | Inside the Issues 6.12
4194:30:56
4194:30:56
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
4194:30:56
In this episode of Inside the Issues Olaf Weber, CIGI Senior Fellow joins Andrew Thompson to discuss Sustainability Codes of Conduct in the Green Banking Sector.De către CIGI
…
continue reading
1
Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security
29:45
29:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:45
David Nathans is a security professional with Siemens Healthcare where he specializes in medical device security. He has extensive experience in building security operations centers (SOCs) and cyber security programs. As the author of Designing and Building Security Operations Center and an original member of the first cyber squadron of the Air Nat…
…
continue reading
1
Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation
42:15
42:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
42:15
Martin E. Hellman is Professor Emeritus of Electrical Engineering at Stanford University. A graduate of New York University, Martin went on to earn both a Master’s degree and Ph.D. in Electrical Engineering from Stanford. He is the author of over 70 technical papers, holder of 12 U.S. patents, co-inventor of public key cryptography, and the 2015 Tu…
…
continue reading
1
Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw
25:33
25:33
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:33
To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we’re flipping the mic. During the past decade, Dr. Gary McGraw has interviewed some of the security industry’s most influential gurus. A globally recognized authority on security and software, he is the CTO of Cigital and the author of eight bestselling books on software…
…
continue reading
1
Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices
28:07
28:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:07
As the Chief Architect for Security Products at NetSuite, Jacob West leads research and development for technology to identify and mitigate security threats. West has over a decade of experience developing, delivering, and monetizing innovative security solutions. Prior to his role at NetSuite, he served as the CTO for Enterprise Security Products …
…
continue reading
1
Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security
39:29
39:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:29
Gary talks to Jack Daniel, a leading technology community activist, about the evolution of the community-driven BSides Con, changes in the security field over the last decade, and his thoughts on where good security people come from. Jack is currently a Strategist for Tenable Network Security, and has over twenty years of experience in network and …
…
continue reading
1
Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development
37:23
37:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:23
Gary talks to Jamie Butler, a self-proclaimed “coder at heart,” about the importance of an offensive security approach, attack patterns, and his specialization in rootkit development. Jamie is currently the CTO and Chief Scientist at Endgame where he leads research on advanced threats, vulnerabilities, and attack patterns. He has directed vulnerabi…
…
continue reading
1
Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security
29:41
29:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:41
Gary talks to Dr. Doug Maughan about scientific research in computer security and its relationship to wider government efforts in security. Maughan is currently the Cyber Security Division (CSD) Director for the Homeland Security Advanced Research Projects Agency. With a Ph.D. in Computer Science and over 10 years of experience working with the Dep…
…
continue reading
1
Show 115: Peiter “mudge” Zatko Discusses the L0pht and Government Influence
38:33
38:33
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:33
Gary talks to Peiter Zatko, better known as “mudge” in hacker and security circles, about the evolution of the L0pht hacker collective and how his work in security influenced key agencies within the U.S. government to ramp up their cybersecurity efforts. During his time as a Program Manager with DARPA, mudge worked to fund much needed research for …
…
continue reading
1
Show 114: Peter Clay Discusses the Evolution of the CISO Role
31:26
31:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:26
Gary talks to the Chief Information Security Officer of Qlik, Peter “Pete” Clay, who holds 20+ years of experience in technology growth and its relationship to security from a risk management perspective. Pete brings federal, public, private and start-up insight into the global security space. He shares personal lessons he has learned as a consulta…
…
continue reading
1
Show 113: Chandu Ketkar Discusses Software Security Best Practices
27:51
27:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:51
Gary talks to Cigital’s Chandu Ketkar. With 20+ years of experience as a developer prior to getting into security, Chandu brings a unique and enlightened view to software security. Chandu shares his insight into why developers and security experts struggle to get along, and offers a solution from the world of economics. He also provides lessons fro…
…
continue reading
1
Show 112: “Crypto Wars II” with Steve Bellovin and Matt Green
33:43
33:43
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:43
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices—specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat—has resurfaced the debate. FBI Director Comey and other law enforcement groups are conce…
…
continue reading
1
Show 111 – An Interview with Marcus Ranum
34:05
34:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:05
Has software security actually gotten worse? On the 111th episode of The Silver Bullet Security Podcast, Gary talks with Marcus Ranum, Chief Security Officer of Tenable Network Security. He is the inventor of both the proxy firewall and early-advanced intrusion systems. Gary and Marcus discuss the current state of software security, firewalls, de-p…
…
continue reading
1
The Middle East | Inside the Issues 5.25
47200:34:41
47200:34:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
47200:34:41
Traditions of colonialism, autocracy, the rentier state, clientalism, corruption and imagined history all contribute to the dysfunction of Middle East polities. In this episode, Michael Bell, Senior Fellow, Norman Paterson School of International Affairs, Carleton University, joins co-host Andrew Thompson, CIGI Senior Fellow, for a conversation on …
…
continue reading
1
The Middle East | Inside the Issues 5.25
15871:16:07
15871:16:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15871:16:07
Traditions of colonialism, autocracy, the rentier state, clientalism, corruption and imagined history all contribute to the dysfunction of Middle East polities. In this episode, Michael Bell, Senior Fellow, Norman Paterson School of International Affairs, Carleton University, joins co-host Andrew Thompson, CIGI Senior Fellow, for a conversation on …
…
continue reading