Category Archives: Uncategorized

Sous Vide

Image via jetcitygastrophysics.com

It’s a special Foodie Friday for me. I received a holiday gift of an immersion circulator yesterday. It just might be a catalyst of large changes in how I cook. It also got me thinking about the business point which is our focus today.
What one does with an immersion circulator is to cook using the “sous vide” method. You French scholars out there will recognize that the term means “under vacuum.”  You place whatever you’re cooking into a plastic bag, extract the air, and seal it. That can be as fancy as one of those Foodsaver devices or as simple as a zip lock bag.  Either way, what happens next is the magic and where my gift comes in.

The bag (or bags) is placed in a water bath.  The immersion circulator holds the water at a steady temperature which is the desired end temperature of the food.  So, for example, you might want a steak cooked to 140 degrees.  That’s how you set the circulator.  The food never gets warmer than the water it’s in, so the method is pretty foolproof.  It cooks to an even temperature all the way through – no overcooked parts, no raw parts.  Because it’s in a sealed environment no moisture is lost either. When you’re ready to eat, most cooks will take the product out of the bag and, in the case of most proteins, put them briefly in a very hot pan to sear them.  Other than that it’s really “set it and forget it”.  Which is the business point.

Sous vide cooking doesn’t require much attention.  That is dangerous.  Chef Thomas Keller wrote “Eliminate the need to pay attention and you eliminate the craft” in his book on Sous Vide.  I agree, and we need to be mindful of the same thing in business.  Part of what we do is to set up processes that work extremely efficiently without a lot of hands-on from managers.  That’s dangerous.  First, no process is foolproof (in sous vide a bag could rip or, if cooked way too long, the food can become mushy).  Second, as Keller says, the hands-on part is the craft of business.  While data extraction, as an example, might be automated and hands-off, what we do with it is very much the craft.

I’m excited about trying my new toy this weekend.  As in business, I’ll do so mindful that while the process may be “foolproof” the designers might never have met a fool such as me and pay a lot of attention.  Make sense?

Leave a comment

Filed under food, Helpful Hints, Uncategorized

The Crack In The Wall

How good is your memory?  Remember way back in 2008 when the biggest social network site was seeing 75.9 million monthly unique visitors in the U.S.?  It was taking in a lot of money too – upwards of $470 million back in the days when digital advertising was still relatively new.  Big user base, solid revenue performance – what could possibly go wrong?

Facebook logo Español: Logotipo de Facebook Fr...

(Photo credit: Wikipedia)

Except that things did.  By 2011 MySpace‘s revenues dropped close to $184 million and their user base was down to 34.8 million.  What happened?  At the time, this was Business Week’s take:

It turns out that fast-moving technology, fickle user behavior, and swirling public perception are an extremely volatile mix. Add in the sense of arrogance that comes when hundreds of millions of people around the world are living on your platform, and social networks appear to be a very peculiar business—one in which companies might serially rise, fall, and disappear.

Why do I bring this up?  A report came out the other day from the Magid folks.  It found that the portion of 13- to 17-year-old social-media users in the U.S. on Facebook slipped to 88 percent this year from 94 percent in 2013 and 95 percent in 2012.  This comes on the heels of

New research conducted by the GlobalWebIndex (GWI) shows that while Facebook remains the most popular social network, it now has to face the challenge of keeping users interested. Among its teenage netizens, 54 percent cited that their “log in” habits have dropped due to a lack of interest. Of users who belong to the age range of 16 to 19, 64 percent now use the site less.

Now if you own a house, you’ve probably had the experience of noticing a crack in a wall that might not have been there the day before.  Most of the time it’s just the house doing a little settling.  Sometimes, however, it portends a serious problem.  I’m not sure which this is in Facebook’s case.  I suspect it’s more serious than one might think.  Why?

Another little factoid that came out of the data.  Teens don’t see Facebook as safe.  They have concerns that the service may not be trustworthy. When just 9 percent of those surveyed described the website as “safe” or “trustworthy, they have a problem, one they’re doing almost nothing to address.

I’m sure back in 2009 the MySpace folks didn’t lose much sleep worrying about small usage declines.  I don’t expect the Facebook folks are now even as they’ve stopped talking about teen usage on analyst calls.   A little settling or a massive structural problem?  What do you think?

Leave a comment

Filed under Uncategorized

Let’s Go Phishing!

Google put out a fascinating white paper on phishing attacks. No, it has nothing to do with a great jam band. If a title like Handcrafted Fraud and Extortion: Manual Account Hijacking In The Wild doesn’t get your attention, you’re not curious enough! It’s an interesting study on how online accounts are hijacked, usually leading to financial losses, stolen identities, and lots of other bad stuff.

The short version is that it’s basically human engineering – no fancy software involved. Taking advantage of people’s good natures, thieves mislead the recipients of their emails to give up details such as account login credentials or bank card information. Yes, there may be fake web pages involved (you DO know how to spot a fake, malformed URL, right?) but most of how these thieves hack in is based on ignorance, laziness, or both.

What can you do about this? Google recommends you should report suspicious-looking messages and you should type in URL’s to visit websites directly to login, rather than clicking through a link in your email program. As it turns out, there is also a pretty effective method for combatting phishing attacks called 2 step authentication.  Most platforms – Google, Facebook, Twitter, and others – use it and you should activate it for your accounts.  It means you’ll get a code texted to you which you must input to log in.  Does it add 15 seconds to a log in?  Yes, but it makes it extremely difficult for someone to hack your account unless they steal your phone too.  As the study shows, device theft is not at all a prevalent issue for hacking and this method has allowed Google to stop 99% of hijackings in the last few years.

It’s a good business lesson too.  We should spend more time thinking about systems that will prevent issues.  I suspect many of us think a lot about backups to repair damage but not enough about how to prevent it in the first place.  It may not be technology or software we need.  As with phishing, a bit of training and a heightened awareness of potential threats to the business can prevent a lot of fixing later on.

You agree?

Leave a comment

Filed under Helpful Hints, Thinking Aloud, Uncategorized