whoisjoe.com

Asking for Help Part 2 - Alerting

  

February 4, 2019

Home About Projects Blog LinkedIn ReThink Security

I realized in my first part of Asking for Help that I didn’t put a fine enough point on some of the points I should have made when asking for help.

Alerting falls into a greater category of communication. Alerting, or maybe we can call it “Struggle Signaling,” can help others know that, while you’re not yet ready to call it quits and ask for help, things aren’t going as smoothly as you’d like.

At my company we work within small teams, sometimes alone, on projects with tight deadlines. These deadlines are scheduled closely together. Getting ramped up and becoming quickly effective is paramount. This means that being blocked or struggling to make forward progress can become catastrophic quickly.

Even though the risk of staying quiet is more pronounced on shorter, faster projects there’s a lot to learn on any project.

Our natural inclination is to hope for the best and to put some herculean effort in so we don’t have to bother others. Indeed, it is nice to know that you were able to solve a problem without a ton of external support, but often it puts the project at risk, puts stress on you, and isn’t the most efficient way of working.

Alerting and Struggle Signaling is the middle ground between being blocked and needing assistance and toiling away quietly. Letting others know that things aren’t going smoothly, and that you need support can drastically reduce the amount of time you struggle. Pulling in your your boss or leader who can help pull in the right resources can be especially effective and can increase the projects likelihood of success quickly.

The value of the team is our diverse perspectives, backgrounds, and capabilities. Coordinate and communicate with that team as much as possible for the best outcome.

Photo Credit: Gary Bendig

  • 81 More Posts
  • So, You're a Manager Now
  • A Mixtape in 2022
  • The Middle Path of Planning and Reflection
  • Micromanagement and Trust
  • On Giving Advice
  • Emergency Preparedness During Coronavirus Frenzy
  • Mind Map Your Life
  • Start With the Hard Part
  • Delight in the Details
  • Introducing ReThink Security
  • Newsletter & Recommendations
  • Take a Moment
  • Triage Decision Making
  • Show Your Work
  • Getting Back Up
  • Max Out vs. Continuous Development
  • Mental Diet and Exercise
  • Asking for Help Part 2 - Alerting
  • High Water Mark
  • Who Do You Want to Be
  • Presentation Tips
  • Asking for Help
  • China Hijacking the Internet
  • Recording Audio with AirPods in Imovie
  • Active Decisions
  • Create/Publish Scripts
  • Specialize or Do Not Specialize
  • Exactis Breach
  • Optimizing Images
  • What I Track
  • What I’m Thinking About May
  • What I’m Thinking About March
  • What I’m Thinking About January
  • Building a Collaborative & Social Application Security Program
  • Lazy Days in the Cloud
  • Delegate Then Do
  • So you want to be a better programmer
  • Project Success
  • Don't Short Circuit a Lesson
  • Scale Your Solution to the Problem
  • Digital Currencies
  • Fortnightly
  • Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone
  • In Defense of Reverse Engineering and Responsible Disclosure
  • Ruby open allows command injection if user controlled
  • New Mac Install Guide
  • Understanding Customer Needs and Helping Them Mature
  • My Experiences with IOS8 and Yosemite so far
  • The Importance of Vulnerability Disclosure Programs and Bug Bounties
  • My New Record Player and Beck - Morning Phase (The Vinyl Experience)
  • An Hour of Code with Code.org
  • Gmail Changes to Displays Images by Default
  • Why I Donated to Help Jailbreak iOS7 & You Should Too
  • Email Strategy
  • Shutdown
  • Anatomy of a Distributed Denial of Service (DDoS) Attack
  • NASA Forced to Suspend All Public Outreach & Education Programs
  • Joe_CMS Open Source!
  • Mobile Application Security Testing FAQs: Post #1
  • How Much Security Does Obfuscation Get You?
  • Why Privacy Matters Even if You Have 'Nothing to Hide'
  • What LinkedIn Should Have Done with Your Passwords
  • Constant Vigilance
  • Boeing Paying Hackers to Break into Their Systems
  • My Reading Cycle
  • Developing Tools for Professional Hackers
  • Finding Your Inner Evildoer (4/4): An Evil Streak
  • Finding Your Inner Evildoer (3/4): A Good Imagination
  • When to Rebuild Your Process from Scratch
  • Finding Your Inner Evildoer (2/4): Complete Knowledge of the System
  • Continuous Incremental, Personal Improvement
  • Finding Your Inner Evildoer: Part 1
  • CISCO Password Revealer
  • Battling with Word and Excel
  • Which is More Secure: Windows or Linux?
  • The High Cost of an Application Security Data Breach
  • Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config
  • New WikiRater Features
  • When is it OK to Build up Technical Debt
  • Time Management with the Pomodoro Technique
  • Manage Energy Not Time
  • Goals, Results and Activities - defining your productivity
© 2022 whoisjoe.com