• Skip to main content

zoiaorg

Tech, Strategy, and other interesting things by Roberto Zoiaby Roberto Zoia

  • Articles
  • Book Reviews
  • Effective Goal Setting
  • What I’m Reading
  • Archive
  • About

33 Books in 2019

2020-01-06 by Roberto Zoia 1 Comment

As I’ve written before, we live in an age where self-learning becomes more relevant every day. As less people read books, reading becomes a real competitive advantage. It’s a very effective way of standing on the shoulders of giants.

In 2019 I completed a total of 16 books (non-fiction) and 17 novels. From the non-fiction list, these are the ones I enjoyed very much and consider worth recommending:

  • 21 Lessons for the 21st Century by Yuval Noah Harari.
  • This Is Marketing: You Can’t Be Seen Until You Learn to See  by Seth Godin and Ken Blanchard.
  • Building a Better Business Using the Lego Serious Play Method by Per Kristiansen and Robert Rasmussun.
  • Atomic Habits by James Clear.
  • Keep Going: 10 Ways to Stay Creative in Good Times and Bad by Austin Kleon.
  • AI Superpowers: China, Silicon Valley, and the New World Order by Kai-Fu Lee.
  • Information Doesn’t Want to Be Free: Laws for the Internet Age  by Cory Doctorow, Neil Gaiman and Amanda Palmer.

These are the books enjoyed most in the fiction/fantasy category. If I had to choose one, I would pick the Remembrance of Earth’s Past trilogy by Liu Cixin.

  • A Year and a Day in Old Theradane by Scott Lynch. (Fantasy.)
  • The Murderbot Diaries by Martha Wells (All Systems Red, Artificial Condition, Rouge Protocol, Exit Strategy). (Science-fiction.)
  • The Quantum Evolution Series (The Quantum Magician, The Quantum Garden) by Derek Künsken. (Science-fiction.)
  • Lady Astronaut series (The Calculating Stars, The Fated Sky) by Mary Robinette Kowal. (Science-fiction.)
  • Delta-V by Daniel Suarez. (Science-fiction, techno-thriller.)
  • Remembrance of Earth’s Past trilogy (The Three-Body Problem, The Dark Forest, Death’s End) by Liu Cixin. (Science-fiction.)
  • The Technologists by Matthew Pearl. (Historical mystery.)

Photo by Nong Vang on Unsplash.

Filed Under: Strategy and Technology Tagged With: books, Reading list

Problem Solving Skills for the Future

2019-08-28 by Roberto Zoia 1 Comment

Learning complex thinking is uncomfortable. Complexity is, after all, the realm of unknown unknowns.

The Cynefin Framework is a conceptual framework created in 1999 by Mary E. Boone and Dave J. Snowden while working for IBM Global Services. It classifies the issues leaders face into five contexts, defined by the nature of the relationship between cause and effect. It offers decision-makers a “sense of place” from which to view their perceptions, and make better decisions.

Obvious or simple is the domain of best practice, or known knowns. Problems in this realm can be solved by applying rules or best practices. There is rarely disagreement or doubt about what needs to be done.

Complicated is the domain of experts, the realm of the known unknowns. Relating cause and effect requires expertise and analysis, but once the problem has been analyzed, the course of action is clear: apply the appropriate good operating practice.

Complex, on the other hand, is the context of the unknown unknowns, where the relation between cause and effect is known only in retrospective. “Complexity is more a way of thinking about the world than a new way of working with mathematical models1.” Complex systems are dynamic. They involve large numbers of interacting elements. Interactions are non-linear. The whole is greater than the sum of its parts.

Political entities, organizations, markets, the rainforest… are examples of complex realities.

Solutions to complex problems can’t be imposed. There is no ‘right solution’. Deciding on the criteria to be used to evaluate possible solutions is part of solving problems in this realm.

Most situations and decisions in organizations are complex because some major change—a bad quarter, a shift in management, a merger or acquisition—introduces unpredictability and flux. In this domain, we can understand why things happen only in retrospect2.

Finally, a problem is chaotic when it’s too confusing to wait for a knowledge-based response. Because cause and effect are unclear, we need to establish certain level of order first, sense where stability lies, and try to turn what’s chaotic into the realm of complexity.

Guess what kind of problem solving skills will give you an unfair advantage and won’t get you replaced by a robot, automation, or a clever machine learning algorithm anytime soon. “Work is moving yet again. The move from Simple to Complicated that was a hallmark of the twentieth century is being outpaced by a move from Complicated to Complex and Chaotic3.”

To learn to navigate the sea of complexity, you need a sense of curiosity and the habit to notice the nature of things around you. You need to nurture the ability to learn new things. Expose yourself to complex situations, where identifying the problems is part of the challenge, leaving behind the shallow and safe waters of what’s just complicated and tactical.

Photo by Samuel Zeller on Unsplash


  1. cfr HBR, November 2007. A Leader’s Framework for Decision Making. SNOWDEN, David J. and BOONE, Mary E. ↩
  2. cfr HBR, November 2007, idem. ↩
  3. Taylor Pearson, The Commoditization of Credentialism: Why MBAs and JDs Can’t Get Jobs. ↩

Filed Under: Strategy and Technology Tagged With: competitive advantage, complexity, cynefin, decision-making, frameworks, learning, problem solving

Blind to Biases

2019-08-27 by Roberto Zoia Leave a Comment

Runner’s World tells the storie of Ellie Pell, who won the overall first place in a 50K Ultra Marathon.

The organizers of the event had assumed that the overall winner would male.

While there was an award made for the first place female, there was no award prepared for the first place male. Instead, there was only a trophy for the overall winner, which was predicted to be a man.

What’s worth noting is not the organizers’s bias, but that they were blind to it. Blind to the possibility that a woman could actually win the race.

Being aware that we may be blind to our own biases is the first step towards overcoming them. Blindness may come, for example, from taking for granted what for others may be a privilege1.


Photo by Andrea Leopardi on Unsplash


  1. For example, check McKinsey’s article on Why gender diversity at the top remains a challenge. ↩

Filed Under: Uncategorized Tagged With: biases, diversity, inclusion

How to Prevent Hackers from Accessing Your Mail and Other Online Services

2019-08-18 by Roberto Zoia Leave a Comment

Online security is more relevant than ever. News from hackers breaching massive number of user accounts from an online service no longer surprises anyone.

Two important things that you should do today to improve the security of your online accounts are setting up two-factor authentication and using a password manager.

Two-factor Authentication

Two-factor authentication means that each time you log into an online service, before you can get access to your account, you’ll be asked to enter an additional code after you enter your password. This code is generated by an app on your phone1, or sent to you by SMS, and changes every 30 seconds. With two-factor authentication enabled, even if your password is compromised, a hacker cannot log in into your account.

Ideally, security is based on three things: something you know, something you have, and something you are. Almost everybody uses usernames and passwords. That’s something you know. But as security experts point out, “passwords have outlived their usefulness as a serious security device”. Adding something you have to the login process, like an additional code generated by an app in your phone, greatly enhances security.

If you are required to use your fingerprint to unlock your phone, then you’ve introduced a third factor: something you are. This is probably the best scenario you can get without resorting to professional-level security.

Authy

There are several authenticator apps on the market, perhaps the most well-known are Google Authenticator and Authy. Microsoft also offers an app. My personal favorite is Authy, because it syncs across devices so you can generate tokens from your phone or laptop. (Authy’s webpage offers a handful of guides on how to activate two-factor authentication on popular services. Check, for example, their guide for Gmail.)

What if your mail service provider doesn’t offer two-factor authentication? Don’t hesitate, change to a provider that does.

Use a Password Manager

The second most important thing is to use a password manager. Writing down your passwords on a stick-it note or in your iPhone’s Notes app is not only inefficient but insecure.

Companies that require their employees to change their passwords every 30 days, and don’t provide them with a password manager, are simply encouraging their employees to use weak, easy to guess passwords, or to write them down in a note they stick to their laptops.

With a password manager, you only need to remember one password: the one for the password manager itself. The app takes care of storing the usernames and passwords for every online service you use. Thanks to browser extensions, they recognize which webpage you are visiting and fill in the proper credentials. It also keeps you passwords synchronized between devices. (And yes, you can enable two-factor authentication for the password manager itself.)

Passwords and hashes

To understand why password length and complexity is important, we need to dive into how online services store passwords, and what hackers do when they steal user’s credentials from a server.

When an online service asks you to enter a password to create your account, the password is not stored as-is in the company’s servers. Instead, the server generates a hash code for the password. This hash code, and not the actual password, is stored along with your username and other data on the server2.

A hash is a mathematical function that takes a string of data as an argument, and produces a fixed-size series of numbers, which is call a hash code. Different passwords will produce different hash codes, and it is nearly impossible to deduce the original password from the hash code.

To verify your identity, the online service asks for your password, generates a hash code for the characters you typed in, and compares it to the hash code it generated when you created your account (or last changed your password). If both hash codes are equal, it means that the password you just typed and the password registered on the server are the same. You are granted access to your account.

Now and then, hackers break into an online service’s servers and steal data: email addresses, and password hashes, among other data. These stolen databases are sold in the black market for money3.

As computer processing power becomes cheaper, it is possible to try a brute-force attack against a stolen database and succesfully recover part of the original passwords from the hash codes. Brute-force means that the hacker will use a program to generate, systematically, passwords with every combination of characters, and compare their hash codes with the hash codes in the stolen database4. For every match, the attacker now knows he or she’s got the password for a given account.

To protect you from this kind of attack, password managers allow you to generate long and random passwords for each new service you sign in. If you are inventing passwords by yourself, then your passwords are probably not long or complex enough. A long enough password ensures that a hacker won’t be able to crack it for several years from today.

This comic by xkcd’s Randall Munroe illustrates the point.

If the hacker get’s to know your username and password, chances are he or she will try to use them to access your accounts on popular services: Gmail, Facebook, Dropbox, Instagram, LinkedIn, etc. Once he’s got access to your email, he can request a password reset from other services, which will send a link to for resetting your password to your now-compromised email account. (That’s another reason to enable two-factor authentication.)

Which password manager should you use? I can recommend 1Password, which I’ve been using for several years now. Also, LastPass has excellent reviews.

Two-factor authentication and using a password manager are the most important things you should do today to improve online safety and protect your accounts from being hacked.



Photo by Dayne Topkin on Unsplash


  1. These apps are called, among other names, two-factor authentication or 2FA apps, authenticator apps, one-time password or OTP apps. ↩
  2. There are some online services that store their customer’s passwords as-is, which is a terrible practice. You can detect such services when you forget your password and click on the ‘Forgot your password?’ link: they’ll send you your password by email, instead of generating a new one or sending a link to reset it. ↩
  3. There are pages that will tell you if your email has been compromised in a data breach. Check, for example, \. ↩
  4. The attacker doesn’t even have to be an expert hacker to do this. For $10, you can get a very good book explaining how to do it. ↩

Filed Under: Strategy and Technology Tagged With: hacks, password managers, security, two-factor authentication

Social Networks’s behavioral addiction

2019-08-11 by Roberto Zoia Leave a Comment

Cal Newport, in his book Digital Minimalisn, explains that there are two forces that encourage behavioural addiction when using social networks.

The first force, intermittent positive reinforcement, exploits the fact that rewards delivered unpredictably are more enticing than those delivered with a known pattern. The expectation of likes/hearts/retweets after posting online is comparable to gambling.

The second force is the the drive for social approval. Social media is tuned to offer us a rich stream of information about how much (or how little) our friends are thinking about us at the moment.

We didn’t sign up for the digital lives we now lead. They were instead, to a large extent, crafted in boardrooms to serve the interests of a select group of technology investors.

— Cal Newport, Digital Minimalism

A quick test to see how deep these two forces have taken hold of your behavior: delete your Facebook and Instagram apps from your phone for just one day, and see if you show signs of abstinence syndrome. You can always reinstall the apps later if you want.

Filed Under: Strategy and Technology Tagged With: addiction, minimalism, social networks

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 60
  • Go to Next Page »
  • What I’m Focused on Now
  • Español
  • Privacy Policy

Copyright © 2021 Roberto Zoia
zoia.org runs on WordPress using a customized version of the Parallax Pro Theme for the Genesis Framework.

This website uses cookies to improve your experience.Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT