SlideShare a Scribd company logo
1 of 46
Download to read offline
..
toxic
technology
@daverog
Photo by click at Morguefile.com
Dave
Rogers
independent digital and technology
consultant
@daverog
1.
2.
3.
4.
problems
patterns
causes
solutions
@daverog
there’s a problem with
digital technology
@daverog
Section
software is eating
the world
https://government.github.com/
@daverog
£1.7billion
UK Government spend in 2018 through Crown
Commercial Service digital & technology
frameworks
Source: https://www.govspend.org.uk/
Photo by jppi at Morguefile.com
There is a problem
with accumulation
Each year,
established
organisations have
more:
1. technology
2. complexity
3. legacy
4. risk
@daverog
Painful dilemmas
about an
accumulating
technology estate
@daverog
@daverog
The real life impact
of failing
technology
the threat from
cyber attack
remains persistent
and acute
@daverog
1.
2.
3.
4.
problems
patterns
causes
solutions
@daverog
the emerging pattern
@daverog
toxic technology[ˈtɒksɪk tɛkˈnɒləʤi]
noun, informal
a characterisation of technology
by its unintended flaws
@daverog
toxic != legacy
(legacy is all the technology
inherited from the past - the good,
the bad and the ugly)
@daverog
toxic
characteristics of
technology
➔ hard to:
○ use
○ change
○ maintain
○ recover
➔ exclusive
➔ insecure
➔ unreliable
➔ inefficient
@daverog
1.
2.
3.
4.
problems
patterns
causes
solutions
@daverog
Causes
@daverog
causes, part 1
digital technology
is weird
@daverog
digital technology
is unpredictable
➔ Sometimes it
enables, and
sometimes it
inhibits.
➔ Sometimes things
happen
unexpectedly.
@daverog
(unpredictability
isn’t surprising
when you see
what’s below the
surface)
https://xkcd.com/2347/
@daverog
digital technology
is counterintuitive
Assumptions about
what technology
can and can’t do
well are commonly
wrong.
@daverog
“Out of the more than 200
unique technologies that have
ever appeared on a Gartner
Hype Cycle for Emerging
Technology, just a handful of
technologies - Cloud
Computing, 3D Printing,
Natural Language Search,
Electronic Ink - have been
identified early and traveled
even somewhat predictably
through a Hype Cycle from
start to finish”
8 Lessons from 20
Years of Hype
Cycles
By Michael Mullany 2016
@daverog
yet, we believe in
science fiction
@daverog
Photo by lauramusikanski at Morguefile.com
In UK gov, there’s
a book for
appraising sci-fi,
and judging how
believable the
story is.
@daverog
digital technology
amplifies our
prejudice,
ignorance and
fears
we often don’t
know who we’re
excluding or
impacting when we
introduce
technology
@daverog
causes, part 2
we are weird
(when we deliver technology)
@daverog
Neophilia
many prefer to
create, yet loathe to
maintain
@daverog
Optimism
we are falsely certain
about delivering
digital technology
@daverog
causes, part 3
the roots
@daverog
1. Culture
A cause of toxic technology
➔ Command and
control
cultures lead to
widespread
mistrust.
➔ This
encourages
teams to over
promise, and
under deliver.
@daverog
2. Risk
A cause of toxic technology
organisations
are ‘boiling the
frog’ - slowly
rising risk is
ignored, until
it’s too late
@daverog
3. Money
A cause of toxic technology
accountancy
falsely models
technology
delivery as the
creation of
assets.
@daverog
4. Markets
A cause of toxic technology
some
companies
exploit their
customers’
ignorance in
technology.
@daverog
1.
2.
3.
4.
problems
patterns
causes
solutions
@daverog
what’s being done?
@daverog
sustainable digital
technology
DevOps,
agile
@daverog
addressing the
root causes
@daverog
I’m writing, and
talking about toxic
technology
daverog.com
https://daverog.com
@daverog
what can you do?
@daverog
observe and
influence the
‘architecture’
which goes
beyond the
technical
➔ culture
➔ risk
➔ money
➔ markets
@daverog
be conscious of
your biases
Agent detection
Ambiguity effect
Anchoring or focalism
Anthropocentric thinking
Anthropomorphism
Attentional bias
Attribute substitution
Automation bias
Availability heuristic
Backfire effect Confirmation bias
Base rate fallacy
Base rate neglect
Belief bias
Berkson's paradox
Clustering illusion
Compassion fade
Confirmation bias
Congruence bias
Conjunction fallacy
Conservatism bias
Continued influence effect
Contrast effect
@daverog
be gardeners,
not architects
@daverog
Photo by MnhThng at Morguefile.com
teams,
not projects
@daverog
Photo by pawankawan at Morguefile.com
stop accepting the
conditions for
failure
@daverog
Photo by diannehope at Morguefile.com
Useful links
➔ https://a16z.com/2011/08/20/why-software-is-eating-the-world/
➔ https://www.computerweekly.com/news/252490445/HMRC-signs-five-year
-169m-contract-with-Fujitsu-for-VME-platform
➔ https://tech.newstatesman.com/security/cost-wannacry-ransomware-attac
k-nhs
➔ https://assets.publishing.service.gov.uk/government/uploads/system/upl
oads/attachment_data/file/685903/The_Green_Book.pdf
➔ https://government.github.com/
➔ https://xkcd.com/2347/
➔ https://twitter.com/DrDomPimenta/status/1159897448363569152
➔ https://www.linkedin.com/pulse/8-lessons-from-20-years-hype-cycles-mi
chael-mullany
➔ https://github.com/gchq/BoilingFrogs
➔ https://www.madetech.com/resources/books/modernising-legacy-applic
ations-in-the-public-sector
➔ https://www.legacycode.rocks/
➔ https://festivalofmaintenance.org.uk
➔ https://aws.amazon.com/blogs/publicsector/budgeting-for-change-how-
can-government-spend-smarter-and-deliver-better/
➔ https://www.amazon.co.uk/Servant-Leadership-25th-Anniversary-Legitim
ate/dp/0809105543
➔ https://hbr.org/2014/12/what-bosses-gain-by-being-vulnerable
➔ https://en.wikipedia.org/wiki/List_of_cognitive_biases
➔ https://www.youtube.com/watch?v=Jsi53_SBD7U
➔ https://itrevolution.com/book/seat-at-the-table/
➔ https://daverog.com/series-toxic-technology/
@daverog
Thank you.

More Related Content

Similar to Toxic Technology

Modern computer network technologies converted
Modern computer network technologies convertedModern computer network technologies converted
Modern computer network technologies convertednafisarayhana1
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
Impact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyImpact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyTenet Systems Pvt Ltd
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
The impact of technology in society.pptx
The impact of technology in society.pptxThe impact of technology in society.pptx
The impact of technology in society.pptxmanmeetkaurraina696
 
How to Use Data for Good
How to Use Data for Good How to Use Data for Good
How to Use Data for Good Experian_US
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designAlexandra Deschamps-Sonsino
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?Pixel Crayons
 
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)CiaraAbila
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfHi-Tech Institute
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology Ziyad Siso
 
Chapter 19
Chapter 19Chapter 19
Chapter 19rogly
 
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptxDEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptxMariahJezzaClaireDap
 
Tech Trends: The Future of Innovation
 Tech Trends: The Future of Innovation Tech Trends: The Future of Innovation
Tech Trends: The Future of InnovationSmartmeta
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer systemparag dhok
 

Similar to Toxic Technology (20)

Def COMMIT Demoboekje V2 LR
Def COMMIT Demoboekje V2 LRDef COMMIT Demoboekje V2 LR
Def COMMIT Demoboekje V2 LR
 
Modern computer network technologies converted
Modern computer network technologies convertedModern computer network technologies converted
Modern computer network technologies converted
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
Impact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyImpact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit Pandey
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
The impact of technology in society.pptx
The impact of technology in society.pptxThe impact of technology in society.pptx
The impact of technology in society.pptx
 
How to Use Data for Good
How to Use Data for Good How to Use Data for Good
How to Use Data for Good
 
Technology[1].pptx
Technology[1].pptxTechnology[1].pptx
Technology[1].pptx
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?
 
TECHNOLOGY.pptx
TECHNOLOGY.pptxTECHNOLOGY.pptx
TECHNOLOGY.pptx
 
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)Lesson-1-Technological-Compentency (TECHNOLOGY 200)
Lesson-1-Technological-Compentency (TECHNOLOGY 200)
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdf
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptxDEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
DEMO Teaching COT2 JUNE 23, 2021 TRENDS.pptx
 
Tech Trends: The Future of Innovation
 Tech Trends: The Future of Innovation Tech Trends: The Future of Innovation
Tech Trends: The Future of Innovation
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Toxic Technology