רשומה נבחרת

Why managers are pushed away by Talents and Leaders

Here are the main points in this brilliant session by Ade McCormack on the new age of workplace, employment and skills

Managers were needed in the Industrial Age to keep an eye on employees that did not like the automatic tasks they had to do
Now automation took over those jobs

There is no room for laziness

The need is for talented people and leaders

Those are passionate people who are eager to do much more than any manager could demand

Talents look for innovation, mobility/flexibility/fun-ability , work/life balance, playing with other great people – all those so much worthy than money, yet so hard to create

When you create a great workplace, great people will join, driving great customers to you as they provide massive value

Nowadays risk is hooked to value

You have to bring risk into your work plans to make real progress

As you play in risky arenas you need some peripheral sensory – data about new risks

You need to spend time trying out the new risk related technologies even if there is no guarantee they will materialize into actual danger

Leaders must make sure their teams don't have any interference to gain and maintain a state of "flow" – joyful focus on exercising their maximum abilities

Treat your career as a lean startup – choose what you are passionate about, have great skills at, and got market demand for

Ask yourself everyday- am I working in a place that allows me to gain my maximum market value

How hard do you practice and learn to become world class in your arena?

רשומה נבחרת

Manager, just had massive layoffs in your team?

Here is your must do list, that is if you want to get the rest of your team get up from the ground…and get team work back in…

There are two words for you to burn into your mind: Empathy and Integrity.

1. Create a "black list" of the concerns, fears and frustration. Create a "white list" of recovery and progress items, that could take everyone forward.

2. Add your own "black" and "white" items (how will I succeed now as a manager? what new opportunities do I see in spite of this crisis?)

3. Get your trusted leaders to add more to the list.

4. Get the team together and read out loud the "black list". Then ask them to comment on it. If they don't, comment as if you were them. Then respond to each item. Then share the "white list" and get people to comment on it.

5. Let the team send more items via anonymous means.

6. Respond to the additional topics candidly. You are NOT wasting your time. You are actually saving time lost over fear and frustration water-cool discussions as well as slow and careless work, and contagious low moral.

7. Don't blame anyone for the getting into this situation, but do refer to what needs now be done. Otherwise all what your team will be doing, is arguing, defending and attacking.

8. If the "powers that be" made a mistake in going through the layoffs, discuss it with them, until you are convinced in the necessity of this painful act, or if they admit of their harm doing and aim to correct it, now or in the future. Only then you can stand up and gain your team's trust and energy. If you don't agree with the decisions taken, speak up and tell it to your team. You may get into trouble if you have unworthy management, and in this case, you are better off going somewhere else. You can't lead anyway, if you can't truly accept the decisions taken, or object them.

9. Acknowledge that these layoffs may have been reduced, if you had prepared your team, to be valuable for the next future challenges the company needs to tackle. Your team's career should go through an innovation process, same as products and services do. This means you should get your team trained in the realms that would turn their current expertise irrelevant. This also means team members would have to put into this learning process, extra work hours, to bullet proof their future.

Not every fear or concern can be resolved, but going through the steps I revealed here, will put you in a much better position, than most managers, right?

What would you add to this list?

רשומה נבחרת

How to Motivate with "AHA"i

In the following "What makes us feel good about our work" talk by Dan Ariely, there are few points worth contemplating:

Listen to this postClick Here to listen to this post: 

  1. Acknowledgement is critical, and should be exercised as much as possible. Even the simplest one, like saying "Aha", when your team member hands you over, their report, is powerful. If you want your team be as twice as productive as they are now, acknowledge them routinely. You don't need to make up things; you do not need to exaggerate. Simply make sure you clearly show you got it – they did a job, they invested the effort, they desire feedback. If you can thank them, do it. At the end of the week, just before we all go home, I thank each one of my team members, from the bottom of my heart, for the effort they have put during the week. It does not matter how many successes they had, it is all about the time, effort and good will they have put into their work. That way they go off to their weekend, charged with good feeling.
  2. Indeed tossing away an effort people put, is a major energy drainer. However ignoring people's effort is putting them down, almost the same as shredding their effort in front of their eyes. That's just to stress how much acknowledgement is important. And there is something else. When you do have to stop a project, cancel a work done, make sure you put enough energy beyond explaining why this need to be done. Make sure you acknowledge the effort put so far. People could reach 150% productivity, if you do your best to preserve their efforts, and it does not matter how much you pay them. So thank them and do the most to make use with what they built so far. Make sure this effort is communicated clearly. All this will put more fuel into your team's emotion al engines, as they take your ship to a new destination.
  3. It doesn't matter how much you pay people, if you don't acknowledge their effort. You can raise a salary once in a while, and still it would not matter as much as a much more frequent acknowledgement of people's efforts.
  4. If you have an advice to give or feedback to improve one's performance, they are still considered an acknowledgement and worth more than silence. Acknowledging people does not mean you should forget about mentoring and guiding.
  5. We value our creations much more than evaluators do – because we appreciate more what we put effort into. Make sure you kindly address this gap, as you go through a performance evaluation with your team. Otherwise people will think your review of their performance is too critical.
  6. In the past decades we had Industrial Efficiency govern our work methodology: we preferred everyone repeatedly does just part of the complete creation process of our solution. However now we are shifting into knowledge economy. Now everybody can decide how much effort they put into their work. Consequently success depends on your team's willingness to invest more acquiring and purifying information. You don't have the time, and sometimes you could even lack the means to properly measure the quality of the information, your team is creating. So you want them be emotionally motivated to invest the extra effort. Even if they must focus on a repetitive job, at least give them a prospective of its overall project, and an opportunity to speak out their advice, beyond their current role. This means you have to extend into the following areas. Note that each one of those deserves a whole article.
  7. Meaning – Creating a powerful meaning or Context for the job to be done.
  8. Creation – Let your team feel they own the creation of the solution.
  9. Challenge – Take your team through challenges, so they can experience personal growth.
  10. Ownership – Make sure your team see themselves as the source of everything that happens as they ship their solution.
  11. Identity – Make sure your team can see themselves and their job as one.
  12. Pride – Set the opportunities for your team to see the gradual progress they gain. Acknowledge them for their uniqueness and efforts.

As you watch the video, let me know if you see more that we should look into…

רשומה נבחרת
GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part Three (Apple)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

This is chapter 3, here is where you can find The first chapter of this Big Data Sci-Fi Novella (Eve)

Chapter 3: Apple

GENESIS - Big Data Super Nova - A Sci-fi Tech Novella, Chapter 3: Apple

Listen to this postListen or Download audio of this chapter here: 

It was the 1st of April 2013.

One year before, there were rumors that the world is going to end, that is, if you believed the ancient Mayan literature.

It turned up to be a bit later and more digital than physical.

Back then, social networks such as “Facebook” and “Twitter” allowed people to share their thoughts and feelings through external personal outer-body devices.
People called those cumbersome ugly devices “iPhone” and “Android”.

Everyone was hooked to those networks. Companies started letting people get access to services, based on their always-on authentication, to the social networks.
But people were using “Pass-words” to get connected to the social networks. They chose easy pass-words and did not care replacing them occasionally.

So if you found out one’s social network password (let’s say on Twitter), you also got access to any other service they had authorized (O-AUTH) to get logged on to, based on authentication token stored in their Twitter account.

Basically if you had someone’s twitter password, you could buy stuff and have them pay for it, look at the medical records, and review their personal assets. You actually became them.

When the big Digital Tsunami happened, it started by a huge surge of credit card and bank transactions fraud. Then as money pore into the attackers bank accounts (there were many used, so you could not track a single source), it started spreading away as a massive purchase wave.

Amazon, eBay and similar services were hammered with endless waves of purchases, and then rebounded into cancellations. Everyone tried to cancel the fraud purchase attempts.
There were similar attacks on health, government, manufacturing and other essential services, all directed to make them useless.

Later on this kind of attack was labeled “Application Based Denial of Service” – where instead of driving lots of requests to a service, you would overload the remediation system of a service with transactions that require huge effort to remediate (such as reversing a fraud transaction).

There was lots of confusion and slow response, addressing the global, world-wide break-in, because of the miss-leading reports, that it was all a 1st April joke.

In less than one hour all the financial institutions, digital merchant and many other critical systems were completely ruined.

It took 4 months to get most of the damages fixed. But by then many lives were lost.
You could die, because you could not get food or medical treatment, or you could get attacked, by desperate people who tried to forcefully take what you had.

No Anti Malware system could find out the secret key-loggers which had everyone’s passwords, because they were part of many operating systems.

The attackers worked many years, getting to the right people in every operating-system manufacturer’s staff. Then the secret key-logger code was added to the operating system’s codebase. Every developer the attackers acquired, had to add or change just a small piece of code, entirely blind to the demonic intension driving all those small changes (Time Shifted Attack).

The attackers had even penetrated the NSA (National Security Agency) staff, and implanted their own code on top of the home-land security hooks. Those hooks were originally designed to allow law-agencies get access to people’s cloud stored data as well as communications, in case those people were suspects. Now those law enforcement hooks had a parasite code, wire-tapping everything, ready to spray all this information to the malicious crackers.

It all sat there, silent, waiting, collecting and using Big Data to analyze and further, and reveal additional access details. Gone were the days of brute force password cracking – you guess passwords much faster, using Big Data analysis.

And then it was time for the software octopus to wake.

It started ignition on March 13, and up it woke on April 1.

Adam recalled that there was one more important event which took place on the 1st of April 2013.
The “Naturalists Group” was born.

The attack was carried on through Windows, Linux, Oracle, Java infrastructure suppliers and Cloud Providers.
Cloud services failed one by one and the true lack of the Cloud concept was revealed: We did not have “The Cloud”. What we had was many disparate cloud services, each one with its own weakness and finalized amount of resources.

Each Cloud provider had a final central set of “engines” operating all its services, which could easily hacked and brought down, essentially making it useless.
You really had nowhere to fail over to.

The lack of Data Integration was apparent across Big Data archives, so you couldn’t really see what was going on. We had no “Big Eye in the Sky”, no “Digital Defense Satellite”, watching our data and computers.

That was the day when true “Universal Computing” and the “Neuro-Fibre Net”, were born.

Lots of server systems halted that day, and many personal devices got their share of blackout as well.

But most of the victims had the mobile device of choice of that time.

It was produced by Apple.

Get additional chapters by reading the book by Clicking Right Here

רשומה נבחרת
GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part Two (Adam)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

Previous Chapter is here (Eve)

Chapter Two: Adam

GENESIS – Big Data Super Nova – Part Two (Adam)

Listen to this postListen or Download audio of this chapter here: 

He didn’t like to Wake-on-LAN people, although Eden Industries code of conduct allowed it, in case of emergencies.

As a Naturalist, long term member of the “Real Thing”, the last thing he wanted is any relation to using inter-body Nano bots or other artificial enhancements.

Adam was 27 years old, and preferred to die young, rather than have his body parts replaced by bot parts.

After 200 hundred years or so, no bot can keep your body alive, and you have to mind-beam yourself into the mind cloud, that is, if you discount the choice of artificial body part replacements.

The other option is to use a whole body replacement.

“That’s when you fully stop being a human, turning yourself into a dumb robot”, he thought. You look like a Frankenstein, no matter how precise your human body imitation is.

Of course, your mind is still there, if you don’t mind an emotional glitch here and there, since data loss can happen when your brains is scanned.

“Nothing is perfect, including 3-D brain scanners.”

Thinking about the Nano Mind- Scan bots crawling through his brain, as they turn mind into data, turned Adam’s brown eyes even darker.

“I don’t mind being a bit over-weight and baldy, or even called ‘Slow Thinker’. I won’t let any of those crap bots get under my skin”.

Eve looked always in great shape. But she never had to actually make an effort to look good. Her Muscle Trainer bots did all the work.

Eve was 20 years older than him, and still looked like she was in her early twenties.

“But she was not real. Not a real human being. And still I like her a lot.”

Then he felt ashamed for waking Eve by communicating the alert message, through her Inter Body Bots.

But he didn’t have a choice.

There was no time to wait, as more reports came in, it turned up to be a huge disaster.
He recalled the last time a global alert was broadcast on planet earth.

This time it was worse, enormously worse.

Get additional chapters by reading the book by Clicking Right Here

רשומה נבחרת
GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part One (Eve)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

Listen to this postListen or Download audio of this chapter here: 

Chapter 1: Eve

Eve woke up.

But as she puffed her dark long hair off her face, she felt strange, a sense of fuzziness.
The inter-body adrenaline injection Nano system did its job and she opened her eyes.

GENESIS - Big Data Super Nova - Part One (Eve)

“No need for Alarms clocks any more”, she thought.

Then she felt as if she lost it.

It was as if her thoughts got encrypted through an SSH5 Gateway so she could not really understand what she was thinking.

Lights came up, as the under-skin environment communication Nano chip sent the message about her awakening to her room’s climate control unit.

But she was still lost.

Her body was still awakening, eyes turned purple, muscles twitching, heart beating faster.
But none of this was in her control. The Nano bots were doing it all.
No one needed to use contact lenses to get their choice of eye color, or go to the sea to get their body’s skin tanned.

Well except the Naturalists of course. They were objecting just any kind of body enhancements.

Then suddenly, as if someone hit the lights on, Eve was really awaken.
Her first thought was “It is too early”.

Then the Red Blinking message appeared right in front of her eyes, blinking, mesmerizing.

“From: Adam@eden-industries.com
Subject: Big trouble Boss
Better get here right away, while you still can.

That’s why she lost it for a moment.
There was no time for the usual gradual wake up.

Adam had probably activated the Emergency wake up process, communicating the secret “Wake-on -LAN” message right into the Nano chips in her body.

“I hate it”, she thought. “And I don’t have time to get to the office."

"I have to mind-beam”.

Get additional chapters by reading the book by Clicking Right Here

Karate SQL? KSQL vs. Kafka Streams

Just kidding -:) No Karate SQL I am aware of..

Naturally you would use Kafka Streams if your code runs on Java where your code requires SQL like access to the data.

"Kafka Streams is the core API for stream processing on the JVM: Java, Scala, Clojure etc. It is based on a DSL (Domain Specific Language) that provides a declaratively-styled interface where streams can be joined, filtered, grouped or aggregated using the DSL itself. It also provides functionally-styled mechanisms — map, flatMap, transform, peek, etc"

(Building a Microservices Ecosystem with Kafka Streams and KSQL
via Instapaper)

Checkout KSQL, the Kafka Streams client for cases where you want to run SQL queries vs Kafka outside a JVM.

You can set a KSQL container as a side car along with your app container and let the app act upon regular Kafka Topic events, discarding the need for the app to deal with the data query logic needed to find relevant data off the stream.

Example: Your micro service needs to act upon a new customer order. Your sidecar container will run KSQL DSL select and stream only relevant event data to your app one at a time (configurable).

KSQL will get a copy of the same data across your micro services replicas.

Sounds like fun? Well because it is!

Maybe it should be called Karate SQL after all..


If you use AWS, and need Kafka (otherwise you would use AWS Kinesis), here is a nice basic starter automation for setting Kafka on AWS.

AWS Secrets… Yes!!

YES! ! AWS Secrets!!


I’d say secrets in parameter store are like Serverless credentials in Jenkins while secrets in secrets manager are like Serverless hashicorp vault. The difference for now is in the limits of use – SSM is free but would not work well when saturated with many calls – you are expected to use it moderately, while in AWS secrets you are not limited cause you pay. I believe in the future AWS secrets will be more feature-rich.

Kubernetes 1.9 admission extension – What is it?

Kubernetes 1.9 includes powerful admission extension abilities that are part of the golden principles Kubernetes is being built on – you want to look for those principals in other solutions you are considering.

What is Admission?

Admission is the phase of handling an API server request that happens before a resource is persisted, but after authorization. Admission gets access to the same information as authorization (user, URL, etc) and the complete body of an API request (for most requests).

What are they good for?

Webhook admission plugins allow for mutation and validation of any resource on any API server, so the possible applications are vast. Some common use-cases include:

Mutation of resources like pods. Istio has talked about doing this to inject side-car containers into pods. You could also write a plugin which forcefully resolves image tags into image SHAs.

Name restrictions. On multi-tenant systems, reserving namespaces has emerged as a use-case.

Complex CustomResource validation. Because the entire object is visible, a clever admission plugin can perform complex validation on dependent fields (A requires B) and even external resources (compare to LimitRanges).

Security response. If you forced image tags into image SHAs, you could write an admission plugin that prevents certain SHAs from running.

More information here: http://blog.kubernetes.io/2018/01/extensible-admission-is-beta.html

Redhat Cloud Forms takes a bite into Cloud and Configuration Management

The latest Cloud Forms from Redhat targets the easy use of AWS Cloud Formation and OpenStack Heat templates import, customization, creation, deployment.

It offers a service catalog of Cloud resources setups including load balancers, servers and more.

It also makes it easier to customize your Cloud templates by offering forms and variables per the templates you pick.

Then it triggers Ansible Tower for in depth deployment and configuration management of your instances.

The Cloud Management portal shows you your Cloud components, instances, operating systems and applications including general Linux and Windows as well.

Sounds perfect?

Maybe it sounds like an enterprise vendor trying to grab it all..and maybe this time this vendor actually makes it..

I still would like to see TerraForm there as well..

Anyway there's the video