Skip to content

kennethbruskiewicz/hack-an-engineer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Hacking Engineers and Engineering Media

Background

There are many ways to “hack” software engineers by influencing media sources and fellow community members.

This document collects examples of intentional and unintentional hacks of software engineering information sources. The hope is to unbias these sources and provide antibodies to engineers so that they can make better personal and team decisions. (For more background, see this introductory essay - COMING SOON)

Contributions are welcome (see our guidelines).

General Notes

  • Reader Interest is King: When something is heavily covered, it is often due to large reader interest — not due to the importance of the event for you
    • Editors and especially social media algorithms focus on engagement as it maximizes interest and revenue; also, a key reason for confirmation bias, filter bubbles, and technical hype
    • Rather than thinking of news as mirror of what’s going on in the world, think of it as mirror of what people (or on FB/Twitter, you alone) want to read/hear
    • This is a key reason for so much content about hyped topics like blockchains, AI, or the latest frontend framework
  • Issues with Online Democracy: Social networks algorithms and voting mechanisms generally treat each of us equally, which diminishes how much voice is given to experts; often an issue on deeply technical topics
  • Technical Background: Always need to ask what the technical background and self motivation of speaker/writer is when deciding how to weigh their opinion; a surprising number of people with little subject matter expertise have strong opinions on highly technical topics
  • Empathy Gap: Media and social media forums often have little empathy for the “other” side, as a given audience prefers to see themselves in the best light — and it is more engaging to see opposite side in worst light (see many cryptocurrency communities); algorithms and even editors cater to this, which you need to consciously correct for
  • Fact Distortion Field: Motivated parties often create a "fact distortion field" in media that justifies their parochial views; they do this by encouraging content that supports their views and paying scientists/engineers to support these views
  • Building antibodies: Scientists and engineers deeply benefit from getting things “right” in their job; to do the best job, critical for us to identify ways our data sources are influenced — and how to partially unbias them

Sources and Hacks

Social Media

Reddit and Hacker News

How it works

  • Anyone can join and vote in community, with everyone’s vote counted equally
  • For new posts, the number of upvotes soon after posting determine placement in the front page ranking
  • Comments are similarly upvoted, with early comments generally advantaged over later comments
  • Goal is to favor content that is likely to be heavily upvoted for the community of upvoters
  • (Popular input source in startup communities and for junior engineers)

Example hacks

  • Upvoting Ring: Asking your friends and supporters to upvote (common in dev tool companies, training programs, incubators); this can work despite countermeasures that social networks undertake
  • Confirmatory Content: Creating content that justifies pre-existing views or financial incentives of subreddit holders; see what popular views are before, and ape them (example: cryptocurrency subreddits that promote their own currency, and discredit competing currencies)

Other issues

  • No more experts: No distinction for experts versus others; one layman has the same voting power as the world’s most thoughtful expert (Example: a non-engineer vs. the world’s most thoughtful database expert on MongoDB posts); readers may also not take the time to understand background/expertise of writer
  • Militant Minority: Upvoting and posting community is likely small compared to readers, providing lots of power to a small group of motivated users; motivated users are often people who personally benefit from post
  • Different Needs: Ideal tools for one group/use case don’t map to another group/use case, even though both share the same social network (Example: frontend engineer’s database preferences for a hackathon vs. backend engineer’s database preferences for production, TDD and the needs of consultants)
  • Tribalism: Tribal behavior by key influencers can determine how certain topics are received (example: Though HN was quite negative to MongoDB, what would the reaction been if MongoDB was a Y Combinator company?, How does one cryptocurrency subreddit approach another?)
  • Clickbait: Decision of clickworthiness made on title alone, leading to incentives for clickworthy titles and easily explained content
  • Extreme “other”: Lack of empathy for other side, as more relevant to see the most extreme actions of the other side and ignore the poor actions of the most extreme people on your side (example: CIA deaths versus limited coverage in US of CIA actions elsewhere, one cryptocurrency subreddit’s view on another)

Facebook and Twitter Feeds

How it works

  • Algorithms take newly posted content from often likeminded friends/followers and decide what to feature so that user engagement is maximized (click, like, share/retweet)
  • Unlike Reddit model, algorithm is focused on maximizing engagement for each individual user, not for a broader, more diverse community

Example hacks

  • Fake News: False content that comport to reader’s views (example: fake news)
  • Selective facts: Partial facts (factual coverage that only shows part of the picture); key issue with relying on likeminded friends to dictate content

Other issues

  • Extreme degree of confirmation bias
    • we click on content that justifies our individual views without interacting with the full body of research on a topic
    • Gives us an irrational confidence that we know what is “reality”, because all evidence we see justifies a certain view
    • May easily dismiss valid opposing viewpoints

Potential Antibodies

  • Realize huge degree of confirmation bias on Twitter/Facebook — and echo chambers in every social network; social media gives readers what they want, not what they need
    • Ari Paul, CIO Blocktower, on social media around cryptocurrency:

“Easiest way to be popular is to tell people what they want to hear. Easiest way to get rich is to tell rich people lies that they want to hear.” (link)

  • Ari Paul, CIO Blocktower:

“When I tweet anything positive about cryptocurrency it gets 10x the likes/shares as anything negative…” (link)

  • Realize it is newsworthy/relevant to see the excesses of the opposite side, but not very newsworthy/relevant to see excesses of your side (leads to empathy gap)
    • Noah Smith: “There are always a handful of people out there doing any stupid, crazy, or annoying thing you can imagine. And the media has an incentive to find those people and shove their excesses in your face.” (link)

    • My research on Islamic terrorism coverage in the NY Times vs non-Islamic terrorism and homicides (link)

Conferences and Meetups

How it works

  • Conferences make money primarily through ticket sales, sponsorships, and booths; they aim to fill the conference seats
  • Companies and media organizations organize groups of speakers and market the conference
  • Sponsors and corporate organizers want to show their technology in the best light
  • Motivations to speak at a conference (according to MongoDB’s marketing team)
    • increasing the speaker’s network
    • raising the speaker’s profile (personal branding)
    • recruiting for the speaker’s company
    • marketing for the speaker’s company (and for conference sponsors)

Example hacks

  • Sponsor speaker: For companies, support a speaker unaffiliated with your company who you think will be likely to represent your view
  • Organize your own conference: Run your own conference to ensure your own viewpoint is widely shared — and then shared widely online afterward by participants (Example: MongoDB funding for conferences and user groups)

Other issues

Potential Antibodies

  • Conferences should be just one additional data point that augment learnings from being around talented engineers — and shouldn’t be used as a primary view of what’s going on
  • Weigh the background and personal motivations of every speaker
  • Weigh the motivations and editorial power of who’s running conference

Content Marketing

How it works

  • Create “valuable” content that doesn’t look like an ad; is apt to get engagement and influence engineer behavior (examples: uptake a dev tool platform, enroll in a training program, join a company, use an open source package)
  • Popular reasons for content marketing: increase domain SEO (example: Yummly, Nerdwallet), collect sales leads, sell product/service, recruit engineers, improve brand
  • Content can be created in house, or relatively small amounts of funding can encourage others to create the content needed (example: Pusher’s technical tutorial solicitation)

Example Hacks

Other Issues

  • Need to write content on widely read topics to maximize readership; leads to an echo chamber of hype around new technologies since these have been validated to be of interest

Potential Antibodies

  • Have to be able to identify when something is content marketing
  • Ask what is motivation of writer and how this influences their view; also need to understand their technical background
  • Use content marketing to learn, but use it with proper skepticism
    • Fred Wilson, Partner Union Square Ventures:

“So how should entrepreneurs use this knowledge that is being imparted by VCs …? Well first and foremost, you should see it as content marketing… That doesn’t mean it isn’t useful or insightful. It may well be. But you should understand the business model supporting all of this free content. It is being generated to get you to come visit that VC and offer them to participate in your Seed or Series A round. That blog post that Joe claimed is not scripture in his tweet is actually an advertisement. Kind of the opposite of scripture, right?” (link)

Tech blogs and top media publications

How it works

  • Trained (and untrained) journalists research various topics and work with editors to publish on blogs and print news
  • Media organizations most often make money from ads; in some cases, they make money from subscription fees
  • At it’s best, goal of journalism is to give the “facts [we] need to make good decisions
    • Baser goal is to optimize eyeballs and number of paying subscribers by providing content that audiences want to read
    • Similarities to a convenience store that determines product placement based on maximizing sales

Example Hacks

Other Issues

Potential antibodies

  • When something is heavily covered, it is substantially due to large reader interest — not due to the importance of the event for you; risk of confirmation bias and sampling bias if you don’t adjust signal
    • Paul Graham: “The number of news stories about a problem is not a sign of how serious it is, but of how much demand there is for stories claiming so” (link)
    • My research on death coverage in the NY Times and risk assessment (link)
  • Realize vivid stories are powerful for user engagement, while lots of drier data and stories that inform good decisions are less monetizable (example: Shooting of Australian in US - and needs/pre-existing beliefs of Australian readers)
  • Dig into technical background of writer
  • When you see something covered, ask yourself who is motivated to have it covered this way
    • Especially valuable in laudatory personal profiles
    • In leaks, who could have leaked it and what was their motive? What important information might be unleaked?
  • When a PR-like piece is shared (A24 in GQ, IBM Watson, a laudatory profile) , ask what the covered party’s motivation is to get the word out now (recruiting, sales, corporate branding)
  • Read All the News That’s Fit to Sell (Stanford Professor James Hamilton) and Public Opinion (Walter Lippmann) for more on how events are turned into news

Fellow engineers

How it works

  • Fellow engineers may be vocal in social media, conferences, and on mailing lists

Example Hacks

  • Give them a monetizable business model, so that they’ll represent your views (example: MongoDB consultants who then speak favorably about MongoDB)
  • Give them equity in the success of your business — increasing the likelihood they’ll speak positively of you and, at minimal, reducing the likelihood they can publicly say negative things about you (example: cryptocurrency ownership, open source developer equity grant)

Other Issues

  • Fund researchers who pursue avenues that will be potentially accretive to your interests; not explicit bias, but means that opposite hypothesis may be weakly pursued

Potential antibodies

  • Question funding and incentives of anyone speaking favorably about a chosen technology
  • Just because someone has a well regarded reputation (e.g., through open source contributions, through previous well regarded projects) doesn’t mean they can’t be representing parochial incentives that are at odds with what is right for you

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published