Product Owner vs. Product Manager: Product Management is a challenging role and requires diverse skills. Large organisation often introduce a split between two similar, close roles – Product Ownership and Product Management. Both requires a large set of skills.
Jordan Bergtraum, The Product Mentor, a mentor at The Product Guy, leads a conversation on this split.
Y’all install Microsoft Patch Tuesday patches within 24h, right? This time Krebs On Security has some rumours that make you want to really install these patches in time.
Update: Washington Post reports, the NSA warned Microsoft about it.
The article features pictures of these stamps. Those who remember the times will find these adorable. The stamps are apparently available as first or second class stamps, at £1.60 or £1.55, and also in collectors sets.
Do I know enough people in the UK to send me postcards with stamps from:
Elite(1984)
Dizzy (1987)
Populous (1989)
Lemmings (1991)
Micro Machines (1991)
Sensible Soccer (1992)
Wipeout (1995)
Worms (1995)
Lemmings, Popoulus, Dizzy and Elite
each? Germany, meanwhile, is still debating whether computer games are hazardous and the people involved in the scene should be observed.
As a concept, the North Star principle gained a lot of attention in Product Management recently. Amplitude, a vendor of analytics tools, has a guideline to this concept. Their playbook walks product managers, those that want to enter the domain or even those just curious about methods and principles through the ideas. But also sets the scenes for potential applications by walking through exemplary goals to achieve with this approach.
Stapler (by James Bowe) Picture unrelated.
The playbook comes in 7 chapters, starting by describing the ideas to apply with the North Star concept. Only after the introduction the playbook enters the practical application of the concept, and with a chapter on product metric checklist checklists, it emphasises the importance of metrics. With this it also stresses the importance of selecting the right metric and not to lose a product in vain. E.g. active users would be the wrong metric, given the goal that shall be achieved.
More practical guidelines come with the chapter on running workshops in part 3, and the chapter on defining the right guiding metrics. In between, the document also gives success stories: there are sections that talk through a successful implementation of North Star at Netflix. But also Amplitude is leveraging the methodology and shares their experience in a section.
The closing chapters dedicate to debugging the processes attached, implementing them and over time changing directions.
Takeaway
In all the recent hype around the method, the key take away is to simplify ideas for your organisation. The approach is supposed to make it easy for your teams to understand the direction the product is taking. And even more following this direction. For a product management, communicating ideas should be a core skill. This approach gives great tools in doing so.
The guide to discovering your product’s North Star to improve the way you manage and build products.
Arduino launches IoT platform: With the Portenta H7 Arduino announces a Platform targeted at small and medium businesses. It comes with all the connectivity necessary to enable devices classified as Internet of Things: WiFi, BLE, with physical connectivity to USB and SD-Cards, plus the well known Camera or UART connectivity. TechRadar also mentions LTE. Here is the article from TechCrunch:
Adruino for IoT
Arduino, the open-source hardware platform, today announced the launch of a new low-code platform and modular hardware system for IoT development. The idea here is to give small and medium businesses the tools to develop IoT solutions without having to invest in specialized engineering resources. The new hardware, dubbed the Arduino Portenta H7, features everything […]
Das obligatorische Foto der Rakete “Fairy Dust“, die der Chaos Computer Club seit 1999 als Logo verwendet. Fairy Dust, wie die Rakete seit dem Chaos Communication Camp 2003 liebevoll getauft wurde, ist 7m groß. Damit macht das Modell auch in einer Halle wie der Messe Leipzig einen bleibenden Eindruck. Eine Lichtinstallation wie ihre glitzernde Oberfläche setzen “Fairy Dust” entsprechend in Szene. Neben der Fairy Dust finden sich in dem Umfeld 2 andere Logos. Zum einen der Datenknoten, der das erste offizielle Logo des Club darstellt.
is part one of One nation, tracked, an New York Times investigation series of smart phone information tracking and by Stuart A. Thompson and Charlie Warzel, within their privacy project. The research covers multiple topics, only starting out with an analysis of the potential contained in smartphone tracking information.
What we learned from the spy in your pocket.
Twelve Million Phones, One Dataset, Zero Privacy
The authors analyse a large dataset of location information from New York and Washington, DC, cell phone users. With the analysis, the article debunks myths about data privacy. The key takeaway of the analysis, to my interpretation are:
Mobile Phone User – Munich
Data is not anonymous – the authors successfully identified a Senior Defense Department official and his wife. And this was possible during the Women’s March. According to authors, nearly half a million descended on the capital for this event. (Other sources only mention one hundred thousand attendants)
Data is not safe – the authors point out complex relationships of companies in the tracking business. Complexity makes it impossible to ensure ownership. There is no foolproof way for anyone or anywhere in the chain to prevent data from falling into the hands of a foreign security service.
Affected persons cannot consent – the authors criticism seems reasonable. Virtually all companies involved with tracking require user consent. And even cell phones make the geo-tracking feature visible to users. Only barely anyone in the business makes purpose transparent. In other words, no company prominently announce how they package and sell data or insight.
One Nation, Tracked
The article is a creepy read, but worth the time spending. The series One Nation, Tracked continues with 6 other parts:
Security Nightmares – Frank und Ron beim 36C3 in Leipzig
Wie jedes Jahr , jedenfalls seit 1999 während des 19C3 in Berlin, haben Frank und Ron auch dieses Jahr wieder Ihren Vortrag Security Nightmares beim 36C3 zu Sicherheitsbezogenen Vor- und Rückschauen gehalten.
Security Nightmares 0x14
In einer Rückschau auf diesen ersten Vortrag “vor zwanzig Jahren” blicken die beiden auf die Vorhersagen von Damals und die Ereignisse der letzte Jahre zurück und fassen den ganzen Zeitraum der beiden Jahrzehnte damit zusammen, ob man Makros erlauben möchte. Makros waren schon 1999 (Melissa, I love you) wie heute (Emotet) einer der wichtigsten Angriffsvektoren für Malware. Der folgende Rückblick auf die letzten zehn Jahre alleine fällt etwas technischer aus. Trotzdem ruft der Teil einige schöne Ereignisse noch einmal ins Gedächtnis. Darunter z.B. den Aufschrei Deutschlands gegen Streetview, die Debatte um intelligente Stromzähler oder die elektronische Gesundheitskarte. Themen, die auch bis heute nicht vollkommen abgeschlossen sind.
Ein “Internet-Normalitätsupdate” setzt jüngere und auch noch laufende Angriffe mit bekannten Zahlen in Perspektive.
Darüber hinaus setzt der Vortrag sich mit Rückschauen in den Themenfeldern E-Gov, Datenreichtum und Crypto (SPD Mitgliederbefragung!), Geschäftsfelder, Crypto, Sport und Bemerkenswertem auseinander, bevor sich Frank und Ron den Stichworten für 2020 widmen. Wenig technisch wagen die beiden eine Prognose zu Berufsfeldern, die die Cyber-Situation hervorbringen könnte. Das reicht von der Cyber-Nachsorge für das Seelenheil Betroffener, über die Cyberfantasy-Geschichtenschamanen, die magiehafte Technologie nachvollziehbar erzählen können, bis zu Verzerrungs-Sucher und IPv6 Exorzisten
Wie jedes Jahr ein interessanter und unterhaltsamer Vortrag. Auch wenn ich die Lesung nicht selbst hören habe können, lohnt sich die Aufzeichnung auf media.ccc.de nachzusehen.