Site Loader

Project warnings and feedback and and why they fail – and how to make it work – Part 1

f you asked a bunch of leaders at any level, if they would like to know when their teams first know when work efforts start to miss their targets – I expect all hands would be raised.

Similarly, if you asked any knowledge worker (at any level) if they would like more feedback from their boss, all hands would be raised.
From your perspective as a leader, you wonder why you don’t hear about problems until they are serious in nature. In a similar vein, strong professionals (at any level) wonder why they don’t get feedback until they have failed.

Test your Home Wi-Fi or LAN speed using a Docker image (iPerf3 speed test) on a Synology NAS

When you have slow internet speed, it can be a challenge getting remote work done, watching Netflix, or playing Call of Duty. The actual internet speed your computer has is a product of the slowest speed in the chain of connections from your provider, to your house, your modem (or whatever internet connection device you have), to your computer (or laptop/tablet/phone/etc).

Measuring Wi-Fi speeds in your house is important to determine if you have slow internet due to your own home setup.

Prioritization happens – no matter what you do

The top priority of any leader at any level should be to take care of their people and others around them. The remainder of the priorities that are invested in are some of the most important decisions leaders make.

Prioritization is key to success as a leader and a company. I’m going to bust some prioritization myths, get down to the roots of what prioritization is, why it is a critical aspect of strong leadership, and some methods of prioritization.

Did you just order your data encrypted, encoded, obfuscated, hashed, scrambled, salted, and peppered?

There are lots of cryptography terms that are thrown around and often misused. As someone who has been responsible for managing Compensation, HR, and Payroll IT systems one way or another for the past ten years at FedEx, I have a lot of experience protecting data. Part of my responsibilities has been to help my business partners understand the difference and value of each. In this article, I’m going to share some of my favorite concepts and in what context they apply.

By the end of this article, you will have a basic understanding of these terms:

Encrypted
Hashed
Encoded
Obfuscated
Scrambled
Salted
Peppered

Smart Homes – What you really want (you just don’t know it yet)

The real value of smart homes is smart device integration. Having your devices talk with each other and interacting is where the magic happens. If you are not home and you left the lights on or a door unlocked, having that taken care of for you is awesome. The more your devices can interact and respond to each other the more value you get out of your setup. I have several practical examples of how this can work for you.