A mental model to detect and prevent optimizing the wrong thing, at the wrong time, or for the wrong reasons| Alex Ewerlöf Notes
How a cost-cutting strategy led to the greatest collaboration effort of all time| blog.alexewerlof.com
See the about page for information about this site and target audience.| blog.alexewerlof.com
Here’s an activity ANY team can do to stay more aligned.| cutlefish.substack.com
Analyzing what does it mean for other companies| blog.alexewerlof.com
Tendency for positive impressions to contaminate other evaluations| en.wikipedia.org
What are the similarities and differences? What are the criteria for promotion? And some tools and techniques that come in handy.| blog.alexewerlof.com
Why did a friend of mine decline the chance to join a so-called "digital transformation"?| blog.alexewerlof.com
The Technology Radar is an opinionated guide to today's technology landscape. Read the latest here.| Thoughtworks
Why and how we continuously invested the team bandwidth to pay back tech debt and what were the results?| blog.alexewerlof.com
OpenID Connect Core 1.0 incorporating errata set 2| openid.net
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]| IETF Datatracker