Showing posts from November, 2023

Programmers' Credo: "We do these things not because they are easy...

Yet another tool in our understimation arsenal. We do these things not because they are easy, but because we  thought  they were going to be easy. This applies to more than programming.  I'm looking at you, my most recent repair project. Credit goes to Jeff Atwood  around 2016 Revision History 2023 11

The Crucible - Heating up teams with an agile coding dojo.

An Agile coding dojo is a technique that can be used to create high-pressure software development situations at the team or project.  That pressure exposes weaknesses and forces change and adaptations in short iterations. The idea is to change the game and accelerate the lifecycle to force behavioral change. It is a crucible where you either learn to deal with transparency and change your model or you fail.  A coding dojo is a local optimization. The crucible operates at the team or set of teams level. It creates individual team cohesion and learning. It keeps the overall organization the same. It can only be the crucible for organizational change if more strategic and systemic re-forging is done above the effort. I was once involved in a 6-week Agile coding dojo where we compressed our standard 2-week iterations into 2.5-day iterations. All the work of a Scrum-style sprint in 2.5 days. Teams had to break down their work into smaller chunks and become fast at estimating, planning, and

The Crucible - Reforming an organization with heat

A  crucible  is where you melt down your existing metal and add new metals to create and cast a different alloy that fits the current need. This is often the only way to reshape an organization for the future. Major changes driven by external forces require dramatic adjustments outside the standard processes in order to drive change at a faster pace.  Corporations and groups are like an alloy comprised of the company's stated culture, its actual culture, and the attitudes and beliefs of the people who work for it.  The initial cast defines how a company operates and determines how it succeeds or fails. Big changes require attacking that historic casting. Mature organizations struggle with deep change because they have hardened around policies and behavior that are broadly executed but may not be well understood. There is strength in this as it can resist or overcome transient business, regulatory, or economic issues. That strength is a weakness that makes it difficult to adapt and

Home FIOS Network - Exploring the 4 boxes and their connections

We have Verizon FIOS with cable TV service.  I've never really paid attention to how the Verizon side is wired up until Verizon recently upgraded my FIOS router and tuner box. After breaking my TV tuner by disconnecting an " unneeded" connection, I created  yet another diagram of how the FIOS connections work. This is a basic wiring diagram of the house network missing a bunch of devices. Verizon ONT The Verizon optical network terminal converts the optical connection into TV and network standard connections.  The ONT is actually two boxes in my situation.  One outside connects to the optical and one inside converts something into an Ethernet WAN connection.  This results in me connecting a TV COAX and an Ethernet WAN. Verizon TV Tuner The Verizon TV tuner decodes and decrypts TV data that it receives over coax. The TV tuner must talk back to Verizon for any video control operations. It could talk back wireless, over an extra ethernet connection to back over the coax cab

Microsoft Authenticator Push Notification Variations

Have you ever noticed some behavior that made you think "That's different"?  I noticed this with push notifications a while back. Microsoft supports more than one Push Notification usage pattern in their Microsoft Authenticator application. Sometimes you will see more than one of them with the same account across different sites within the same organization. Push Notifications are more integrated with the authenticator application.  The server indirectly sends a message to registered Authenticator applications.  The user interacts with the Authenticator app and the app sends the response back to the server. MFA happens in the authenticator app from the human's point of view. Microsoft Authenticator also supports TOTP tokens as an alternative to Push Notifications. TOTP generates numeric sequences that can be used as part of MFA.  Numbers change on a regular cadence.  The user provides the current token value shown in the Authenticator app when a server asks for MFA da

Presentation and Communications Checklist

Make a checklist and review it before, during, and after creating a presentation. Here are 4 things that I have to remind myself whenever I create a presentation or information transfer content. What are the top 3 things you wish to communicate? Who is the Audience? What outcomes are you trying to achieve? How will the materials be used over time? Click to Enlarge The mindmap was created in Mural .  You may be able to see it  with this Mural link  if it hasn't yet expired. Video Partial transcript The following text is from the talk transcript and require clean up. This is really about how we're going to communicate? When we communicate with other people, we create a presentation or create some type of canned or interactive communication. What are the things we should think about? What are the kind of checklists we should have to make sure this communication is going to work the way we want? This really came out of reviewing a PowerPoint presentation. There were parts of it