Section 3: Productivity

3.1: My hacker plays video games on company time.

Abraham Lincoln said, “If I had ten hours to chop down an oak tree, I’d spend the first eight sharpening my axe.”

Some jobs are done best by getting your hands dirty immediately: if you hire a kid to rake your leaves, you probably want him to start raking as soon as he arrives. But if you contacted a building contractor to make a new office building in the morning, and he was pouring concrete by the end of the day, you would not be impressed–at least not in a good way. Something is very wrong: there are all sorts of things that need to happen first. If your contractor begins work by pouring concrete, you will end up paying for some very expensive mistakes that could have been completely avoided by simple preparation.

Your hacker is probably honest, too honest to start off by writing poor-quality code “so my manager will think I’m working.” He’d rather be productive and spend two weeks preparing rather than two years fixing needless mistakes.

Perhaps it would be easier if hacker ways of preparation coincided with what you do when working–writing memos or something like that. But there is an elusive productive zone, and your hacker is doing whatever he can to gain that productivity. I often write best after taking meandering walks–and, if you have difficulty believing that walks are a way to produce something good, I’d encourage you to read a dream of life–which, walks and all, took me very little time to write. I averaged over ten times the normal speed of a professional writer. Your hacker who plays games on company time is using the same areas of his mind as I did. Your hacker is sharpening his axe, and it’s a good idea for him to do so.

Hackers, writers, and painters all need some amount of time to spend “percolating”–doing something else to let their subconscious work on a problem. Your hacker is probably stuck on something difficult. Don’t worry about it.

3.2: But it’s been two weeks since I saw anything!

Your hacker is working, alone probably, on a big project, and just started, right? She’s probably trying to figure it all out in advance. Ask her how it’s going; if she starts a lot of sentences, but interrupts them all with “no, wait…” or “drat, that won’t work”, it’s going well.

3.3: Isn’t this damaging to productivity?

No. Your hacker needs to recreate and think about things in many ways. He will be more productive with this recreation than without it. Your hacker enjoys working; don’t worry about things getting done reasonably well and quickly.

3.4: My hacker is constantly doing things unrelated to her job responsibilities.

Do they need to be done? Very few hackers can resist solving a problem when they can solve it, and no one else is solving it. For that matter, is your hacker getting her job done? If so, consider these other things a freebie or perk (for you). Although it may not be conventional, it’s probably helping out quite a bit.

3.5: My hacker is writing a book, reading USENET news, playing video games, talking with friends on the phone, and building sculptures out of paper clips. On company time!

He sounds happy. The chances are he’s in one of three states:

  • Basic job responsibilities are periodic (phone support, documentation, et al.) and there’s a lull in incoming work. Don’t worry about it!
  • Your hacker is stuck on a difficult problem.
  • Your hacker is bored silly and is trying to find amusement. Perhaps you should find him more challenging work?

Any of these factors may be involved. All of them may be involved. In general, if the work is challenging, and is getting done, don’t worry too much about the process. You might ask for your corporation to be given credit in the book.

3.6: But my other workers are offended by my hacker’s success, and it hurts their productivity.

Do you really need to have workers around who would rather be the person getting something done, than have it done already? Ego has very little place in the workplace. If they can’t do it well, assign them to something they can do.

Explore More

What are cryptographic attacks?

Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the

[Paper XSS] Vulnerabilities in Common Shockwave Flash Files

SummaryCritical vulnerabilities exist in a large number of widely used web authoring tools that automatically generate Shockwave Flash (SWF) files, such as Adobe (r) Dreamweaver (r), Abobe Contribute (r), Adobe

Hacking Computers Illegal Violation Access To Machines Cyber Crime

The term “hacking” has become one of those words today that are often frowned upon by people who occasionally have no idea what it involves. This homogenization of the signification