SlideShare a Scribd company logo
Fail4Lib
 Failing with grace
and style... or not.


     Jason Casden
           and
  Andreas Orphanides

     NCSU Libraries

(jmcasden|akorphan)@ncsu.
           edu
Outline
1.   Identifying and managing failure
2.   Failure anxiety!
3.   Talking about failure
4.   Lightning talks
Outcomes
1. I like to think about wrongness and failure
   a. Can we talk about it in a productive way?
   b. Can we improve the ways we handle, seek, or
      discuss failure?
2. Is this kind of workshop useful?
   a. There will be a survey.
Part 1: Identifying & managing failure
Readings
1) The Long, Dismal History of Software Project Failure (Coding Horror)
http://www.codinghorror.com/blog/2006/05/the-long-dismal-history-of-
software-project-failure.html

2) Sowing Failure, Reaping Success (New York Times)
http://learning.blogs.nytimes.com/2012/05/07/sowing-failure-reaping-
success-what-failure-can-teach/

3) On Being Wrong (Kathryn Schulz via TED)
http://www.ted.com/talks/kathryn_schulz_on_being_wrong.html
Why "failure?"
Some flavors of failure
● Technical failure
● Failure to effectively address a real user
  need
● Overinvestment
● Outreach/Promotion failure
● Design/UX failure
● Project team communication failure
● Missed opportunities (risk-averse failure) (!)
● Failure to launch
Hosted by Nina McHale and Chris Evjy, featuring Monique Sendze, Jason Battles, Rachel Vacek, and Steve Teeri.
Access 2011
Biz Lit buzz
●   Lean startup principles
●   Failing fast
●   Pivots
●   Beginner's mind
●   Wrongology
Managing risk
●   Building diverse teams
●   Expecting dead ends
●   Having fall-back plans
●   Fault-tolerant schedules
●   Establishing flexible goals at the start
Getting myself beat up
Avoiding Schulz's assumptions
  1) Ignorance assumption
  2) Idiocy assumption
  3) The evil assumption
Breakout 1: Understanding and dealing with
                failure in your own practice

● What are the symptoms of failure?
● How do you identify an incipient failure and try to
    recover/adjust?
●   What do you do after a project has failed? How do you
    make failure valuable? (Post-mortems, recovery,
    etc....)
●   How do you plan for the unknown when beginning a
    project?
●   How do you manage risk to mitigate potential damage
    when undertaking work in new areas?
Part 2: Failure anxiety!
Readings
1) Mitt Romney learns the hard way: mission critical systems are called that for a reason (Ars
Technica)
http://arstechnica.com/information-technology/2012/11/inside-team-romneys-whale-of-an-it-
meltdown/

2) The Therac-25 disaster: the dangers of a “nothing will go wrong” mentality
Short version (CalPoly software engineering): http://users.csc.calpoly.
edu/~jdalbey/SWE/Papers/THERAC25.html

Full report (Nancy Levison, PI of the Therac-25 investigation) -- Optional, but a fascinating read:
http://sunnyday.mit.edu/papers/therac.pdf

3) How risk averse is too risk averse? Bruce Schneier on "Cover Your Ass" security policy (Wired)
http://www.wired.com/politics/security/commentary/securitymatters/2007/02/72774?
currentPage=all
1: ORCA and contextual testing

● Testing dimensions for realtime services
● Communications strategy, training, etc
● Resource deployment
● Security, trust, timing, identity mgmt
● Helpdesk support
● Common-sense documentation management
2: THERAC-25 & software control
● Risk management and risk severity
● High-risk software dev anti-practices
  ○   Inherited software, new hardware
  ○   Poor code design and management
  ○   Redundant hardware checks?
  ○   Test environment / reality mismatch
● Limits and risks of software control
● Opaque error reporting
● Denial
3: TSA CYA
● Hindsight-based security practices
● Relative risk versus perceived risk
● "Just in case" thinking
● Visible but ineffective "security theater"
● What drives risk management decisions?
Breakout 2: Where's the sweet spot?
● How could these problems have been avoided, or their
    damage mitigated?
●   How can we manage the need for assigning blame?
    How do we focus on moving forward after a failure?
    Are there cases where finding a responsible party is
    warranted?
●   What liabilities are associated with too great a focus
    on blame/responsibility? What liabilities are associated
    with setting aside the assignment of responsibility?
●   What are the worst case scenarios for your own work?
    How does this affect your risk management choices?
Part 3: Talking about failure
Readings
1) James Dyson on living a life of failure (37 Signals)
http://37signals.com/svn/posts/408-james-dyson-on-living-a-life-of-failure

2) Quantity always trumps quality (Coding Horror)
http://www.codinghorror.com/blog/2008/08/quantity-always-trumps-
quality.html

3) Blameless PostMortems and a Just Culture (Etsy: Code as Craft)
http://codeascraft.etsy.com/2012/05/22/blameless-postmortems/
Balancing credibility and flexibility

Certainty is a limited resource early on

This isn't an excuse for poor planning or
communication
Iteration
"Pivots"
Breakout 3: Surviving failure, risk, and the
                       unexpected with grace.

● How do you prepare colleagues for unexpected
    outcomes?
●   What is your organization’s approach to risk and
    failure?
    ○ Is risk well-tolerated/well-managed?
    ○ What are the consequences of a failed project?
    ○ Is failure seen as an endpoint -- a negative outcome
        to an endeavor -- or merely a step in the
        development process?
●   How do you talk about “failure” with your colleagues?
    Supervisors? Stakeholders? Patrons? Reports? What kind
    of language do you use?
Lightning talks!
Fail4Lib

More Related Content

Similar to Fail4Lib

Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Steve Werby
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
Adrian Sanabria
 
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Resistance Isn't Futile: A Practical Approach to Threat ModelingResistance Isn't Futile: A Practical Approach to Threat Modeling
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Katie Nickels
 
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
Pedro Henriques
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
North Texas Chapter of the ISSA
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
Adam Shostack
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
SaraJayneTerp
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk managementsmumbahelp
 
Threat Modeling with STRIDE
Threat Modeling with STRIDEThreat Modeling with STRIDE
Threat Modeling with STRIDE
ssuserc312d2
 
Dillon.r.tinsley.c.rogers.e
Dillon.r.tinsley.c.rogers.eDillon.r.tinsley.c.rogers.e
Dillon.r.tinsley.c.rogers.eNASAPMC
 
On Risks and Agile Approaches
On Risks and Agile ApproachesOn Risks and Agile Approaches
On Risks and Agile Approaches
Emiliano Soldi
 
Machine Learning Operations Active Failures, Latent Conditions
Machine Learning Operations Active Failures, Latent ConditionsMachine Learning Operations Active Failures, Latent Conditions
Machine Learning Operations Active Failures, Latent Conditions
Flavio Clesio
 
Threat modeling (Hacker Stories) workshop
Threat modeling (Hacker Stories) workshopThreat modeling (Hacker Stories) workshop
Threat modeling (Hacker Stories) workshop
Ty Sbano
 
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
Fwdays
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflections
mboehme
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
Ives Laaf
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
Resolver Inc.
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
Codemotion
 

Similar to Fail4Lib (20)

Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Resistance Isn't Futile: A Practical Approach to Threat ModelingResistance Isn't Futile: A Practical Approach to Threat Modeling
Resistance Isn't Futile: A Practical Approach to Threat Modeling
 
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk management
 
Threat Modeling with STRIDE
Threat Modeling with STRIDEThreat Modeling with STRIDE
Threat Modeling with STRIDE
 
Dillon.r.tinsley.c.rogers.e
Dillon.r.tinsley.c.rogers.eDillon.r.tinsley.c.rogers.e
Dillon.r.tinsley.c.rogers.e
 
On Risks and Agile Approaches
On Risks and Agile ApproachesOn Risks and Agile Approaches
On Risks and Agile Approaches
 
Machine Learning Operations Active Failures, Latent Conditions
Machine Learning Operations Active Failures, Latent ConditionsMachine Learning Operations Active Failures, Latent Conditions
Machine Learning Operations Active Failures, Latent Conditions
 
Project Risk management
Project Risk management Project Risk management
Project Risk management
 
Threat modeling (Hacker Stories) workshop
Threat modeling (Hacker Stories) workshopThreat modeling (Hacker Stories) workshop
Threat modeling (Hacker Stories) workshop
 
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflections
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Fail4Lib

  • 1. Fail4Lib Failing with grace and style... or not. Jason Casden and Andreas Orphanides NCSU Libraries (jmcasden|akorphan)@ncsu. edu
  • 2. Outline 1. Identifying and managing failure 2. Failure anxiety! 3. Talking about failure 4. Lightning talks
  • 3. Outcomes 1. I like to think about wrongness and failure a. Can we talk about it in a productive way? b. Can we improve the ways we handle, seek, or discuss failure? 2. Is this kind of workshop useful? a. There will be a survey.
  • 4. Part 1: Identifying & managing failure
  • 5. Readings 1) The Long, Dismal History of Software Project Failure (Coding Horror) http://www.codinghorror.com/blog/2006/05/the-long-dismal-history-of- software-project-failure.html 2) Sowing Failure, Reaping Success (New York Times) http://learning.blogs.nytimes.com/2012/05/07/sowing-failure-reaping- success-what-failure-can-teach/ 3) On Being Wrong (Kathryn Schulz via TED) http://www.ted.com/talks/kathryn_schulz_on_being_wrong.html
  • 7. Some flavors of failure ● Technical failure ● Failure to effectively address a real user need ● Overinvestment ● Outreach/Promotion failure ● Design/UX failure ● Project team communication failure ● Missed opportunities (risk-averse failure) (!) ● Failure to launch
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Hosted by Nina McHale and Chris Evjy, featuring Monique Sendze, Jason Battles, Rachel Vacek, and Steve Teeri.
  • 19. Biz Lit buzz ● Lean startup principles ● Failing fast ● Pivots ● Beginner's mind ● Wrongology
  • 20. Managing risk ● Building diverse teams ● Expecting dead ends ● Having fall-back plans ● Fault-tolerant schedules ● Establishing flexible goals at the start
  • 21. Getting myself beat up Avoiding Schulz's assumptions 1) Ignorance assumption 2) Idiocy assumption 3) The evil assumption
  • 22. Breakout 1: Understanding and dealing with failure in your own practice ● What are the symptoms of failure? ● How do you identify an incipient failure and try to recover/adjust? ● What do you do after a project has failed? How do you make failure valuable? (Post-mortems, recovery, etc....) ● How do you plan for the unknown when beginning a project? ● How do you manage risk to mitigate potential damage when undertaking work in new areas?
  • 23. Part 2: Failure anxiety!
  • 24. Readings 1) Mitt Romney learns the hard way: mission critical systems are called that for a reason (Ars Technica) http://arstechnica.com/information-technology/2012/11/inside-team-romneys-whale-of-an-it- meltdown/ 2) The Therac-25 disaster: the dangers of a “nothing will go wrong” mentality Short version (CalPoly software engineering): http://users.csc.calpoly. edu/~jdalbey/SWE/Papers/THERAC25.html Full report (Nancy Levison, PI of the Therac-25 investigation) -- Optional, but a fascinating read: http://sunnyday.mit.edu/papers/therac.pdf 3) How risk averse is too risk averse? Bruce Schneier on "Cover Your Ass" security policy (Wired) http://www.wired.com/politics/security/commentary/securitymatters/2007/02/72774? currentPage=all
  • 25. 1: ORCA and contextual testing ● Testing dimensions for realtime services ● Communications strategy, training, etc ● Resource deployment ● Security, trust, timing, identity mgmt ● Helpdesk support ● Common-sense documentation management
  • 26. 2: THERAC-25 & software control ● Risk management and risk severity ● High-risk software dev anti-practices ○ Inherited software, new hardware ○ Poor code design and management ○ Redundant hardware checks? ○ Test environment / reality mismatch ● Limits and risks of software control ● Opaque error reporting ● Denial
  • 27. 3: TSA CYA ● Hindsight-based security practices ● Relative risk versus perceived risk ● "Just in case" thinking ● Visible but ineffective "security theater" ● What drives risk management decisions?
  • 28. Breakout 2: Where's the sweet spot? ● How could these problems have been avoided, or their damage mitigated? ● How can we manage the need for assigning blame? How do we focus on moving forward after a failure? Are there cases where finding a responsible party is warranted? ● What liabilities are associated with too great a focus on blame/responsibility? What liabilities are associated with setting aside the assignment of responsibility? ● What are the worst case scenarios for your own work? How does this affect your risk management choices?
  • 29. Part 3: Talking about failure
  • 30. Readings 1) James Dyson on living a life of failure (37 Signals) http://37signals.com/svn/posts/408-james-dyson-on-living-a-life-of-failure 2) Quantity always trumps quality (Coding Horror) http://www.codinghorror.com/blog/2008/08/quantity-always-trumps- quality.html 3) Blameless PostMortems and a Just Culture (Etsy: Code as Craft) http://codeascraft.etsy.com/2012/05/22/blameless-postmortems/
  • 31. Balancing credibility and flexibility Certainty is a limited resource early on This isn't an excuse for poor planning or communication
  • 34. Breakout 3: Surviving failure, risk, and the unexpected with grace. ● How do you prepare colleagues for unexpected outcomes? ● What is your organization’s approach to risk and failure? ○ Is risk well-tolerated/well-managed? ○ What are the consequences of a failed project? ○ Is failure seen as an endpoint -- a negative outcome to an endeavor -- or merely a step in the development process? ● How do you talk about “failure” with your colleagues? Supervisors? Stakeholders? Patrons? Reports? What kind of language do you use?