Sabah Al Binali: Books to dip in and out of for success


  • English
  • Arabic

I have been writing predominantly about the management of other people and have for the most part neglected the equally important issue of managing oneself. Today, I begin rectifying that.

There are two main popular approaches. The first and older one is espoused by Stephen Covey in his seminal book The 7 Habits of Highly Effective People. The book is a little dense but imparts great value, and I highly recommend reading it – perhaps on an annual basis.

The main thesis of the book is that people had turned towards the "fast buck", which is based on show and manipulation rather than building a foundation of character. It intentionally does not talk about goals, which is why it is not titled The 7 Habits of Very Rich People, a title that would probably sell.

The habits, briefly, are: 1. Be Proactive, 2. Begin with the End in Mind, 3. Put First Things First, 4. Think Win/Win, 5. Seek First to Understand, Then to Be Understood, 6. Synergise and 7. Continual Improvement.

The first three habits make plenty of sense. Don’t sit in your office waiting for instruction, understand your goals and prioritise. These make complete sense.

Where the 7 Habits begins to fall short is on the next three habits, which detail how to interact with others. The advice given is great when you are dealing with decent people. But when dealing with a predator or narcissist these habits can get you into serious trouble. The 7 Habits does not deal with this issue thoroughly, and instead is based on the idea that people are all basically good. You don't need much evil to make your life a living hell.

The second major issue that I have with The 7 Habits is that it is long on philosophy and short on tangible plans. Even Covey, the author, recognised this and expanded the third habit, Put First Things First, into its own book to remedy this. But do you really want to read a book 90 per cent of which is originally from The 7 Habits? More about this later.

The other approach is the popular book Getting Things Done, popularly known as GTD, by David Allen. GTD addresses personal management from the opposite end of The 7 Habits. The philosophy is that anything that comes into your world, such as email, voicemail, a letter, etc, should be handled in one of three ways: 1. Action it, 2. Delegate it or 3. File it.

There is then an extremely detailed set of instructions. For action, if you can do it in less than two minutes, then do it, otherwise you “action it”. This is done by putting it into a context, such as online or calls, and then when you are in that context you execute it, eg you do all your calls that are in your call context.

This was initially helpful to me until I realised that this is not how I work. Let’s say I have several projects named A, B, C. If I make a call for project A I rarely then decide to make all calls for project B. When I’m in a project I don’t want to switch to an­other project just because it might have calls or emails etc.

The second problem of GTD is that it is nearly useless when looking at things at the project or even project portfolio level.

I picked these two books to start with for a simple reason – individually they have fatal flaws as a complete personal management system. But combined they can be quite powerful.

Habits 1 to 3 of The 7 Habits give you the foundation for developing your goals and projects. The second step would be what GTD espouses but dropping contexts and working within projects for large blocks of time. Habit 7 is of course always useful.

I strongly recommend both books, but experiment and keep what works for you and disregard the rest.

Sabah Al Binali is an active investor and entrepreneurial leader with a track record of growing companies in the Mena region. You can read more of his thoughts at al-binali.com.

business@thenational.ae

Follow The National's Business section on Twitter

Real estate tokenisation project

Dubai launched the pilot phase of its real estate tokenisation project last month.

The initiative focuses on converting real estate assets into digital tokens recorded on blockchain technology and helps in streamlining the process of buying, selling and investing, the Dubai Land Department said.

Dubai’s real estate tokenisation market is projected to reach Dh60 billion ($16.33 billion) by 2033, representing 7 per cent of the emirate’s total property transactions, according to the DLD.

SUE%20GRAY'S%20FINDINGS
%3Cp%3E%22Whatever%20the%20initial%20intent%2C%20what%20took%20place%20at%20many%20of%20these%20gatherings%20and%20the%3Cbr%3Eway%20in%20which%20they%20developed%20was%20not%20in%20line%20with%20Covid%20guidance%20at%20the%20time.%3C%2Fp%3E%0A%3Cp%3E%22Many%20of%20these%20events%20should%20not%20have%20been%20allowed%20to%20happen.%20It%20is%20also%20the%20case%20that%20some%20of%20the%3Cbr%3Emore%20junior%20civil%20servants%20believed%20that%20their%20involvement%20in%20some%20of%20these%20events%20was%20permitted%20given%20the%20attendance%20of%20senior%20leaders.%C2%A0%3C%2Fp%3E%0A%3Cp%3E%22The%20senior%20leadership%20at%20the%20centre%2C%20both%20political%20and%20official%2C%20must%20bear%20responsibility%20for%20this%20culture.%C2%A0%3C%2Fp%3E%0A%3Cp%3E%22I%20found%20that%20some%20staff%20had%20witnessed%20or%20been%20subjected%20to%20behaviours%20at%20work%20which%20they%20had%20felt%20concerned%20about%20but%20at%20times%20felt%20unable%20to%20raise%20properly.%3C%2Fp%3E%0A%3Cp%3E%22I%20was%20made%20aware%20of%20multiple%20examples%20of%20a%20lack%20of%20respect%20and%20poor%20treatment%20of%20security%20and%20cleaning%20staff.%20This%20was%20unacceptable.%22%C2%A0%3C%2Fp%3E%0A
Who's who in Yemen conflict

Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government

Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council

Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south

Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory

Meghan%20podcast
%3Cp%3EMeghan%20Markle%2C%20the%20wife%20of%20Prince%20Harry%2C%20launched%20her%20long-awaited%20podcast%20Tuesday%2C%20with%20tennis%20megastar%20Serena%20Williams%20as%20the%20first%20guest.%3C%2Fp%3E%0A%3Cp%3EThe%20Duchess%20of%20Sussex%20said%20the%2012-part%20series%2C%20called%20%22Archetypes%2C%22%20--%20a%20play%20on%20the%20name%20of%20the%20couple's%20oldest%20child%2C%20Archie%20--%20would%20explore%20the%20female%20experience.%3C%2Fp%3E%0A%3Cp%3ELast%20year%20the%20couple%20told%20Oprah%20Winfrey%20that%20life%20inside%20%22The%20Firm%22%20had%20been%20miserable%2C%20and%20that%20they%20had%20experienced%20racism.%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3E%22I%20don't%20ever%20remember%20personally%20feeling%20the%20negative%20connotation%20behind%20the%20word%20ambitious%2C%20until%20I%20started%20dating%20my%20now-husband%2C%22%20she%20told%20the%20tennis%20champion.%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3E%3C%2Fp%3E%0A
WHAT%20IS%20'JUICE%20JACKING'%3F
%3Cp%3E%E2%80%A2%20Juice%20jacking%2C%20in%20the%20simplest%20terms%2C%20is%20using%20a%20rogue%20USB%20cable%20to%20access%20a%20device%20and%20compromise%20its%20contents%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20exploit%20is%20taken%20advantage%20of%20by%20the%20fact%20that%20the%20data%20stream%20and%20power%20supply%20pass%20through%20the%20same%20cable.%20The%20most%20common%20example%20is%20connecting%20a%20smartphone%20to%20a%20PC%20to%20both%20transfer%20data%20and%20charge%20the%20former%20at%20the%20same%20time%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20The%20term%20was%20first%20coined%20in%202011%20after%20researchers%20created%20a%20compromised%20charging%20kiosk%20to%20bring%20awareness%20to%20the%20exploit%3B%20when%20users%20plugged%20in%20their%20devices%2C%20they%20received%20a%20security%20warning%20and%20discovered%20that%20their%20phones%20had%20paired%20to%20the%20kiosk%2C%20according%20to%20US%20cybersecurity%20company%20Norton%3C%2Fp%3E%0A%3Cp%3E%E2%80%A2%20While%20juice%20jacking%20is%20a%20real%20threat%2C%20there%20have%20been%20no%20known%20widespread%20instances.%20Apple%20and%20Google%20have%20also%20added%20security%20layers%20to%20prevent%20this%20on%20the%20iOS%20and%20Android%20devices%2C%20respectively%3C%2Fp%3E%0A