âBenevolent Hackersâ
Workers are fomenting a quiet revolution. They subvert established company policies whenever those rules and regulations make their jobs harder or less efficient. This revolution takes the form of circumventing or replacing outmoded or silly procedures. It enables workers to be faster and more productive, and it allows them to fine-tune work circumstances to suit their own natures, rather than bending to idiotic bureaucracy. The members of this ever-growing community of under-the-radar revolutionaries are called benevolent hackers.
âThere is an underground army of benevolent hackers out there who are saving business from itself and having fun along the way.â
âBroken Businessesâ Old business models and processes no longer work. Rigid managers and top-down directives make a company less productive. Yet in uncertain times, most firms tend to be more fearful, more controlling, more rigid and less concerned with employee happiness. But hard times demand courage, not timidity. Workers are fighting back. Evers Pearceâs bosses at Oxford cut his projectâs funding to nearly nothing and told him to throw out its furniture and other detritus. Instead, he sold the supposed garbage on eBay and funneled ÂŁ37,000 back into the project. Such workers are taking control. Well-meaning ârulebreakersâ are making sure their employers thrive in spite of self-destructive policies. The workplace has changed, but few firms have kept pace with these changes. Workers must drag their employers into the present first, and then into the future. Lots of that forward-motion is taking place underground, right under managersâ noses.
You Can Hack
If youâve ever convinced your boss to extend a deadline despite the rules, or if youâve used email to send âa company file to yourself at a personal address so you could work on it at home,â then you understand hacking. It requires only curiosity, imagination and drive. Ask what would happen if you tried something new. Donât listen to anyone who says you âcanât.â Doing a âbenevolent hackâ may make it simpler for you to work at your best, give you power over your tasks, make your âwork smarterâ and provide some kicks. Even the word âhackingâ derives from fun. In the 1960s, a small group of students who called themselves âhackersâ altered electric trains to make them run faster. Then they did the same to the main computer at their college, the Massachusetts Institute of Technology, and gave birth to a name and a movement.
âTodayâs top performers are taking matters into their own hands.â
With the right hack, you can make your company a place where people work better, feel more creative and generate higher quality work for less money, thus fulfilling the modern rallying cry, âmorebetterfastercheaper.â Firms that force people to follow top-down processes are the same ones who legally hack and track your Web interactions to find more, better, faster and cheaper ways to market to you. Are you ready to fight back? Four basic steps can lead to âyour first hackâ:
- What three things at work annoy you most? â Find the restrictive rules, the inefficient procedures, and the corporate customs that impede your work and get in your way.
- Research and learn â If you must do X, find out how X works and why you were forced to do it in the first place. Ask who might benefit or suffer if you find an alternative way.
- The first hack is the simplest â Your first âwork-aroundâ must be simple and harmless.
- Know your goal â Youâre not taking action just to mess with the system. Youâre taking action to achieve a narrow, specific result. Be aware of that goal before you hack.
âSoft and Hard Hacksâ
Hard Hacks alter any ânonliving system.â Using instant messaging in a meeting to communicate work-related insights while a dull speaker drones on is a Hard Hack. You donât need expertise to perform 99% of Hard Hacks. Instructions for most hacks exist online; just search for them. If security keeps you from sending colleagues information, try âopen source Web toolsâ or Google Docs. If you canât obtain the needed data, some office geek doubtless can find it.
âHacking is...understanding a system well enough to take it apart, play with its inner workings and do something better with it.â
Soft Hacks alter ârelationships or work agreements,â like asking a colleague or boss about working in a nonprocedural way to mutual benefit. Because Soft Hacks involve other people, they are as complex as any other relationships. The best time for your first hack is when youâre newly hired but before you start work. Use the âNegotiating the Dealâ Soft Hack to arrange the terms of your employment, such as persuading the boss to let you work from home or to give you the perks and pay you what you want no matter what others earn. Soft Hack every aspect of your job, hours, bonuses and compensation. Donât accept the status quo. Most compensation deals benefit companies, not employees, but managers know which staffers are worth paying to keep. If you are one of them, hack a pay package that reflects your worth. After youâve been working awhile, identify the aspect of your job that demands the most energy for the least progress. Seek the simplest possible change, even if it is as small as âusing your own emailâ instead of the firmâs.
âTechnology changes continuously.â
âChanging the Relationshipâ Soft Hacks might involve being allowed to work with an excellent manager or to make work contacts via your social network. Since everyone wants something, Soft Hack your targetâs desires to your advantage: Coach, manipulate, horse-trade, wheedle, bargain, persuade or help someone in a way that ensures theyâll help you in return. The start of a new project is hack-time supreme. By then youâll know which communications or processes hamper your work. Hack around them as you set project parameters. Once you make a deal, hold up your end. Then you can Soft Hack again. Pick your moments wisely; use any leverage you can devise.
âThe Ten Commandments of Benevolent Hackingâ
When you hack successfully, tell others. Give them the advantage you created for yourself. Sharing fulfills the reason you hacked in the first place: to make work faster, better, more efficient, less restricted and more fun. The 10 core rules of benevolent hacking are:
- âBe coolâ â Youâll know youâre not cool when no one wants to play with you. Donât be a jerk. Share, clean up, be fair, apologize if youâre wrong, keep your word and try hard.
- Try not to hack â If you can fix a problem without hacking, do. Donât waste a hack.
- âDo no harmâ â âDonât hack for any of the seven deadly sins (no porn, no greed...no revenge or wrath, no lack of diligence or getting out of virtuous work, no enhancing your own vanity).â Donât do anything to a system that changes how others use it. Improve your situation; do not damage anyone elseâs.
- âNever compromise other peopleâs informationâ â Keep customer data and âcorporate intellectual propertyâ where it belongs. Donât share information with anyone who is not authorized. Check your hack to make sure you have not exposed anything to anyone.
- Play nice â Collaborate; create a work-group. Respect other peopleâs skills.
- âPay it forwardâ âYour transparency regarding your hacks will help others and will teach them to be open about their gains.
- Honor âthe Law of Attractionâ â If a YouTube video gets 100,000 hits, those hits will garner 100,000 more. The buzz grows, the mainstream notices and lives change. Letting your audience know you work within ethical guidelines will earn you a larger following.
- You can only be yourself â If hacking is not for you, tell your idea to those who can hack. If hacking is in your blood, be a hacking consultant. Consider all your options.
- Hard work trumps talent â Practice your skills, stick to a routine, be disciplined and work like a dog.
- Let hacking teach you who you are â Think through hackingâs âethical dilemmas.â âWhat really matters to you?â Are you âdoing your best? What do you stand for? What would you compromise to keep your job? How much is too much compromise?â
Whatâs Broken and Needs Hacking?
âBusiness just doesnât get it.â Central commands function against efficiency and individuality; they serve the company, not its people. IBMâs 2008 âGlobal Human Capital Studyâ found that the most significant barriers to good performance were the companyâs own âtools and processes.â Any procedure you must enact, any manual you must read, any guidelines your boss must follow get in the way of simple, common-sense behavior. The very managers who should set you free to do your best work instead work overtime to control you. Corporate tools and procedures, by their nature, limit and restrict you. Awesome anomalies exist, of course. Zappos will pay you $2,000 to quit right away if its corporate culture, the âZappos way,â doesnât suit you.
No Safety in a Paycheck
Working for someone else has become âa high-risk profession.â In a tough economy, companies do not protect their employees. They cut salaries, and some firms â like British Airways â ask people to work a month for free. To keep your job, you must sacrifice. âLoyalty and performanceâ once counted, but now, no matter how hard or well you work, you could be fired in a heartbeat. Nothing stands between you and the vagaries of the market. However, you can do a few things to protect yourself:
- âBe luckyâ â Find a forward-thinking, sharing company and get a job there.
- âAccept the riskâ â Find the best work situation you can; hang on tooth and nail.
- Hack â Change what you can to your own advantage.
Fight âFUD: Fear, Uncertainty, Doubtâ
You must address FUD: the fear, uncertainty and doubt that hold you back. This term derives from a 1970s IBM sales strategy. Salesmen would try to plant FUD in the minds of potential customers so they would regard buying from IBM as the safest course. Knowing that any twitch in the global market could mean the instant end of your job, how can you fight FUD? Conquer your fear of these conflicting forces: You want your work to help you develop as a person. You also want to serve your firm, its shareholders and the world, but every system serves âcompany priorities.â If your priorities become the least important aspect of your work, youâll be unhappy, unproductive and unhealthy. Change the paradigm; make the systems default to your priorities.
âWhenever business finally embraces the age of co-creation, the hackers among us will be our best advisers.â
Donât be afraid to hack. Everyone around you is hacking, so join the party. âBenevolent hackers do not get fired.â The hacking universe offers a continuum of risk. Donât aim too high or too low. The âLife Changingâ hack offers high risk but great reward. Creating Facebook was a Life Changing hack for Mark Zuckerberg. The âCareer Changingâ hack offers less risk but still confers a high reward. The âWork Changingâ hack dodges some minor obstacles to make your day easier, but it does not bring you more money. The âGetting Byâ hack offers no risk and little reward. It might change one small aspect of your work life, but even that is a good place to start.
âHackers believe that if you donât know whether or not youâre being cool...you probably arenât.â
To carry out work-around hacks, behave as if you are a leader who has the power to make the changes you create. If you act like youâre in charge, people will follow. Be brazen and never craven. âDesign from the bottom up, not the top down.â If you want to hack, start gathering and mastering tools that fit your purpose. When you hack well, you may be surprised that co-workers who once opposed you suddenly become your allies and backers. If you show them a better way, ânonbelievers become sponsors.â
Deliver the Results You Promise
Hack well, deliver what you promise â even if you made the pledge only to yourself â and success will find you. If you achieve company goals before âyour boss and your bossâs bossesâ figure out their own routes to meeting those goals, you will be a hero. Once your results are certain, tell your manager how you achieved them. Explain your hack clearly. Show that you havenât damaged anything. Share your method. Remember you are personally accountable for your hacks. Take responsibility for your actions. Make no excuses. Behave like a leader. More folks than you think are out there hacking. Someone a cubicle away is changing the world in tiny increments. Hacking gives you the power to bring about change. The hack comes from your willingness to embrace the possibility that things could be different. When you find the courage to start changing the world, just remember: Do no harm.