- Coming January 19: Comply, Resist, or Exploit?
- When we encounter obstacles, we have choices about how we deal with them. Generally, we can comply, we can resist, or sometimes, we can find ways to use the obstacles — to exploit them — to advance to our objectives. The pandemic provides two examples. Available here and by RSS on January 19.
- And on January 26: Cyber Rumors in Organizations
- Rumor management practices in organizations haven't kept up with rumor propagation technology. Rumors that propagate by digital means — cyber rumors — have longer lifetimes, spread faster, are more credible, and are better able to reinforce each other. Available here and by RSS on January 26.
Other topical archives:
October 28, 2020
- Notes to Self
- Many of us jot important reminders to ourselves on sticky notes, used envelopes, scraps of paper, and whatnot. Often we misplace these notes, or later find them too late to serve their purposes. Here's a low-tech alternative that works better for some.
June 10, 2020
- They Don't Reply to My Email
- Ever have the experience of sending an email message to someone, asking for information or approval or whatever, and then waiting for a response that comes only too late? Maybe your correspondent is an evil loser, but maybe not. Maybe the problem is in your message.
March 28, 2018
- Four Overlooked Email Risks: II
- Email exchanges are notorious for exposing groups to battles that would never occur in face-to-face conversation. But email has other limitations, less-often discussed, that make managing dialog very difficult. Here's Part II of an exploration of some of those risks.
March 21, 2018
- Four Overlooked Email Risks: I
- Working together to resolve issues or make decisions in email is fraught with risk. Most discussions of these risks emphasize using etiquette to manage emotional content. But email has other limitations, less-often discussed, that make managing email exchanges very difficult.
February 20, 2013
- On Badly Written Email
- Even those who aren't great writers do occasionally write clearly, just by chance. But there are some who consistently produce unintelligible email messages. Why does this happen?
June 11, 2008
- Inbox Bloat Recovery
- If you have more than ten days of messages in your inbox, you probably consider it to be bloated. If it's been bloated for a while, you probably want to clear it, but you've tried many times, and you can't. Here are some effective suggestions.
May 4, 2005
- Email Antics: IV
- Nearly everyone I know complains that email is a real time waster. Yet much of the problem results from our own actions. Here's Part IV of a little catalog of things we do that help waste our time.
April 6, 2005
- Email Ethics
- Ethics is the system of right and wrong that forms the foundation of civil society. Yet, when a new technology arrives, explicitly extending the ethical code seems necessary — no matter how civil the society. And so it is with email.
January 14, 2004
- Email Antics: III
- Nearly everyone complains that email is a time waster. Yet much of the problem results from our own actions. Here's Part III of a little catalog of things we do that help waste our time.
December 31, 2003
- Email Antics: II
- Nearly everyone complains that email is a time waster. Yet much of the problem results from our own actions. Here's Part II of a little catalog of things we do that help waste our time.
December 17, 2003
- Email Antics: I
- Nearly everyone I know complains that email is a time waster. Yet much of the problem results from our own actions. If you're looking around for some New Year's resolutions to make, here are some ideas, in this Part I of a little catalog of things we do that help waste our time.
July 16, 2003
- Most of us get too much email. Some is spam, but even if we figured out how to eliminate spam, most would still agree that we get too much email. What's happening? And what can we do about it?
September 5, 2001
- Email Happens
- Email is a wonderful medium for some communications, and extremely dangerous for others. What are its limitations? How can we use email safely?
May 23, 2001
- Avoid Typing Under the Influence
- When we communicate, we can't control how other people interpret our communications. Accidental offense is inevitable, and email is especially likely to produce examples of this problem. What can we do as members of electronic communities when trouble erupts?
February 7, 2001
- The Tweaking CC
- When did you last receive an email message with a "tweaking CC"? Probably yesterday. A tweaking CC is usually a CC to your boss or possibly the entire known universe, designed to create pressure by exposing embarrassing information.
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
My blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!