Blog

"I realized this morning that your event content is the only event-related 'stuff' I still read. I think that's because it's not about events, but about the coming together of people to exchange ideas and learn from one another and that's valuable information for anyone." — Traci Browne

Welcome to the Conferences That Work blog!

You're in the right place for the latest posts on conference design, facilitation, peer conferences, associations, consulting, and stories like being trapped in an elevator with a Novel Prize winner.

Or sign up for a subscription to my blog posts or RSS feed so you never miss another post.

How you can learn from personal stories

learn from personal stories: a photograph of a woman storyteller sitting in an armchair with a lamp on top of a pile of books on a table next to her
How can you learn from personal stories?

After I met Glenn Thayer on a warm Colorado evening a couple of months ago, I kept remembering a story that he told me about a celebrity charity event he was emceeing. This puzzled me because the story had no obvious connection to my life or work.

Recently, I began to understand why his yarn kept popping into my head. I’ll post about Glenn’s story another time, but today I’ll write about how to learn from stories like Glenn’s.

Listening to personal stories

Every day, the people in your life tell you personal stories. They might be a family anecdote, a play-by-play reenactment of last night’s game, a tale of frustration at work, or a child’s outpouring about an incident on the school playground: a unique stream of the tragic, the lighthearted, the passionate, and the mundane. Most of these stories pour through your consciousness, hover there for moments, and are gone. A few resonate in some mysterious way and stay with you for years. All of them influence you. And some of them can teach you valuable lessons—if you pay attention to them.

How can you learn from personal stories?

Some personal stories have straightforward learning implications. For example, a relative’s harrowing tale of a ruined vacation due to last-minute illness may encourage us to take out travel insurance, or a friend’s clear description of diagnosing a car problem may illuminate what a timing belt is and does. And here are some more, often poignant examples of learning from stories.

But what about stories that teach us important lessons in subtler ways? Sometimes we hear stories that touch us, but we don’t know why. What can we learn when this happens?

If you are interested in exploring what you can learn from such stories, here are the three steps you must take. They may seem strange suggestions, but I vouch for their effectiveness if you are prepared to do the work.

Notice the important story

Unfortunately, there’s no universal metric that can tell us whether a particular story can teach us something that matters because every story is contextually unique and each of us has unique lessons to learn. So, if you hear so many stories, how do you know which ones are important?

There isn’t a rational way to notice important stories. Instead, you need to cultivate your emotional intelligence, or, if you prefer the term, your intuition.

Important stories affect you at an emotional level. You live in a world that pays lip service to the rational, but, unless you’re a sociopath, you have emotional responses to your life experiences. The trick to noticing that a story is important to you is to detect that you have responded emotionally in a surprising way. An important story evokes an emotional response, and if that response does not make sense to you, there is gold you can mine from it. Glenn’s Colorado story brought up an emotional response that I didn’t understand. Noticing was all I needed to proceed to the next step.

Capture the story

Perhaps it’s my age, but I find that if I don’t capture the essence of the story so I can recall the details, the tale I’ve heard disappears, like smoke, from my memory within a day, never to reappear. So I carry around 3 x 5 cards to jot down stories and ideas I have. (I’ve also started using Simplenote on my iPad for the same purpose.) When I heard Glenn’s story, I wrote “Do you have a handler?” on a card, which was enough for me to remember his story until I got home and added the phrase plus a few notes to a file I keep of potential topics for blog posts. Now the heart of his story was captured in a place where I would see it weekly whenever I was thinking about a blogging topic.

Tease out the meaning

Teasing out the meaning of an important story is a creative exercise. When I came across Glenn’s story in my blog post pile last week, I decided to spend some time musing about it. I’ve found that the two best ways for me to go into a creative place involve either:

  • Performing mindless physical activity, like stacking wood, going for a walk, washing dishes, or taking a shower.
  • Listening to loud music that I like.

while daydreaming about the topic in question.

Your methods for stimulating your creative juices are probably different. When you’re ready, find a time and place when you won’t be interrupted and apply them. Here are some tips for making the most of your creative exploration of the story:

  • Relax, don’t have any preconceptions about what might happen—watch and listen to whatever drifts through your mind.
  • Don’t censor thoughts and images that come up, just make note of them. I like to have a pen and paper available to record what comes up.
  • Concentrate on the non-rational; you can unleash your analytical powers once your daydreaming phase is over.
  • Don’t expect to unlock all the secrets of the important story in one session. You may want to return to it in a few days to see what’s jelled, what seems important, and what now feels superficial.

I’ve learned some important things about myself and my life by examining stories that have power for me. I hope the techniques I’ve described are useful for you too.

How do you make sense of important personal stories you’ve heard? Do you have examples you’d like to share?

Image attribution: Flickr user maxpower

Pecha Kucha, not Ashton Kutcher

Include Pecha Kucha, not Ashton Kutcher, at your next conference!Photograph of a Pecha Kucha audience enjoying a talk

Instead of going after celebrities to present at your next conference, highlight some stars amongst your attendees with a Pecha Kucha session.

Pecha Kucha is a dynamic presentation format that has spread globally since its invention in Japan in 2003. Think of it as a haiku for presentations. Twenty slides automatically advance, each shown for twenty seconds, while the presenter shares their passion for a topic. Because each presentation lasts just 6 minutes and 40 seconds, presenters are challenged to be concise, targeted, and creative—and you can pack eight attendee presentations into an hour-long conference session.

Oh, you have a question. You want to know how to pronounce Pecha Kucha? Don’t be embarrassed, everybody asks. Just watch this short YouTube video:


O.K., glad to have cleared that up. You can also incorporate Pecha Kucha into a social event at your conference by scheduling your presentations during an evening social, with food and drink available while the presentations go on. This is the format used at Pecha Kucha Nights, held in hundreds of cities all over the world four or more times a year.

Pecha Kucha set up

It’s pretty easy to set up a Pecha Kucha session. Before the conference, you’ll need to:

  • Explain the format to your attendees;
  • Promote the session;
  • Solicit presenters; and
  • Send them a presentation template.

Have them send their presentations to you before the session. On the day, you’ll need an appropriately sized location with presentation-friendly lighting, a wireless mike and sound system, a schedule, and a screen, projector, and laptop running PowerPoint or Keynote. Add an MC and a staffer for the laptop and you’re ready to go!

I’m a big fan of Pecha Kucha as a way for people to connect and learn in a fun, fast-paced environment. I’ve just signed a contract to run Brattleboro Pecha Kucha Night, and we’re working on holding a Pecha Kucha session at Event Camp Twin Cities this fall.

Want to learn more? Check out the hundreds of presentations available on the official Pecha Kucha website. (I especially like this one by Daniel Pink on Emotionally Intelligent Signage.) I also recommend you attend a nearby Pecha Kucha Night to experience the format firsthand. You’ll see how Pecha Kucha can liven up any conference.

Have you used or experienced a Pecha Kucha session? How did it work out for you and/or the attendees?

Acting

acting -vancouverfilmschool - 3673603570_a18452d485_o

Acting. One of the oddities that permeate the English language is the dual meanings of the verb “to act”:

  • to do something.
  • to pretend to do something.

When you act, which meaning fits?

Image attribution: Flick user vancouverfilmschool

Mission: Working for the earth

working for the earth. Famous "blue marble" earth image courtesy: NASA / Goddard Space Flight Center

Working for the earth. I came across this excerpt from an eloquent speech by Paul Hawken today, and want to share it:

We have tens of thousands of abandoned homes without people and tens of thousands of abandoned people without homes. We have failed bankers advising failed regulators on how to save failed assets. Think about this: we are the only species on this planet without full employment. Brilliant. We have an economy that tells us that it is cheaper to destroy earth in real time than to renew, restore, and sustain it. You can print money to bail out a bank but you can’t print life to bail out a planet. At present we are stealing the future, selling it in the present, and calling it gross domestic product. We can just as easily have an economy that is based on healing the future instead of stealing it. We can either create assets for the future or take the assets of the future. One is called restoration and the other exploitation. And whenever we exploit the earth we exploit people and cause untold suffering. Working for the earth is not a way to get rich, it is a way to be rich.

Paul Hawken, environmentalist and head of the Natural Capital Institute, from his commencement address to the University of Portland, May 3, 2009.

Image courtesy: NASA / Goddard Space Flight Center

A better tool for conference calls: Maestro Conference

I just got to experience an enjoyable tool for conference calls: Maestro Conference.

Visual Recording of NCDD Confab. Note Conferences That Work at upper left!
Visual Recording of NCDD Confab. Conferences That Work included at upper left!

Graphic created by Teresa Bidlake, of Concepts Captured

Taking part in a traditional conference call is rarely much fun. Here are some irritations that you’ve probably experienced:

  • Poor call quality. Some callers are faint and/or there’s noise on the line. Any noise at any caller’s location, like someone yelling in the background or answering another call, is picked up and broadcast to everyone on the call.
  • There’s no way to know when someone is about to speak; awkwardness abounds as people start to talk simultaneously.
  • Only one person can speak at a time, and they have to address the whole group.
  • There’s no way to know who wants to speak, to ask or answer questions.

So my expectations were not high a couple of days ago, when I joined 77 people (!) on an “NCDD confab” on online engagement. NCDD is the nonprofit National Coalition for Dialogue & Deliberation, a network of over 1,200 members working on conflict resolution and public engagement practice.

What a contrast! Instead of the usual conference call hell you’d expect on a call with nearly 80 people, our two hours together were surprisingly enjoyable, in large part because we used Maestro, a conference call / online tool that combines traditional conference call features with the ability to create small group conversations amongst the participants on the same call.

Maestro Conference worked well

Here’s why using the Maestro Conference system worked so well for this large group:

  • The Maestro system allows the call organizers to easily create small breakout groups at any time during the call. During our call, we split into small groups of 3-5 people to introduce ourselves and discuss a given question. Chimes and messages informed us when were halfway through our allotted time, and when we had a minute left to go. When the small group discussion was finished, we were smoothly reunited with the entire group. In addition, organizers can join any small group and ask or answer questions at any time.
  • The Maestro system can selectively mute individual telephones, so we heard no distracting sounds from participants’ phones. When the event organizers were speaking, all phones except theirs were muted. If they asked someone to speak, just that phone would be un-muted. The resulting call quality was excellent. In addition, the system’s call quality was uniformly high throughout our two-hour call. I heard no pops, hissing, or other annoying noises.
  • Maestro includes a simple but effective backchannel method for call participants to signal conference organizers by pressing numbers on their phone keypad. (There’s no annoying sound heard when people do this.) You can use this to quickly poll participants, ask the organizers for help, opt in or out of a topic or choice, or indicate that the participant has something to say to the whole group. We used all these options during our call, including answering a four yes/no question poll of the entire group in a minute, queuing up individual participants to speak about their experiences, and opting in or out of having our emails available to other group members.

Other information

From the organizers’ perspective, Maestro Connect uses a web interface, which seems to offer an easy way to control these capabilities.

Pricing seems reasonable; and a free 30-day trial is available, as well as discounts for non-profit and solo practitioners. If you’re into such things, Maestro Conference has an affiliate program, (and I am not an affiliate).

During the call, I spoke to the entire group once, met and conversed with people in two small discussion groups, World Café style, and voted on questions. Sandy Heierbacher of NCDD and Amy Lenzo of World Café expertly facilitated the call, with a couple of assistants helping out as needed. The time flew by, very enjoyably.

In conclusion, this service, when appropriately used, can turn the normal broadcast-mode experience of a conference call into a much-more participatory and interactive time for callers. I don’t have experience in managing a Maestro Conference. But, as a participant, it seemed to be a straightforward process with no glitches. If you have a need for a superior kind of conference call, this service is well worth checking out.

Innovative participatory conference session: a case study using online tools

innovative participatory conference session: photograph of participants working on the edACCESS 2010 Web 2.0 case study

Interested in an innovative participatory conference session alternative to talk-at-the-audience formats? Then you’ll want to learn about a brilliant session format we used at the edACCESS 2010 Web 2.0 Collaborative Tools Workshop.

I’ve been running peer conferences for edACCESS, an association of information technology staff at small independent schools, since 1992. We just wrapped up our 19th annual conference, held this year at Williston Northampton School in Easthampton, Massachusetts. The four-day conference did not include a single traditional didactic session. We only scheduled two sessions in advance: a Demo Session in which attendees, scattered around the exhibit area, gave short presentations on cool technology and applications used at their school, and the case study described below. We crowdsourced all other topics and formats (33 in all!), using the Conferences That Work methodology, during the first few hours of the conference.

Before the conference

Joel Backon of Choate Rosemary School designed and facilitated the Web 2.0 Collaborative Tools Workshop session, with input from Bill Campbell and a dose of “inspiration from reading Adrian’s book“. Before the conference, Joel described some of his thoughts in an email to me:

“I will provide structure, but I don’t want to be too prescriptive or we won’t learn anything. For example, if there is disagreement about which tools will be best to use for the project, that is a message everybody should know about Web 2.0 tools. There are so many, it is difficult to obtain agreement regarding which to use, and that impacts the productivity of organizations. At this point, I’m looking for feedback because I am clearly taking a risk.”

I told Joel that I loved the idea of using a case study format for the session. I suggested he add a little more detail (about the IT operations at the school) to his case study. Here are the final case study materials that attendees received. We posted them on the conference wiki several days before the session took place. You may want to check out the link before reading further.

Setting the stage

As we listened in the school theater, Joel spent ten minutes introducing the case study materials. He gave us a list of tools, including a blog already set up on Cover It Live, projected on a large screen. Joel told us we had to collaboratively create a one-page report of recommendations on how to cut a (fictitious) $1,000,000 school information technology annual budget by 50%.

Oh, and we couldn’t talk to each other face-to-face! We could only communicate online.

Normally, a project of this type would take an experienced IT staff days to complete, requiring extensive discussion of every facet of the organization’s infrastructure, personnel, services, and budget.

Oh, and we had ninety minutes! In that time, we had to:

  • choose appropriate collaborative online tools;
  • divide up the work;
  • discuss options;
  • make decisions and recommendations;
  • and write the report.

Finally, Joel explained, after the exercise was complete, we’d have half an hour to debrief using good old-fashioned talking to one another, face-to-face.

My experience

Some participants had traveled thousands of miles to edACCESS 2010. Now here we were, sitting in a theater auditorium, silently working at our computers.

During the first twenty minutes of the session, I was highly skeptical that we would be able to accomplish anything meaningful. (In the debrief, it turned out that most people had had the same expectation.) To see what transpired you may want to check out the complete blog conversation transcript, which provides moment-by-moment documentation of our online conversation. Notice that tweets that included the conference hashtag, #edaccess10, were merged in real-time into the transcript.

At around 8:50 a.m., the group started to get organized. Communicating through the blog, people started to suggest online tools to work on specific projects. The tools mentioned were Google products: Wave, and Docs. Our sophisticated attendees knew that Google had upgraded Docs in April to support simultaneous editing by multiple (up to 50) users and they even knew that you had to choose the “new version” on the Editing Settings tab.

Up to this point, I had not been working on the project but was monitoring the blog conversation as a process observer. I asked to receive an invitation to the Google Wave, but a link never came. Eventually, I found out that only a few attendees had adopted the Wave.

Google Docs is adopted

But when I clicked on the link for a Google Docs spreadsheet that had been set up I was astounded. (Check it out!) Attendees had created a multitab spreadsheet with a summary page that showed the current savings in different budget areas that people were working on linked to separate detailed tabs for each area. I felt amazed at the work we had done. I immediately added a small contribution of my own—a column showing the percentage budget savings so we could tell when we’d reached our 50% goal. People used free cells to annotate their suggestions and decisions.

Bill Campbell, who was moderating the blog, used Cover It Live’s instant poll so we could discover the tools we were using. The poll showed that most of us were working on the spreadsheet.

Thirty minutes before the end of the exercise, I suggested someone set up a Google Doc for the report. (I didn’t know how to do this myself.) Within a few minutes someone created a report and people started writing. I added a starting introductory paragraph and corrected a few typos. It was truly remarkable to see the report evolve keystroke by keystroke in real time, being written by a ghostly crew of 30-40 people.

With fifteen minutes to go, it became clear we could reach the 50% reduction goal. The report would be ready on time! The release of tension led to an outbreak of silliness (starting around 10:00 a.m. in the blog transcript) to which I must confess I contributed.

Here is the Final Report.

Lessons learned

So what did we learn? Here are some of my thoughts. Feel free to add your own as a comment at the end of this post.

  • First of all, everyone was surprised by how successful our effort had been. I think all of us underestimated the advantages of working together online, where multiple channels of communication and collaboration can coexist simultaneously. This is so different from meeting face to face, where, in general, at any moment one person is monopolizing the conversation. I am pretty sure that if we had done the same exercise face to face, we would not have come up with such a high-quality solution!
  • I think the case study worked well because we trusted each other. The group members knew each other to varying degrees. We were prepared to accept individual judgments about self-selected areas where each of us chose to work. The exercise would not have gone well if we had been concerned about the abilities of some of the participants.
  • One interesting observation is that we were working collaboratively on publicly accessible documents. As a result, we don’t actually know how many people contributed to our work. (Or even if they were all at edACCESS 2010!) This made it very easy to add new workers. Anyone who had the link to a document could start editing it right away. A private workspace would have required some kind of registration process, which would have encumbered our ad hoc efforts.
  • One weakness in our approach is the lack of any formal checking mechanism for the report we generated. A few people went over the report during the last ten minutes and commented that it “looked good”. But if one of us had made a serious mistake there’s a good chance it would have been missed. This exercise was akin to what happens when a group of people responds to an emergency. Everyone does the best they can and is grateful for the contributions of others.
  • It surprised me that no obvious leaders emerged, although several people (including me) made group-directed suggestions that seemed to have been accepted and acted on.
  • A number of people commented early on that they couldn’t use their iPads effectively for the exercise. We needed multiple windows open to be able to work efficiently, and the Cover It Live transcript wouldn’t scroll in Safari on the iPad (though there appears to be a work-around).

Conclusion

It’s hard for me to think of a more innovative participatory conference session format. For two hours we were spellbound, working and playing hard on our laptops, and then excitedly discussing and debriefing. I wager that all the participants at the edACCESS 2010 Web 2.0 Collaborative Tools Workshop will remember this experience and their associated learning for a long time.

What other lessons can we learn from this experiment? Are there ways we could improve this participatory conference session?

Three things conference attendees really want to know about each other

A beautiful tall window with a curved top, framed with red curtains looks out past a verandah and a lawn to city buildings in the distance.

There are three things conference attendees really want to know about each other.

Connections with people are formed by our experience with them over time. (Yes, Buddhists and Taoists, the present moment is our only reality, but we still experience it through the filters of the history and desires in our brains.) Besides learning about people we’re with through our direct experience, we discover more by listening to their descriptions of their past and present experiences and their hopes for the future.

That’s why the first thing that happens at Conferences That Work is a roundtable, where each attendee answers the following three questions (there are no wrong answers!) to the group:

  • How did I get here? (past)
  • What do I want to have happen? (present & future)
  • What experience or expertise do I have that might be of interest to others? (past & future)

As people, one by one, share these three things to know, they share their past, present, and future with everyone in attendance. Each person opens a window for others to see the timeline of their life more clearly. This sharing provides the foundation for connections to deepen during the conference that follows.

Image attribution: Flickr user houseofsims

Participant-driven association meetings presentation slides and resources

Here are the slides and resources from my June 18 2010 presentation to the NE/SAE (New England Society of Association Executives) annual meeting held at the Colony Hotel, Kennebunkport, Maine:

Some Research about Face-to-Face Communication at Live Events.

Innovative Techniques in Conference Formats (slideshare).

NCDD’s Engagement Streams Framework helps people navigate the range of approaches that are available to them and make design choices that are appropriate for their circumstances and resources.

The Meeting of the Future.

On confidentiality: The Europe/Chatham House Rule.

Do You Allocate Enough Time for Interaction?

“Dear Valued AT&T Customer”

Dear Valued AT&T Customer: photograph of a weasel emerging from underneath a building

“Dear Valued AT&T Customer”. I received this email from “AT&T Chief Privacy Officer” <[email protected]>. It’s a good example of a weasel apology.

The letter

Dear Valued AT&T Customer,

Recently there was an issue that affected some of our customers with AT&T 3G service for iPad resulting in the release of their customer email addresses. I am writing to let you know that we didn’t expose any other information and have resolved the matter.  We apologize for the incident and any inconvenience it may have caused. Rest assured, you can continue to use your AT&T 3G service on your iPad with confidence.

Here’s some additional detail:

On June 7 we learned that unauthorized computer “hackers” maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service.  The self-described hackers wrote software code to randomly generate numbers that mimicked serial numbers of the AT&T SIM card for iPad – called the integrated circuit card identification (ICC-ID) – and repeatedly queried an AT&T web address.   When a number generated by the hackers matched an actual ICC-ID, the authentication page log-in screen was returned to the hackers with the email address associated with the ICC-ID already populated on the log-in screen.

The hackers deliberately went to great efforts with a random program to extract possible ICC-IDs and capture customer email addresses.  They then put together a list of these emails and distributed it for their own publicity.

As soon as we became aware of this situation, we took swift action to prevent any further unauthorized exposure of customer email addresses.  Within hours, AT&T disabled the mechanism that automatically populated the email address. Now, the authentication page log-in screen requires the user to enter both their email address and their password.

I want to assure you that the email address and ICC-ID were the only information that was accessible. Your password, account information, the contents of your email, and any other personal information were never at risk.  The hackers never had access to AT&T communications or data networks, or your iPad.  AT&T 3G service for other mobile devices was not affected.

While the attack was limited to email address and ICC-ID data, we encourage you to be alert to scams that could attempt to use this information to obtain other data or send you unwanted email. You can learn more about phishing by visiting the AT&T website.

AT&T takes your privacy seriously and does not tolerate unauthorized access to its customers’ information or company websites.   We will cooperate with law enforcement in any investigation of unauthorized system access and to prosecute violators to the fullest extent of the law.

AT&T acted quickly to protect your information – and we promise to keep working around the clock to keep your information safe.  Thank you very much for your understanding, and for being an AT&T customer.

Sincerely,

Dorothys_signature

Dorothy Attwood
Senior Vice President, Public Policy and Chief Privacy Officer for AT&T

Please do not reply to this email.

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.

Four comments

Has AT&T invented mind-reading software that can determine peoples’ intent?

The email asserts that the people who obtained the email addresses and ICC-ID  “maliciously exploited” AT&T’s failure to secure private information, “deliberately went to great efforts”, and “distributed it for their own publicity”. Smearing people by assigning them ulterior motives for which you have no evidence is an old propaganda trick. It helps to deflect attention from your own culpability.

“Culpability”

Speaking of culpability, AT&T apologizes “for the incident and any inconvenience it may have caused ” but not for their negligence in setting up a system that allowed public access to private information in the first place. Come on now, AT&T, you can do better than that. How about: “AT&T apologizes for the lapse in our security that allowed this information to be obtained”? That’s what a proper apology looks like.

What are the consequences?

AT&T provides no explanation as to the consequences of publicizing my ICC-ID. I don’t care about my exposed email address, since anyone can easily find it on the internet. (Though I imagine that some people are not pleased that AT&T exposed their email address.) But I have no idea what the ramifications are of exposing my ICC-ID to all and sundry. What should I look out for? Telling me to “be alert to scams that could attempt to use this information to obtain other data” is useless pap.

Breaking trust

We should judge people and organizations by what they do, not what they say. Those who say things at odds with actual actions, break trust. I don’t expect perfection, but the fact that AT&T avoids admitting that they screwed up makes me skeptical that “AT&T takes your privacy seriously.” Or that I can “Rest assured, you can continue to use your AT&T 3G service on your iPad with confidence.” Well, AT&T, I’m not assured.

Frankly, receiving this email reduced my trust and opinion of AT&T. It would have been better for them if they had never sent it.

#fail.