Troy Hunt on success

I enjoyed this recent piece by Troy Hunt, the celebrity creator of havibeenpwned.  He departs from his usual technical topics, instead discussing the skills he's had to practice in the last year to stay effective while under more stress.  Call it confirmation bias if you want, but I already believe in the strategies he describes - being goal oriented, thinking of setbacks and failure as normal, and stable routines.  

I especially like a new twist he adds to his goals:

Meet Regina

Regina HeadshotRegina is a rock of her community.  She has run a bakery/cafe in Memphis for 20 years, which now hosts some kind of event, group, or local music almost every night.  When she gets involved in a community cause, she often offers to host at the cafe.  She works hard to welcome everyone, and her customers are loyal.  Regina is proud of the difference she has made in the community and the re

Agile in a nutshell

A lot has been written about Agile and its faster and crazier sibling DevOps.  I won't repeat it all here, but I'm generally sold.  For those that aren't convinced or are trying to convince others, you may like this great infographic that explains the most important parts.  This time, it's an artist describing their process of creation, but the same lessons hold: failure (that is: a non-ideal outcome) is not shameful.  It is an inherent part of creation, and to think otherwise is just lying to yourself.  Building something of va

CSC 1.6: Standard Work

Ensure that unauthorized assets are either removed from the network, quarantined or the inventory is updated in a timely manner.

There are several standard processes that most organizations will need to keep the inventory healthy and credible.  Some can be integrated with existing processes, but none can be totally eliminated.  CSC 1.6 proscribes the largest and most important kind of standard work: triage.  

CSC 1.5: Useful Information

Ensure that the hardware asset inventory records the network address, hardware address, machine name, data asset owner, and department for each asset and whether the hardware asset has been approved to connect to the network. Ensure that the hardware asset inventory records the network address, hardware address, machine name, data asset owner, and department for each asset and whether the hardware asset has been approved to connect to the network.