|
Hello there, I've just posted this announcment on LinkedIn - please like and share. Thank you! Two years ago, I started writing a novel about IT and Software Development. Why? Well, I'd loved reading "The Phoenix Project" and "The Unicorn Project", and I wanted something a little more realistic, a bit grittier. I wasn't writing a business book; I was writing a story set in the IT and Software Development world. A story where agile transformations don't work, a story where we cut corners to get things done. A story with a twist. A story I hope you enjoy! It's slightly darker than those amazing books, but it's a book with an important message. It follows the journey of two women, an executive and an engineer, discovering how connection is more important than software delivery and AI. I certainly hope it's "of the moment" ;) |
Exploring the human factors that make software engineering so unique, so difficult, so important and all consuming. Learning to work with the systems, not against them.
A few weeks before Christmas I asked ChatGPT a series of questions along the lines of "ok, so what next?" I was out of ideas. I was tired. My freelance contract was coming to an end so I was already looking for a new one. Launching Human Software had been exhilarating but exhausting. I'd burned the candle at both ends on social media plus done some podcasts (a few of which are yet to see the light of day) and also put myself in front of bookshops and chased reviews and talked talked talked...
REBRAND ALERT!! So it's been a while since I renamed this newsletter but I feel it's due a slight sidestep following the launch of my book. So welcome to episode 286 overall, but episode #1 of The Human Engineer. Despite me constantly rename this newsletter, over these years the subject has never really varied too much. I talk about software systems and how they relate to human systems. I find my work increasingly focusses on the human side of the this divide - because it is a divide right?...
Last couple of weeks, I've been rebuilding some Windows base images in order to comply with corporate patching policies. The new images are CIS hardened which means they follows guidelines set out by the Center for Internet Security benchmark. This ultimately means that the images are restricted in what they can do, what they can access, what is installed upon them by default. These security measures work in opposition to the automation we already have in place for our customers. This is the...