OSCON 2007: People Hacks

Adam Keys is a software developer and writer. His blog is at therealadam.com.

In this talk, Adam presented a number of methods for effective advocacy and for getting along with other developers. In other words, interacting with people is as important as interacting with hardware or software. Problems in this sphere have no technical solution — they require a social one. Thus, the idea of ‘people hacking.’

People hacking is not rooted in nefarious black-hat hacking, but simply in using tools of social jujutsu (sometimes on yourself, even) to gain traction for ideas you’re trying to advocate. Paying more attention to the people side of things can help you build the kind of integrated, smoothly functioning team capable of executing (to borrow a basketball metaphor) the “no-look pass.”

A few sample ideas included:

  • Simply smiling — makes yourself and people around you feel more positive
  • Avoid negativity — try the ABBA Method (see the slides for details)
  • Avoid criticism
  • Compliment before criticizing

Some ideas followed about how to deal with jerks in your organization, including the simple-but-effective “No Asshole Rule” (from the book of the same name) that encourages a zero-tolerance toward asshole behavior in your group — even from so-called superstar programmers.

Adam also encouraged a little self-evaluation to determine if your yourself may be a recovering jerk, and that by focusing on improving your ability to working well with those around you, you can also reform yourself.

Adam has his slides available online here.


Category: open source Time: 2007-08-04 Views: 1

Related post

  • How do people hack iPhone games so easily? 2014-02-11

    I have seen high scores of 999,999 on Flappy Bird as well as many other impossible high scores on games such as Temple Run, etc., on iPhone and iPad. How do people hack these games so easily when they cannot see the source code? It seems like they kn

  • OSCON 2007: The Holistic Programmer 2007-08-04

    Adam Keys is a software developer and writer. His blog is at therealadam.com. The days of one guy putting together all the hardware and software together by himself in his garage are long gone - working with computers increasingly means doing somethi

  • OSCON 2007: Open Design, Not by Committee 2007-08-07

    Ted Leung is a Senior Engineer at OSAF, and blogs at Ted Leung On The Air Mimi Yin is a UI Designer at OSAF (Disclaimer: I work at OSAF on the Web UI for Chandler Server.) This talk centered on the open design process used by OSAF in developing both

  • Display results sorted by name in SharePoint 2007 people picker? 2010-09-20

    When searching through the people picker, results are sorted by their account name and not by their display name. Is there any way to change this behavior? --------------Solutions------------- PeopleQueryControl using SPUtility.SortPrincipalInfo() me

  • Sharepoint 2007 - People and Groups - Add Separate Editable 'Notes' Column 2011-11-09

    Is it possible to add a column to a List of People/Groups that is basically a 'Notes' column which isn't attached to their Active Directory data (and is editable)? --------------Solutions------------- Not sure if I understand you correctly, buy here

  • how to stop people hacking a website build in cakephp with linux host 2014-03-28

    I have been wondering how to stop intrusion/hack in a website build in cakephp. The neccessities that I have done so far are updated framework strong password frequent password change removed default username from root to user from config.php file in

  • OSCON 2007: Windmill: Automated Testing of Your Ajax Web Applications 2007-08-04

    Mikeal Rogers is a QA Development Engineer at the Open Source Applications Foundation, and has a blog at semanticmikeal.com Adam Christian is also a QA Development Engineer at the Open Source Applications Foundation. His blog is at t0asted.com (Discl

  • OSCON 2007: Managing Technical Debt 2007-08-04

    Andy Lester is with the Perl Foundation, and maintains a blog at petdance.com. Andy's talk gave practical advice for catching up on all the tasks you put off until some later date (that inevitably never comes) - stuff like postponed docs, fixing brok

  • OSCON 2007: Adventures in Localization 2007-08-04

    Wil Clouser is a Web Developer with the Mozilla Corporation, and blogs at Micropipes::Blog. Mike Morgan is Manager of Web Development at Mozilla Corporation, and has a blog at morgamic.com. This talk described the process of internationalizing Web pr

  • OSCON 2007: High Performance Web Pages 2007-08-07

    Steve Souders is Chief Performance Yahoo at Yahoo. Talk focused on optimizing performance of client-side code, which - surprisingly - makes up 80-90% or more of the user wait time. Steve ran quickly through 13 basic rules for high-performance Web sit

  • Can databases alone host a hack? 2009-10-17

    I was hacked recently. The hack seems to redirect any site on my server to a fake virus site. So I deleted all my website files and the hack seemed to go away. About a week later, it's back -- the same one. I never deleted my databases, but also neve

  • Why is my router admin account able to be hacked so easily? 2013-09-28

    I was messing around with my settings on a old D-LINK DIR-600 wireless router. I've been tweaking the settings a bit for various purposes. So when I recently go to type the first few digits of the IP address, but then autocomplete shows me the rest o

  • Can people access the Android realm file easily? 2016-01-19

    Can people hack the realm file to get the data in Android apps? I need to have a persistent object to save data to, so users can load it back when they restart. RealmConfiguration realmConfiguration = new RealmConfiguration.Builder(this).build(); /*

  • Is Movable Type among the most secure PHP blogs? How secure are the various PHP blog applications? 2011-03-10

    Basically I'm trying to find a blog for a website, and security is the highest priority in our case. We don't need any features that I would imagine are special. Wordpress was our first idea, but its reputation precedes it, and though it may have cle

  • How to set password on a folder in Fedora10 2009-11-20

    I have some useful documents inside a folder. I want to make the folder password protected. So that if i want to access the folder it will prompt for my password. --------------Solutions------------- not sure it's possible this way, but you can try f

  • When is it okay to ship a product with a known bug? 2011-03-11

    When is it okay to ship a product with a known bug? --------------Solutions------------- I assume you are talking of a "known" bug (the question is meaningless otherwise). Well, the answer depends on these factors: 1) Who is the user and how wil

  • XNA and C# vs the 360's in order processor 2011-06-27

    Having read this rant, I feel that they're probably right (seeing as the Xenon and the CELL BE are both highly sensitive to branchy and cache ignorant code), but I've heard that people are making games fine with C# too. So, is it true that it's impos

  • How do I use a USB joystick to generate MIDI data to control audio apps? 2011-07-29

    I've read about people hacking joysticks to make a foot controller for audio apps by wiring up some robust switches to the circuit board. It's probably possible to do something with the joystick too. I'm just wondering how you would convert this to M

  • How do you define elegant code? 2011-08-02

    Possible Duplicate: What does it mean to write "good code"? In a discussion on coding quality, and how you identify it, I came across a discussion on testing people's coding ability by getting them to show how they would swap two values using a

iOS development

Android development

Python development

JAVA development

Development language

PHP development

Ruby development


Front-end development


development tools

Open Platform

Javascript development

.NET development

cloud computing


Copyright (C) avrocks.com, All Rights Reserved.

processed in 0.451 (s). 13 q(s)