Stop the Lies You’re Asking

Stop the Lies You’re Asking

We tell our children not to lie,
An “untruth” is unacceptable.
“Liars are very evil,” we say,
“Untrustworthy and not reputable.”

Adult practice is quite different however,
The virtue gets suspended.
“Does this dress make my butt look big?”
We all know what’s intended.

The truthful answer is always “no,”
You don’t want to blame the dress,
The clothing isn’t the devilish culprit,
It’s the amount of doughy flesh.

But you cannot tell the ultimate truth,
For fear of doing harm,
Better placate with a sheepish “No,”
Than lose a friend or arm.

One should not answer by being rude,
Use kindness in the reply.
Answer with their best interest in mind,
Don’t poke them in the eye.

But, if you don’t want my true opinion,
And just asking for affirmation,
By seeking an answer that isn’t truthful,
You lied by asking the question.

Posted in Human Algorithm Project, Philosophy, Poetry | Leave a comment

Out of the Shallows: Shout out to Nicholas Carr

Hello All! “The Shallows” by Nicholas Carr is a must-read. Enjoy this poem!

Out of the Shallows

Technology, Technology, Everywhere,
A modern-day ubiquity,
See the headlines of today,
Or the headlines of antiquity.

What a tool to have at hand,
So, much you can learn with ease,
Which fork to use when eating salad,
Or how to speak Japanese.

But the info’s always available,
The app is there in your hand.
Google for which fork to use,
Google Translate while in Japan.

See how smart we’ve all become,
Our intelligence is off the scale,
But even the most self-enlightened person,
Will stumble if their devices fail.

Long-term memory is a thing of the past.
Short-term memory is all we need,
A cell phone, an app, and a strong connection.
Preferably at 5G speeds.

We need to re-think this proposition,
Bring deep-learning back from the gallows,
Start using our long-term memory again,
And exit from the Shallows.

Posted in Human Algorithm Project, Philosophy, Poetry | Leave a comment

Perfection is NOT a Worthy Goal, It’s a Worthy Opponent

Perfection is NOT a Worthy Goal, It’s a Worthy Opponent

“Detail-oriented Perfectionist,” my resume exclaims!
I’ll “Dot those T’s and Crossed those I’s” and then I’ll sign my name.
Wait a minute! That ain’t right! That’s not how the saying goes;
It’s “Dot the I’s and cross the T’s” as everybody knows!

Enthusiasm is my problem, I hurry way too much,
Maybe a little less excited, Not in such a rush.
But then I’ll have no value; They’ll think that I’m a slacker,
I’ll lose their trust and confidence, then I’ll lose my backers.

Perfectionists see flaws in everything they’ve finished,
A minor imprecision means the whole must be diminished.
“Perfect is the enemy of good,” that is what they say,
Perfectionism must have it all, there is no other way.

So, let’s put Perfect where it belongs and treat rightly so,
It will battle hard against us, it is our common foe.
Don’t let Perfect consume you and take away the moment.
Perfection is not a worthy goal, it is a worthy opponent.

Posted in Leadership & Management, Philosophy, Poetry, Uncategorized | Leave a comment

Kicking off 2025 with a Poem: A Series of Simplicities

As we kick-off the new year, I hope this helps everyone relax and take it a small step at a time! It comes from a saying I have, “I don’t see complexity, I see a series of simplicities viewed all at one time.” Enjoy!

A Series of Simplicities

“I don’t see complexity,”
Now you think I am a dunce.
“I see a series of simplicities,
Looked at all at once.”

We constantly get the advice,
Break it down into smaller parts,
Something a whole lot simpler,
Something to match our smarts.

I need to drop my ego,
And truly embrace my smallness,
Taking the world a bite at a time,
Simply increases my calmness.

So I invite you to do the same,
See the simplicities around you,
You will increase your calmness as well,
And less in your world will confound you.

Posted in Human Algorithm Project, Philosophy, Poetry | Leave a comment

You are Keeping Score! Whether You Like It or Not!

You are Keeping Score! Whether You Like It or Not!

As a youngster, I was told, “don’t be judgmental.” The Bible verse Matthew 7:1, “Judge not, that ye be not judged,” was used as a guideline. Along with judgmental-ness, “holding a grudge” was also forbidden. “Just let it go” or “forgive and forget” were the common refrains. Phew, good thing I am neither judgmental nor a grudge holder. Wait, maybe I am; perhaps we all are.

Each day, we receive hundreds of transactions. These transactions include social media posts, road signs, music, odors from the cubicle next door, television, streaming content, conversations, etc. More subtly, transactions include the flicker of a light bulb, a sound from your car engine, or a sticky key on your keyboard. We judge these transactions all the time. Don’t believe me? What do we do when we get the TV remote?

Click . . . Judge . . . No,

Click . . . Judge . . .Next,

Click . . . Judge . . .Watch!

We have to be a little judgmental to live.

Well, what about the “holding a grudge” thing? It’s a little different. We “keep score” of these transactions in what I call “ledgers.” These ledgers work like an accounting ledger. The positives and negatives generate a ledger balance we use to process subsequent transactions. Positive balances guide us toward accepting the next transaction; negative balances guide us toward declining the next transaction. So, we hold a grudge in the form of negative balances and declined transactions. I guess, we are all “judgmental grudge holders” – bummer!

Wait! Let’s not be too hard ourselves because we also value good relationships and positive ledger balances. Knowing we have this process can help us optimize it. When evaluating an important decision, I like to say, “this is a ‘check myself, before I wreck myself” moment.” It helps me consider the ledgers for alternatives and rightsizing. This practice is still under construction for me, but I encourage you to give it a try.

Before you jump into biases or archetypes, as I call them, hold off. We will cover them in a future post. Believe it or not, biases and archetypes are not the same. These ledgers are dyadic or between two entities. In contrast, biases/archetypes are based on characteristics or attributes of a group or individual that we have deemed positive or negative and are built through what I call the “Old MacDonald method, E-I-E-I-O” of education, indoctrination, experience, introspection, and observation. As I said, stay tuned for  coming posts.

Meanwhile, please take a moment to be sure your ledgers are where you want them to be. Also, evaluate this concept in your daily life and see what happens. Check back in with your thoughts.

Until next time!

Note: Originally posted in drawnoboxes.substack.com in Jan 2023.
Posted in Human Algorithm Project, Philosophy | Leave a comment

Demystifying Data Quality: Why Process Matters More Than You Think

Demystifying Data Quality: Why Process Matters More Than You Think

In the day-to-day use of data in an organization, we often hear about “data quality” as the gold standard. But what exactly does it mean for data to be of high quality? Let’s break it down.

 

 

 

 

 

 

1. Data as the Artifact of a Process

Imagine a dataset as a treasure chest, but instead of gold coins, it holds bits of data. Every piece of data, whether it’s sales figures or customer demographics, is like an artifact unearthed from a complex archaeological site—the process. Just like artifacts reflect the culture and practices of ancient civilizations, data reflects the processes that produced it. Interestingly, the process will reflect the culture and practices in place at the time as well just like the archeological artifacts.

2. Blame the Process, Not the Data

Ever heard the phrase, “Don’t shoot the messenger”? In our case, don’t blame the data—it’s not wrong, but rather, it’s the process of collecting it that goes astray. For example, if a sales report shows unexpected figures, it’s likely due to flaws in how sales data was collected, not because the data itself is faulty.

In one case, a noted physician complained that the hemoglobin data was wrong when it came back from the lab. He contended such results should be removed to avoid confusion. My contention was that the process had a problem; if the data were removed, it would not be measured. I posited the question, “If a patient had to have blood drawn an extra time, would you expect a higher or lower patient satisfaction score?” A wry smile came from my colleague, along with his agreement.

3. The Quest for Conforming Data

Data quality isn’t just about having a bunch of numbers—it’s about how well those numbers match our expectations. Think of it like baking a cake: you expect a fluffy cake when you follow the recipe exactly. Similarly, data quality should measure how closely the data conforms to our expectations and standards.

With this conformity issue in mind, actual measurements of quality may surprise the hardened skeptic. In a university setting, the organization had 1.3 million student records spanning 20 years. The common thought was the student data was a mess, filled with duplication and inaccuracies. After doing an analysis, we determined the accuracy level to be 99.7%, with only about 4,000 student records not conforming. This finding led to excitement, and a movement was quickly afoot to resolve the 4,000 identified student records.

4. Editing What You Know, Auditing What You Don’t

Here’s a practical approach: “Edit what you know, audit what you don’t.” It’s like proofreading a paper—you correct the parts you’re familiar with (like fixing typos in your own writing) and audit the unfamiliar (checking sources and references). In data terms, this means ensuring accurate entries (like converting kilograms to pounds correctly) and auditing anomalies to spot errors or deviations from the norm.

If you have ever seen the content of the “state code” field in many databases, you can understand the concept of “edit what you know.” In one case, a state code of “GE” was found in the state field. We found this entry meant “Georgia” because the field was being truncated and the individual was typing “Georgia” in the field rather than “GA.” Because the work was separated by state, Georgia was the only state the individual was inputting. Others in the group were using the correct abbreviation. Interestingly, the associate was set to retire in a few weeks. We would have been left with the question, “Did she think the abbreviation for Georgia was GE?”

5. Data Ownership: Who’s in Charge Here?

Just like every artifact has its guardian, every piece of data should have its owner. Those who create and modify the data should also be responsible for its quality. Imagine if the archaeologist who discovers a rare artifact also ensures its preservation and accurate documentation—that’s the essence of data ownership. Improving the data will improve the process and make the process owner’s job easier. They have a vested interest and solid WIIFM (“what’s in it for me”). In short, “He who owns the process, owns the data.”

Putting It All Together

So, as you discuss data usage, remember: data quality isn’t a mystical concept—it’s about understanding the process generating the numbers. By focusing on improving processes and taking ownership of data quality, you’ll uncover valuable insights without getting lost in a sea of numbers.

And remember, even high-quality data has its quirks and surprises—just like uncovering buried treasures. Embrace the journey, and who knows? You might just find the insights that change the game.

Until next time!

Dr. Dave

Posted in Data into Dollars, Leadership & Management, Philosophy | Leave a comment

Uncivil Civics

 

 

 

 

Uncivil Civics

Committee hearings in Senate and Congress,

Excellent chances for us to make some progress.

It’s Reps and Senators, with Experts, oh my,

Facts and experiences and how they apply.

 

But what happened next was simply amazing,

Everyone came out with their guns a-blazing.

Experts got hammered with partisan queries,

Name calling, insults, conspiracy theories.

 

Spewing their talking points when they should inquire,

Their post-game review, “We put them under fire.”

They’re snarky, They’re snippy, decorum is gone.

They’re hoping the talking heads will ask them on.

 

Time to change the behaviors we reward,

Okay to disagree but don’t sow discord,

We need to weed out these divisive cynics,

The ones perpetuating our uncivil civics.

 

Posted in Poetry, Politics, Uncategorized | Leave a comment

COVID as I Remember It

 

 

 

 

 

 

It was the best of times, then perhaps the worst,

A Hollywood-style dystopian earth.

Zoom from home, long isolated days,

All in, no out, universal malaise.

 

Temporary protocols to “flatten the curve”

Offered as the “new normal” with vigor and verve.

Stay six feet apart whether indoors or out.

Sanitize those hands, mask that snout.

 

Trump’s “Warp speed” got us the shot,

Biden said, “Take it whether you want to or not.”

The data were mixed just asked most scientists,

But hold all questions on how strong the science is.

 

Just two shots and you were “vaxxed,”

Protected from the spread, but then came the facts.

It just didn’t work. A booster is needed,

Ask Pfizer, ask Moderna, you must be treated.

 

We humans like to think that we have the final word,

But Mother Nature’s the one that immunized the herd,

For virtually nothing, we shut down our nation,

We should’ve heeded the Great Barrington Declaration.

 

So, to all you Elites, “What the heck?”

Expect a few questions, not a genuflect,

You can be wrong, believe it or not,

Humility’s the medicine, take the shot.

 

“Thanks” to those who played the foil,

Blackballed, black-listed, unrecognized toil,

It wasn’t fair to you and it wasn’t fair to us.

Stay humble, stay righteous, and keep the trust.

Posted in Poetry, Politics | Leave a comment

Security – Cybersecurity, Home Security, Border Security – It’s All the Same

How are we doing security our treasure?

Do you have a lock on your front door? Do you have a password for your email account? People will secure their treasures based on their relative value, whether corporate assets, homes, or homeland. You secure these treasures to reduce the risk they will be taken or used without your permission.

“Security” is all about reducing risk. In the late nineties, Welke and Straub presented the four stages of the “security action cycle.” The first two stages focus on preventing loss, whereas the second two focus on minimizing loss from the intrusion. The four stages are::

  1. Deterrence: Taking action to dissuade a bad actor and prevent a violation.
  2. Protection: Implementing measures repelling the bad actor’s advance.
  3. Detection: Monitoring the environment to uncover the bad actor.
  4. Remedies: Returning to the pre-violation state includes containment, eradication, and recovery. Limiting the damage, seeking restitution via legal action, and repairing any damage done by the bad actor’s intrusion are included in this stage.

The risk is reduced when a company, person, or country acts early in the cycle. If you deter the bad actor, you will need less repelling, detecting, eradicating, and recovery. The earlier you stop the attack in the security action cycle, the less loss. So it is important to incorporate the learning in the protection, detection, and remedies stage back into the earlier stages.

Consider the example of cyber security. The security action cycle offers a solid framework for evaluating and putting context to the initiatives in a cyber security program. For example:

  1. Deterrence: A company may post security certifications, membership in a consortium, or recent legal action against previous bad actors on their website. Companies can deter insider issues with good policies and training.
  2. Protection: Firewalls, passwords, and physical barriers are all examples of protection strategies.
  3. Detection: Monitoring for abnormalities, known patterns, or thresholds can identify intrusions. Additionally, security guards may walk the beat to detect intrusion physically.
  4. Remedies: The organization must contain and eradicate the bad actor. After stopping the attacker, the company can begin cleaning up, restoring service, and seeking other remedies, including legal action.

Securing your home with locks, fences, passwords, lights, and even electronic security monitoring systems is standard fair. We will secure our perimeter without a second thought. Our barbecue grills, swing sets, lawnmowers, and deck chairs were purchased and built for our use or for the folks we allow. Keeping people out of your house and off your lawn is typical.

  1. Deterrence: A security system sign in the front yard, a guard dog sign on the fence, prickly bushes under the windows, and lighting work well here.
  2. Protection: We all know locks, fences, and those prickly bushes mentioned earlier are all protection steps. Some folks have protective dogs or security personnel.
  3. Detection: In the home, motion detectors, observant or nosy neighbors, cruising police, and that previously mentioned dog can detect the intrusion.
  4. Remedies: If the intruder uses your backyard swing, the problem will likely have little serious consequence, and remedies have less value except not to allow it to happen again. More serious events, such as a break-in burglary, require more action, including cleaning up, restoring service, and pressing charges. After such an event, some may feel insecure and solicit support and reassurance from family members that the house is safe.

Regarding the U. S. border policy, partisanship will result in flaming content. First, I believe in legal immigration and a goodly amount of it. The key to this post is the process and rules to enter the border gates should be clear and based on the desired results in the long term. The individual will not be a bad actor if the rules are followed. However, if the rules are not followed, the individual would be a bad actor because the process and laws are not being followed. So we can use the security action cycle to minimize bad actors entering our country inappropriately. Consider:

  1. Deterrence: Promoting the proper process to actors desiring entry, so they do not become a bad actor is the first step. Sharing the penalty for breaching the border should disincentivize bad actors.
  2. Protection:  In many countries, borders have natural barriers, artificial barriers, and guards to keep bad actors out. These barriers can act as deterrents as well. Interestingly, North Korea has guards to keep internal actors from leaving and or coming into the country.
  3. Detection: Once someone crosses the border illegally, the country’s massive size makes detection difficult if not detected early. Surveillance by border guards, drones, and other technologies can aid in the detection of those breaching the border.
  4. Remedies: A key to any illegal activity is following through on the associated penalties. The penalties should be associated with the crime. In the case of one that breaches the border, eradication could be deportation from the U. S. Repeat offenders should receive harsher sentences than the first offender.

We can use the security action cycle to determine a company, country, or person’s performance in securing an environment in each stage. A few questions:

  • How would you rate your company’s cybersecurity plan for deterrence, protection, detection, and remediation?
  • How about your performance securing your castle?
  • What rating would you give your country’s border security plan for deterrence, protection, detection, and remediation?

I am guessing we all have some work to do.

Until next time.

Dr. Dave

Posted in Data into Dollars, Leadership & Management, Uncategorized | Leave a comment

COVID-19 Stay-at-Home Orders were “Terrible” & “Stressful”

COVID-19 offered a unique opportunity to study the perspectives of working in the office versus working from home. In a qualitative study, I interviewed 14 people who had moved from office to home because of their company’s response to COVID-19. The participants reported stress and difficulty early in the process and missed dedicated space, connectivity resources, technical support, and each other.

All participants reported the initial phases of the move from in-office to remote were rocky due to space.  First, all participants reported missing a dedicated place for working. COVID-19 “stay-at-home” orders forced workers and the rest of their families, including children, to “work from home.” Finding enough space for school children, college students, and adults to work throughout the day was tough. Parents of young children had to provide lunch and other attention in addition to their work schedule. One participant described having adults, high schoolers, and college students “either in class or working on four different computers and four different corners of the house and all that.” Another called the experience “terrible” and “stressful” as she recounted tending to her young children while trying to work.

All participants also mentioned connectivity resources and technical support. When in the office, connectivity was provided and optimized for the personal computer technology given to the worker. Internet connectivity became the worker’s responsibility when working at home and generally was the regular home Internet service. The connectivity technical support included the worker’s Internet company and the corporate IT department. When in the office, the potential exists for on-site technical support but working from home, the worker must coordinate the support among the providers.

Eleven of the 14 respondents mentioned “informal communications” when asked what was missed. The respondents missed the presence of people, breakroom chats, and casual conversations. The relationships coming from these informal communication channels required a more “intentional” approach when working remote. “Presence” can also increase the speed of work-focused information as well. Individuals can no longer overhear conversations or look over the cubical wall for help with work tasks. Participants also noted effects on onboarding new employees, products, and processes.

More and more companies are adopting work-from-home. Workers enjoy the reduced commute and ability to respond to family needs. Companies enjoy reduced real estate costs and an increased resource pool. With these positives, workers and organizations must determine how communications, knowledge sharing, and presence will occur in the future workplace. Fortunately, organizations and workers are better equipped technically and logistically, and other services, such as schools and colleges, are open.

Other themes emerged throughout the study that I will cover in future posts.

Until next time!

Dr. Dave

 

Posted in Human Algorithm Project, Leadership & Management, Uncategorized | Leave a comment