Limits to prioritization
Joe, after several days of writing,
came to me with a written proposal for a project, IVORY SNOW.
Joe has carefully filled the proposal template:
the proposal describes a problem, and the proposed solution;
it considers alternative solutions and shows why they’re inferior;
it lists work required and an effort estimate;
it has a RACI,
et cetera.
I thanked Joe’s for his proposal,
and read it carefully.
I looked for negative side-effects of IVORY SNOW,
but Joe has addressed those.
I did an impact/effort analysis,
and the impact of IVORY SNOW ($1M revenue)
seems much greater than the effort required ($10K in costs).
The proposal passed all our analysis tools with flying colors,
so I accepted the proposal,
and Joe began work on project IVORY SNOW.
What’s wrong with this common picture?
I didn’t consider all the other projects Joe could have worked on instead!
The cost of IVORY SNOW is not just Joe’s salary;
it’s also the foregone revenue I could have got from Joe working on FLYING STALLION!
This cost is called “opportunity cost”,
and it can seriously outweigh the explicit costs.
To show opportunity cost,
the only tool I know of is a prioritized backlog.
Here’s an example:
Priority | Project | Revenue estimate | Explicit cost estimate |
1 | FLYING STALLION | $100,000,000 | $10,000 |
2 | DESERT MEMORY | $10,000,000 | $20,000 |
3 | ROWDY TRUMPET | $50,000 | $1,000 |
... | ... | ... | ... |
When Joe presented IVORY SNOW,
what I should have done is insert it into this backlog.
This would have made it clear that FLYING STALLION is the right thing for Joe to work on.
The prioritized backlog seems like the miracle cure to invisible opportunity cost.
So why didn’t I use the backlog?
There are, unfortunately,
many reasons!
One common we forget the backlog is focus.
We’re taught that focus is a virtue.
But focus can also lead to myopia!
By considering IVORY SNOW in such detail,
I became unaware of other things we could be doing.
Another limit to prioritization is incomparability.
These
One fundamental limit is centralization.
To prioritize everything,
you need a single backlog.
This backlog is a bottleneck.
Its owner, such as a Product Manager, is a bottleneck.
Another fundamental limit is multiple skills.
Joe is competent to work on IVORY SNOW or FLYING STALLION.
Jane is competent to work on IVORY SNOW or ROWDY TRUMPET.
A common work-around is multiple backlogs:
the PM has one,
the team has another,
and each contributor has their own.
The trade-off is that items from different backlogs are incomparable.
Another fundamental limit to prioritization is incompleteness.
I do not have the imagination to list everything I could be doing!
- Multiple backlogs.
- We use systems that hide the backlog.
You might use quarterly OKRs (Objectives and Key Results) at work.
These tools omit the non-objectives.
Signs you’re not considering opportunity cost,
and not doing enough prioritization:
- You answer “yes” or “no”.
Usually, the answer should be “not yet”.
- You say “yes” too much.
Considering opportunity cost,
you should only be saying “yes” to one thing.
- You’re always very busy.
Limits to prioritization.
Centralization.
Everything has to go through one backlog.
Tagged .
Similar posts
More by Jim
What does the dot do in JavaScript?
foo.bar
, foo.bar()
, or foo.bar = baz
- what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01
Smear phishing: a new Android vulnerability
Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06
A probabilistic pub quiz for nerds
A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26
Time is running out to catch COVID-19
Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27
The hacker hype cycle
I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23
Project C-43: the lost origins of asymmetric crypto
Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16
How Hacker News stays interesting
Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26
My parents are Flat-Earthers
For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20
The dots do matter: how to scam a Gmail user
Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07
The sorry state of OpenSSL usability
OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02
I hate telephones
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08
The Three Ts of Time, Thought and Typing: measuring cost on the web
Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26
Granddad died today
Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19
How do I call a program in C, setting up standard pipes?
A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17
Your syntax highlighter is wrong
Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11
Want to build a fantastic product using LLMs? I work at
Granola where we're building the future IDE for knowledge work. Come and work with us!
Read more or
get in touch! This page copyright James Fisher 2019. Content is not associated with my employer. Found an error? Edit this page.