Promising Practices Promising PracticesPromising Practices
A forum for government's best ideas and most innovative leaders.

How to Get Stuff Done: Make Your Lists Short and Strategic

ARCHIVES
Andrey_Popov/Shutterstock.com

Even Andrew Carnegie understood the power of making a list. In an anecdote detailed in the book, Good Strategy Bad Strategy, management guru Richard Rumelt writes:

It was 1890, and there was a cocktail party here in Pittsburgh.  All the movers and shakers were there, including Carnegie.  He held court in the corner of the room, smoking a cigar.  He was introduced to Frederick Taylor, the man who was becoming famous as an expert on organizing work.

‘Young man,’ said Carnegie, squinting dubiously at the consultant, ‘if you can tell me something about management that is worth hearing, I will send you a check for ten thousand dollars.’

Now, ten thousand dollars was a great deal of money in 1890.  Conversation stopped as the people nearby turned to hear what Taylor would say.

‘Mr. Carnegie,’ Taylor said, ‘I would advise you to make a list of the ten most important things you can do.  And then, start doing number one.’

And, the story goes, a week later Taylor received a check for ten thousand dollars.

The benefit to Carnegie was not from the list itself, but from constructing the list. Writes Rumelt: “Attention, like a flashlight beam, illuminates one subject only to darken another.  When we attend to one set of issues, we lose sight of another…Taylor’s assignment was to think through the intersection between what was important and what was actionable.”

If each of us would think through what is both important and actionable in our lives, and then take strategic action, we would probably be more effective in meeting our realistic personal goals.

In the words of Rumelt: “Simply being ambitious is not a strategy.”

(Image via Andrey_Popov/Shutterstock.com)

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.