Latest Post

Internal comms includes listening

Internal comms includes listening

In most organisations I’ve worked in people say “We need to be better at communicating”—that is, communicating internally to their own staff. And in almost all these situations it’s by people who want to know what’s going on elsewhere in the organisation (maybe at the top level) or those who want to explain that. What’s … Continue reading


Hi. I'm Nik Silver. I've been leading software teams for years. My specialism is helping organisations work effectively with their technical teams, to deliver business value frequently and consistently. Take a look at my experience.

If you want to talk about turning talented people into brilliant teams then get in touch. I'm on e-mail, and I'm @pigsaw on Twitter.

RSS Recently spotted

  • My first proper job | Vanguard
    "...the approach should be not ‘digital’ but ‘human by default’."
  • Your job is not what you think it is | thinkpurpose
    "“The role of code developers is not to develop code, but to overcome problems through the use of code.” This sentence is lifted straight from here. It says that... The role of X is not to Y, but to overcome problems through the use of Y."
  • Crossing the Enterprise Architecture Chasm | - digital intelligence
    "We need to recognize the difference, the practical gap, that will always exist between EA models, plans, and other artifacts and an enterprise’s actual strategies, systems, assets, and processes. There will always be a gap because of several factors..."
  • Don't Copy the Spotify Model
    "The Spotify model can help you to understand how things are done at Spotify, but you shouldn’t copy it in your own organization. It changes all the time as people at Spotify learn and discover new things. There is no one way in which software is developed at Spotify."
  • Adding a phone number to your Google account can make it LESS secure.
    "Verizon later conceded that they had transferred his account despite having neither requested nor being given the 4-digit PIN they had on record. The attacker was able to reset Bob’s password and take control of his account."