post

Accomplish more by “Game-ifying” your Life

I love to work. I know this because I love games. The realization that a game is just work by another name has allowed me to be very successful at task oriented projects just by shifting my perspective slightly. Games may seem frivolous and immature, and yet some players take absolute delight in creating complex spreadsheets to optimize virtual services and manage intangible revenues. For whatever reason this type of work is interesting, refreshing, and addictive. However, when incorrectly used these mechanisms can cause a negative impact. As a college student I found myself building programs in Java for my computer games while my class projects continued to fall behind. This 3 am realization couldn’t save my report, but it helped set the framework for breaking that cycle.

The essential question for parents, managers, and even for yourself is what compels people to do one task over another. If work is differed for something else, work needs to emulate key characteristics seen elsewhere. People often choose games because the work is measurable, goals are clear, and players are left with a sense accomplishment.

So what are some ways in which we can game-ify our work? One method many people use is creating a rewards system. Treating yourself to a reward after large accomplishments can help cement intangible successes. Society has been doing this for years by presenting stickers, sweets, and golden stars to kids who behave well. But in games people do not receive tangible rewards and continue to spend hours toiling at games to receive virtual prizes. I have been using the “Habitica” to-do list which uses my short terms goals in a game environment. As I do chores and complete real work my avatar levels up. While I concede that wanting pixels to ride an undead dragon is silly; I’m not sure that anyone can argue the 12 hours of exercise, 4 technical books, and 14 home cooked meals it took to receive that dragon wasn’t work.

Clear and obtainable goals can help build momentum and get past the initial hump. Setting a timer has been a classic method for ensuring practice is done. Ray Bradbury attributes the quick competition of his novel Fahrenheit 451 to being forced to use a pay by the hour typewriter. A more modern approach is the pomodoro timer which simply has the person work on something for 25 minutes, and then take a 5 minute break. This can be a great tool for setting up work. As you are planning goals breaking down work into 25 minute bitesize tasks forces them to be clear, such as write for 25 minutes or find 5 citations. Additionally, with a deadline looming, even one that is self imposed, people work harder to “beat the buzzer”.

The sense of accomplishment that the player experiences is perhaps the most compelling aspect of the game. After completing a set of grueling tasks they see that they have changed the environment. The same thing can be said for work. Simply letting people see what they have accomplished, or going out of the way to see what you have just accomplished, is very motivating. If there is not a way for an employee to do this, or way for you to see this they will likely find less meaning in their work.

As the gaming industry continues to advance there are discussions about how to design better games and how to immerse players. Those same rules and designs can form a framework on how you work and motivate yourself in life. While it might not work for everyone, game-ifying my life has helped tremendously.

post

Avoiding the Stigma of Technical Debt

“Technical debt” is the sin of a company not investing in technology, which like not paying off a credit card, causes costs to spiral out of control. The theory goes, as the technical debt increases, projects take longer with more difficult and frequent problems. The cycle is repeated and feeds upon itself, causing harm and strife to companies that fail to maintain a standard of technology. Therefore, a company could reasonably conclude that the only sound business decision is to eliminate “technical debt” by prioritizing technology growth. However, it is only one consideration of a very complex problem. Luckily, problems like these have been solved for years. “Technical debt” is a simply a new way to state that there is “opportunity loss” when systems aren’t upgraded .

A standard to prevent technical debt is not explicitly stated and is inherently vague. This is troublesome because companies can also face overspending by leaning too far forward, innovating new technologies out of fear. Being the innovator can have burdensome costs if your business model now depends on discarded technologies like Betamax, HD-DVD, or AppleTalk. They are left paralyzed by indecision, stuck between the risks and costs of adapting early or the safety and thrift of integrating later.

Instead of waiting until the accumulated debt arrives, be bold and see where you can find opportunity instead of blindly chasing technology. Find a business impact that improves with new technology, create a small task force to test it, and determine if it can achieve a concrete goal. Technology is cheaper to implement, faster to setup, and more scalable than ever before. Gathering evidence, especially evidence that directly helps the bottom line, will help drive wise technology investment with enthusiastic executive support.

“Technical debt” is an easy way to state the dangers of underinvesting in technology. However, to build a complete narrative, stay engaged with the groups you’re supporting and give evidence of the new opportunities available by adopting new technology.

post

Love the Hacker, Hate the Problem

Hackers have been receiving quite a bit of bad press recently. Cryptocurrency blackmail, planes flying sideways, and cars driving into ditches all help sell an image of hackers as mercenaries and anarchists, but it ignores the motivations of countless individuals tinkering with systems in positive ways. The drive to emphasize “malicious” hackers trivializes their real capability to solve problems which arise from society’s reliance on incredibly complex systems, which can fail at the speed of light.

Good employees need to be able to understand a system of processes, and then alter those processes to benefit their goals. However, great employees are the ones able to see through the sea of competing processes and identify the friction. This is a defining trait of a hacker, the ability to fall in love with this sea of unknowns, study it with devoted reverence, and perhaps even zealotry. Does this level of dedication make some people feel uncomfortable, despite the good works that are accomplished?

It appears to be perfectly acceptable for web articles on food hacks, management hacks, and dog care hacks, which give insight to really difficult problems. These are just hackers of a fleshier science. While the difficulty of these topics is equivalent to most technology topics, such as packet routing or database normalization, it appears the mere mention of technology taints the conversation. Technology forms a mythos where the hacker is regarded more like a wizard than an expert in their field. This completely skews the tone of public opinion, and suddenly technical problems center on either the incompetence of developers or the selfishness of hackers wishing to trade public safety for profit/fame.

While hackers are at best the anti-heroes of the news cycle, the real villains are the problems lurking in the dark. Technologies constantly change creating problems we have not yet begun to imagine, however if we appreciate the complexity of the situation perhaps we would be more inclined to celebrate a hacker mindset.

The Security Aspect that OPM Investigators are Ignoring

While Congressional questioning and media interest has intensified, the focus of Office of Personnel Management(OPM) investigations concentrate on technical controls, avoiding entire swaths of security best pracVeterantices regarding data usage and retention. Did OPM adequately gauge the need for this massive warehouse of detailed personal information in the first place?

At the OPM hearing, Congressman Stephen Lynch lamented the amount of information collected, he pointed to a 127-page questionnaire and stated  “… we ask them everything. What kind of underwear they wear …” If a Congressman is joking about the excessive levels of detail in just one report, I wonder if any effort has been made to “right size” the data collected by OPM or the organizations they support.

Technical controls, such as implementing encryption and adding the new DHS Einstein, play a role in data security. However we have learned that sometimes such measures fail. This breach raises questions on how organizations can responsibly gather information on individuals. If we know controls fail, consideration should be given to collecting and storing only the most useful data, thereby reducing operating costs, risks and the impact of breaches.