Nesting and Networking

Three years ago at the Heathrow airport, the handle on my roller bag snapped, and my luggage leaped to its death on a series of stairs. Trauma is a good source of writing inspiration as evidenced by the subsequent article that documents my obsessive compulsive travel habits.

One other habit I neglected to document was that whenever I arrive in a new hotel room, I follow the same pattern. I examine the room and assess the view, the bed, storage, and the bathroom. I sigh when there is no bathtub; I do a little dance when the minibar has Pringles. After an assessment, I immediately unpack. No matter the degree of jet lag, I unpack.

Nesting describes this compulsion. As an introvert who is deeply concerned with the precise location of all my stuff, the process of unpacking gently places me in my temporary home.

Unpacked? Good. Not done, yet.

Next up, I assess the network. Once I jump through whatever login hoops the hotel has presented me, I run Speed Test to assess both ping, download, and upload speed. This quick test gives me a high-level assessment of my potential network comfort while in my temporary nest. Worldwide, wireless networking and networking has vastly improved over the last five years. Not only do I now expect download speeds of 10+ megabits per second (Mbps), it’s usually much faster.

In the infrequent case that something smells off in the network, I perform a deeper triage. My old lame move here used to fire up terminal and type “ping” The new hotness is MTR. Written in 1997, MTR combines the functions of traceroute and ping and “probes routers on the route path by limiting the number of hops individual packets may traverse, and listening to responses of their expiry.”

It looks like this:


What you see in the image is both the route to Yahoo and all the results of pings to all of the routers on that path. O

Most often, Speed Test tells me what I need to know about my network, but when something is off either in my temporary or permanent nest, MTR gives me a clearer picture of my network situation.

You can install MTR via brew. Once installed, here’s a handy bash alias to fire up MTR with minimal terminal fuss:

alias netwtf='sudo /usr/local/Cellar/mtr/0.86/sbin/mtr -n'

How to Recruit

From a recruiting perspective, the best engineering manager I’ve worked with established her reputation with two hires. It went like this: ME: “We need to build an iOS team, and while we have talented engineers, we don’t have time to train the current team on iOS, it’ll be faster to hire.” HER: “Great, who should… More

Managing Humans, Third Time’s a Charm

I’ll have more to say about this topic later this week1, but the third edition of Managing Humans is out there. I updated the now rather silly site which first promoted the first edition of the book. Briefly:

  • There are eight new chapters. It’s now 331 pages.
  • Two chapters are no longer present. #rip_crap_writing
  • The most fun I had was editing the glossary.

You can buy them in a variety of formats right here.

  1. I’m thinking a San Francisco-based book launch party? Are you in? 

The Situation

Pressure’s on. I can tell from the silence in the meeting that something is up. There is no how’s-your-weekend chat-chit and everyone slowly looks at each other wondering about the source of the suspense. I write the agenda on the whiteboard knowing that we’re likely not doing anything on this agenda because…. … there’s a… More

More Managing Humans

Last week, I signed off on the final proofs for the third edition of Managing Humans. I’ll have more to write when I’m holding the atoms in my hands, but briefly:

  • The 2nd edition had 44 chapters, this has 52.
  • Two chapters removed. 10 added. Those two removals were easy because they were simply awful.
  • By far, the most fun is editing the glossary because each time it’s a slightly revised lens into high tech. The first edition didn’t even have Apple. Why? Because I worked there.
  • Yes, there will be digital editions, but it’s more fun to hold a printed book in your hands.

I’m pleased chapters of the book that are holding the test of time and I’m looking forward to sharing it with you in a few weeks.


Turn on 2FA before it’s too late

Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required by an external force. This reactive strategy isn’t even a strategy; it’s just a bad idea.

This morning, I went through all the services I’m using and was impressed how many services had 2FA enabled and, more importantly, how trivial it was to enable. Here’s the list. Turn on 2FA now.

Two Factor Auth List is a comprehensive online resource that documents two-factor authentication for the bajillion sites I didn’t list above.

How I Slack

Each Slack team I’m on has a different set of humans building their own unique communication culture. I’m actively on six teams: SlackHQ, Leadership, Destiny, two private nerd Slacks, and a private family Slack. Three out of my six teams have 100+ active humans, 100+ channels, and are high traffic with hundreds to thousands of… More