Tracking and allocating time

I’m going to try a new technique this week to see where my time goes.

I’m going to keep a log of everything that I do to see where my time goes. This is a common technique employed and suggested by many people as a way to see where you are spending your time.

However, rather than doing this in isolation, I’m going to combine the tracking of what I do with an attempt to pre-allocate what I expect to spend my time doing. For example, I know what projects I have outstanding and when they need to be completed. I also have some meetings booked in next week. I’m going to combine what I know I’ll be doing (meetings) with what I should be doing (projects) and then allocate the time accordingly.

At the end of the two weeks, I’m going to compare the two - planned and actual. I should be able to determine:

  • What I spent my time doing.
  • Whether my estimations on the time required to complete a project matched the actual. This will help me plan future weeks.
  • Identify weaknesses and potential interruptions.
  • Identify why and when I’m most likely to get sidetracked.

I’ll report back on my progress. Meanwhile, if anybody wants to perform the same task - planning and recording - and discuss their experiences, please leave them here :)

iTunes Recently….

Hello, my name is Martin MC Brown, and I’m addicted to my ‘recently’ playlists in iTunes.

There - admitting you’ve got a problem is the first step to recovering from it, right?

The problem is, I’m not sure I want to.

Let me explain - I have a large music DB. I did before I had iTunes, and it covered an entire wall in my house with CD cases. Having iTunes just makes it easier to find things.

Actually, iTunes goes one better than this. iTunes makes it easy to find the things you’ve forgotten too. I’ve set up loads of playlists which I use to listen to the music (or audio book) that happen to be in the mood for. I’m sure that’s no different to anybody else. Often I’ll listen to a playlist in its entirety. Some are short - perhaps 5 or 6 songs, others are all the tracks for a given artist, genre, or period of my life. For example, I have one for They Might Be Giants. Another for Hardcore Rap and another for the artists I used to listen to as a kid (Don McClean, Gerry Rafferty, Gilbert O’Sullivan).

The playlists help me find the stuff I listen to, but I get much more use out of what I label ‘Recently’ playlists. These are the same playlists, but with the added criterion of only including songs that I’ve haven’t listened to in the last 6 months. It’s the perfect way to remind me about the songs or stars that I love to listen to but have simply forgotten because I haven’t listened to them recently. Hence the nomenclature.

As I write this I’m listening to my Pop Faves Recently list and it’s playing Madness, Queen, Pulp, Manic Street Preachers, David Bowie, amongst many others.

The question is how long it might have taken me to remember that I had this music if I didn’t have iTunes to help me? Some of these artists I have listened to, according to iTunes, since June 2003!

The system only works if you actually play what’s in your library. One day I’ll set myself the mammoth task of listening to all the stuff I’ve bought but so far not listened to. It currently runs to 42 days. If I include all my spoken word titles I add another 100.

I better start practicing ‘Hello, my name is Martin MC Brown and I’m addicted to my ‘Unplayed’ playlists’…

What aspect of iTunes are you addicted to?

Ads by Yahoo!

E-mail’s moral, ethical issues

There's a short but important discussion here about the ethical and moral implications of using email in the realm of healthcare.

The story is about medical research, but it spreads to any environment where you want some guarantees about senders and recipients. For example, I welcome the idea of being able to talk to my GP or even just my surgery by email, but irrespective of the level of the discussion, I'm not sure I'd want the content to be read by anybody, casually or otherwise.

There are lots of issues here that go beyond the realms of the current technology. For example, it's all very well for me to encrypt the email I send from my computer so that only my doctor can read it, but how do you ensure that it's me sending the mail, and my doctor receiving it?

Understanding the motives to Microsoft’s Get the Facts

Tom Adelstein has a discussion on Microsoft's Get the Facts campaign.

In case you think you've seen it elsewhere, it's also covered at digg.com and there's a shorter piece at O'Reilly's Linux Dev Center.

I've talked about the problems with the approach Microsoft is using on Get the Facts before. Some of the points Microsoft makes are perfectly valid - but only from a very specific (and often unrealistic) position. Therein lies the major problem with the approach and the TCO studies which it uses to support the point of view.

Keeping up with free software

I remember when I first came across Slashdot.org. It was years ago - it must have been, I was still an employee as opposed to my current freelance status - but one of the main focuses of the Slashdot website was free software. At the time Linux was relatively new in the conciousness of the IT professional, even those of us who had been using free software for years at the time.

They key to slashdot was that it aggregated news items from a huge variety of sources and topics into a single feed that would appeal to the Geeks among us. It covers a lot of material - everything from space exploration and science through to BSD, Linux and Perl.

Protection from USB drives

I love my USB drive - it's only 1GB, and I don't use it to transfer files around between machines (I have a network for that), but what I do use it for is a backup of my important files that I can pick up and take away with me (it's on my key ring, so it's hard to forget).

I also keep a copy of my resume on there, just in case while out on a job I need to hand it out (and I've done that a number of times).

However, I can also appreciate that in a typical company, especially when most companies have removed or disabled their floppy drives, allowing individuals to use USB drives is not a good idea. From the simple angle preventing the introduction of viruses and trojans, through to the more complex problem of preventing individuals stealing software and company information.

Keeping logs

I've just read Douglas Schweitzer's piece about logs, and the related pieces.

Keeping logs is not as difficult as it seems, but some companies have an interesting approach. I keep logs of everything - I've mentioned before some of the steps I take to keep a record of the IT stuff I do, like using WordPress to store information, particularly changes.

Logs I process on a weekly basis, and I extract the information from them that I feel is valuable (for example, I have records going back years of the emails going to and from the internal network. These are retain indefinitely (they are in a DB so I can search and report on them.

Why do IT groups use delaying tactics?

One of the elements of IT that I have never been able to understand the is the use of delaying tactics during a support call. Sometimes the tactics are due to bad training, bad staff or simply inexperienced staff, but sometimes I'm sure it's deliberate.

I'll give you two examples - the first is an 'external' delay with a supplier. A piece of hardware failed, and it's under warranty. I filled in the online form (which you do after registration, where they take all you details). What happened over the next few days could have easily been turned into a IT sitcom. First, by email, I was asked to confirm the serial number of the unit. The fact that I'd filled in this information in both the registration and original support request had been ignored.

Open source big boys begin to show cracks

There have been many stories recently about how open source is beginning to 'legitimize' itself, how commercial companies are beginning to take open source and Linux in particular seriously, and how open source is itself starting to be a viable business model.

Actually this has been 'coming' for some time - you can look back as far as 2002 when the mainstream media started picking up what the effects of the Linux and open source model would be. For example, read Linux battle becomes political or Linux goes from strength to strength and you'll begin to see where we were header all those years ago. More recently the BBC has again examined the open source world with Open source turns money-spinner.