Browse Definitions :
Definition

Search Inside Yourself

Contributor(s): Ivy Wigmore

Search Inside Yourself (SIY) is a mindfulness and emotional intelligence training program created by Google for its employees in 2007. The company expanded the program into its non-profit Search Inside Yourself Leadership Initiative (SIYLI) in 2012 and made it available for individuals and organizations. SIYLI also offers certified SIY teacher training. SIYLI clients number in the thousands and include SAP, Salesforce, American Express, LinkedIn, Comcast, Cox Media, Ford, Qualcomm and Bloom Energy.

According to Bill Duane, a former lead engineer at Google, the company developed the Search Inside Yourself program to help employees deal with the massive upheaval in the workplace caused by disruptive technologies. In particular, Duane said, it was essential for employees to maintain – or achieve – feelings of psychological safety in the midst of so much disruption.

Feeling safe afforded employees the mental equilibrium necessary to remain creative and innovative in that environment. Another benefit is improvements to workplace relationships. After taking a mindfulness training course at work, Duane was so impressed by the improvements to his work and work experience that he changed positions to lead development on a program that led to Search Inside Yourself.  

Search Inside Yourself is also a book by Chade-Meng Tan, one of the founders of personal growth programs at Google.

This was last updated in December 2018

Continue Reading About Search Inside Yourself

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close