Strategy to Inbox Zero

Earlier in the week I had talked to a friend about my unmanageable email pile in my Inbox, about 78 pieces of email just sitting there, dwelling on the edge of my consciousness and weighing on me. Is there something there that I should take care of? Did I miss something important? So I started to chat and to do some research.

There are many strategies out there, and I adapted them for my own use, and so far it has worked out marvelously well. Here’s how I process my email:

  1. Create sorting folders. I created a host of new subfolders in my work email account which runs under a hosted version of Microsoft Exchange. Because folders sort alphabetically, I forced the sort using number indexes and dashes.
    1. 1-Email Management
      1. 1-Today
      2. 2-This Week
      3. 3-This Quarter
      4. 4-FYI
      5. 5-Toodledo
      6. 6-Done/Sort
    2. 2-Help Desk
    3. 3-To Evernote
    4. 4-Barracuda
    5. 5-Syslog Alerts
    6. 6-ATP
  2. Then I sort the Inbox into the “Email Management” folder structure. If something has to be done today, it goes to 1-Today, and so on and so forth. My first consideration is the due-date for the item in my Inbox. If the item is purely informational, it goes into the 4-FYI box.
  3. I have rules set up in my email application, which happens to be Apple Mail. If I get email from Toodledo, my favorite To-Do system, they are moved into that folder. Anything from my Spiceworks Ticket sytem ends up in the 2-Help Desk folder. The messages from my Barracuda backup appliance end up in the 4-Barracuda folder, all my incoming Kiwi Syslog alerts end up in 5-Syslog Alerts, and finally the Advanced Threat Protection from Hosted Exchange reports get filed in 6-ATP. Rules are a huge part of keeping your neck above water when it comes to emails. There are a lot of purely informational emails that have zero urgency and very low importance, you want to keep them to go through them, but they don’t need to clog up your Inbox. Rules can help you sweep a lot of these away automatically. Always flag your junk mail, review that occaisonally to drag it for any false-positives.
  4. If an item is a request for help from work, and it didn’t come in as a ticket originally, those need to be pushed into the ticketing system. Thankfully Spiceworks allows you to forward emails into the ticket system by sending forwarded mail to whatever mailbox you’ve configured for the Spiceworks system. There are a litany of hashtag controls you can place in the email body to configure how tickets are arranged. My Cisco CUCM system is configured to also kick voicemails to me as attached MP3 emails, if they are requests for help, they likewise end up being forwarded with some extra flavor text to stomp down on confusion.
  5. If an item isn’t help, is urgent, is rather important, and has a clear date and time I will forward the email to my Toodledo using the configured email address on that system. Toodledo has a flag system that works on the Subject line. My preferred method is to alert people to events, include Toodledo as a BCC addressee, and then add at the end of the Subject line this text fragment: @work :1 day #{duedate} where the field duedate is whatever the date is that is relevant. Send it, forget it, it’s in the Toodledo list.
  6. The next step is to cycle through folders in Email Management, starting with Today and then reviewing all the rest. The Today folder is the action items that can be done today, or are due today. After completion, simple things are thrown away, but anything more elaborate or anything that touches on CYA gets sorted into the 3-To Evernote Folder.
  7. Evernote is a bottomless notekeeping system that I also use, and I leverage Evernote as a destination for all my CYA emails, and each quarter the extracted Sent Items from my Exchange account. I don’t trust Microsoft at all, I’d rather keep things in Evernote. Microsoft has a 50GB quota, Evernote does not have a quota. At the end of each week, I have a “Sharpen The Saw” task in Toodledo that I run, and a part of that is running along the structure in the 3-To Evernote folder, which includes all the emails across the branches of the company I work for, and all the vendors I have relationships with. Every Quarter, I search for all the emails for the previous block of time, soon Q1-2019 will be over so I search for all Q1-2019 emails and also move them into Evernote.
    1. The Evernote move is accomplished in two steps. The first step is to extract all the attachments out of the emails in my Exchange account, I use Mac Automator for that purpose, and here’s how it’s configured:
      1. Get Selected Mail Messages – Get selected messages.
      2. Get Attachments from Mail Messages – Save attachments in: “Attachments”
    2. I then run the Automator workflow, and all the attachments are put in a folder on my Desktop called Attachments. I then bulk rename them with their folder, a date such as 20190301 (YYYYMMDD), and then select them all and drag them into the right notebook in Evernote.
    3. Then I highlight all the relevant emails in my Mail App that I intend to send to Evernote, and I have created a General Service in my Mac called “Send To Evernote” which is actually another Automator Workflow, called “Send To Evernote.workflow”, that has this content:
      1. Run AppleScript:
        1. on run {input, parameters}
           -- Slightly modified version of Efficient Computing's AppleScript: http://efficientcomputing.commons.gc.cuny.edu/2012/03/17/copy-email-message-in-mail-app-to-evernote-applescript/
           tell application "Mail"
            --get selected messages
            set theSelection to selection
            --loop through all selected messages
            repeat with theMessage in theSelection
             --get information from message
             set theMessageDate to the date received of theMessage
             set theMessageSender to sender of theMessage
             set theMessageSubject to the subject of the theMessage
             set theMessageContent to the content of theMessage
             set theMessageURL to "message://%3c" & theMessage's message id & "%3e"
             --make a short header
             set theHeader to the all headers of theMessage
             set theShortHeader to (paragraph 1 of theHeader & return & paragraph 2 of theHeader & return & paragraph 3 of theHeader & return & paragraph 4 of theHeader & return & return)
             --import message to Evernote
             tell application "Evernote"
              set theNewNote to (create note with text (theShortHeader & theMessageContent))
              set the title of theNewNote to theMessageSubject
              set the source URL of theNewNote to theMessageURL
              set the creation date of theNewNote to theMessageDate
             end tell
             -- move the email message to archive and make it bloody obvious
             set background color of theMessage to blue
             set acc to account of mailbox of theMessage
             move theMessage to mailbox "Archive" of acc
            end repeat
           end tell
           return input
          end run

           

      2. It takes some time, but it efficiently moves the text parts of the emails selected into Evernote, using my default Notebook, called IN BOX.
      3. I select everything in the Evernote notebook IN BOX and move it to where it has to go, the destination notebook within Evernote itself. The messages all end up in the Archive folder, so then after that I hunt them down and delete them out of Exchange. Then empty the trash out of Exchange.
  8. In the end, I have a very slim Exchange account, a well fleshed out Evernote data store where I can search for all my email CYA details that I might need later on, and it also works on the web and over mobile apps as well. It’s very handy.
  9. It only took me a little while, maybe an hour tops to sort my Inbox and get to Inbox Zero. Then the cycling through the subfolders helped give me a handle on both urgency and importance, and I have a far better sense that I am actually on-top of my emails.

 

Geek Excursions: BitMessage

Along with my curiosity surrounding Bitcoin, there is a similar technology that has been released for public use called BitMessage. This system is a really neat way to securely communicate in a secure method that involves absolutely no trust whatsoever. It’s a completely decentralized email infrastructure and has captured a lot of my spare attention. BitMessage works a lot like how Bitcoin does, you can create email addresses on the fly, they are a long sequence of random characters that your system can display because you have both a public key and a private key. In a lot of ways BitMessage deals with the biggest problem surrounding PGP/GPG, which is key management. Nobody really wants to manage keys or use the system because it’s extra work. Plus even with PGP/GPG, your identity is written on your keys for everyone to see.

Getting started with BitMessage is a snap. First you need to download the BitMessage client, and you can get that at bitmessage.org. There’s a Windows and Mac client available, you can start it and be instantly attached to the BitMessage network, ready to create new “BitMessage Addresses” and throw them away just as easily. So, for example, you could reach me by sending me a BitMessage to this address: BM-2cWAk99gBxdAQAKYQGC5Gbskon21GdT29X. When you send a message using BitMessage, its to this address and from an address that your client makes, so the conversation occurs securely and since every node has a copy of the data it’s impossible to tell who is getting what information. I think an even more secure method would be to cross BitMessage with a PGP/GPG key. The only problem with a key like that is that classically PGP/GPG keys require that you include your email address as a subkey so that you can be identified by a human-readable email address when looking for your public key or when someone else is looking for it, to verify a signature for example. The PGP/GPG system doesn’t require an email address, you can of course create a public and private keypair using PGP/GPG and make the email address up from whole cloth, and instead just let people know the key ID that you want them to use. So technically if Alice wanted to secretly communicate with me, we could give each other our public keys to start and then use BitMessage as the messaging mule. I don’t see how any eavesdropper could make sense out of any of that data flow. It’s unclear what the contents are, the PGP/GPG encryption keeps the contents of the message secure, and BitMessage itself seriously obfuscates if not outright eliminates being able to tell where the messages are ultimately going to or coming from.

I have to admit that BitMessage is very user friendly and very handy to have. My only issue with it is that I don’t know anyone who uses it, but perhaps this blog post will change that. If you are interested in this bleeding-edge crypto/privacy software, I encourage you to chat me up on BitMessage for serious matters or for fun.

WordPress Security

Bank vault doorI run a gaggle of WordPress blogs, both for personal reasons and for work reasons. My SupportPress site runs on WordPress.org and the host I’ve been using all along, iPage sent me an email informing me that they have detected a botnet-sourced cyberattack directed at the login pages of WordPress.org installations. They also informed all their customers that they have installed network limits on these attacks, but that even though the attacks have been greatly reduced, that it shouldn’t lead to a flagging of security vigilance.

No time like the present to get things installed on all my WordPress blogs. The first thing I can think of since all my passwords are 16 to 20 characters long, randomized, stored for me in 1Password, and stored in such a way that even I don’t know them – is to install a plugin called Limit Login Attempts to all the WordPress blogs I manage. This will prevent people from screwing up their login attempts and it will email me when they try. So far this blog is covered and I don’t really expect any problems here.

Thanks to social networking, especially Twitter and my good friend @wyrdsmyth, and my hosting provider iPage I have been protected all along. More security is usually a good thing and in this case, warranted with this extra plugin. Next stop are all the other blogs I manage.

photo by: walla2chick

Very Far Around Robin Hoods Barn

Oh the lengths you’ll go to include services such as Google+ that by design do not readily make themselves available for such things! First I had to find a way to link my Google+ profile to my Google Voice number, all to get a magic email address which I can only send using Google Mail so that the email will automatically end up on my Google+ profile. That part is done, then I went over to IFTTT.com and investigated how that might work. So I uncorked the WordPress channel and set it to watch this blog for new entries, when it sees one, it should collect all the details and then send those using my Gmail account to my Google+ magic email address. Now lets see if the damn thing works. 🙂

TL;DR: Now I have a way to publicize on Google+ from WordPress automatically.

 

WordPress Jetpack and Post By Email

Several days ago, when I had all that trouble working with Jetpack for my WordPress.org blog I couldn’t get stats to work. I sent a support ticket to the developer of Jetpack and it turned out that it was a problem with my web host, iPage. Once they fixed the problem on their side, the stats worked again. There was another problem, one that hasn’t worked for a very long time and I gave up hope almost. There is a feature of Jetpack called “Post By Email” and this feature should work, but never has. I once again opened a support ticket with the developer of Jetpack and told them what was wrong.

Late last night I got an email from a WordPress.org Forum [Post](http://wordpress.org/support/topic/jetpack-post-by-email?replies=13#post-3952121) that I’ve been commenting on stating that the issue is solved if you upgrade your installation of PHP to 5.3 on your web host. So I logged into iPage, found the PHP settings, pushed them to 5.3 and then tried again. My test post worked like a charm!

So much so that I am sending this post via email. It should arrive in moments and then I’ll publish it. Hooray! I love a fix. What a great way to start the day!

Cloze

Discovered a neat new site and I sent invites out to everyone who I thought initially might find it useful. The site is called Cloze and it combines email and social networking in one view. There are free apps for iPhone and iPad as well. So if you got some email from me and you weren’t expecting it, now you know who it was from. I had to use my work email because many of the addressees on the mail were work contacts and they wouldn’t know who I am if I used my gmail account.

Marco Polo plays Ping Pong

There is always something. I recently had the irritated displeasure of attempting to raise a communications channel to a certain group of adults and found the process to be highly educational. Recently Apple had instituted a series of advanced security questions that get paired to an Apple ID when you make a purchase in the month of April. These questions ranged from “Where did your parents first meet?” to “What was the first concert you attended?”, those sorts of questions.

At work, I have an Apple ID that I use to manage our iOS devices here and there and one of the people I tried to contact had to be the one that set the security questions, as I had gotten an email stating that someone set the security questions on the account on April 14th. So I figured someone was just absent-minded, we all have that from time to time, so I texted everyone to please get back to me if they had answered any Apple security questions.

I did get just a handful out of 23 people reply to me in one fashion or another. I then shifted the request over to email and also sent another request “If you have answered any security questions, please let me know what they are.” and for about a week of waiting, just the handful out of 23 deigned to reply to me.

Right after that I started a request with iTunes support at Apple to petition them to wipe away the erroneous security questions on the account and they were busy working on that. Last night they sent me an email telling me that the security questions were reset and that I could login and re-answer them, which I did late last night. So the technical angle of this issue is now a solved non-issue.

But what does bother me, and it’s more vexatious then a real concern is how people replied, or didn’t to my inquiry. I had made the erroneous assumption that when I send out a text twice, and an email asking for information that there is a built-in component to that message which people should reply either way. It was for work, it was important, I used the word “please”. The response I received back after bringing this up was “I didn’t know what it was about so I didn’t reply.” and it was my fault I suppose for assuming that people would, by themselves, assume that a reply was expected. Out of 23 people, only five were not question marks, the rest were crickets. Nobody here but us crickets.

So in the future I vow that I will include “reply requested” to my communications. I hate to dumb it down so far as to treat them like children, but after this, I can’t help but think that’s going to be the only way I can establish a communications channel with these people. I have great fear for when I have to establish a technical communications channel with people, these specifically, but even people in general when there is an emergency. There is this sense of “deer in the headlights” that is deeply upsetting to me. If you get a message that you don’t understand – which is the better path? To actually communicate about it in hopes of resolving it or just sit in the dark, ignoring it, hoping it goes away?

It’s a lot like Marco Polo playing Ping Pong with himself. It’s not a game, it’s just a sad old man standing in front of a ping-pong table with a stiff little white ping pong ball bouncing on the table.

Facepalm
Facepalm

It's silly, and you should stop doing it.

Email confidentiality footers annoy me. I see them frequently on many emails that I get and I think of them as meaningless text that really should be ignored. That an email is somehow a private exchange of information is laughable. Email is sent in plaintext using an open protocol and on the wire it’s all unencrypted.

What really brings this to the forefront is when I see these meaningless bits of mental flotsam and jetsam clogging up my email box because someone set a vacation autoresponse and their membership on a email list is causing them to constantly reply with a “I’ll be out from…” email with this stupid block of text at the bottom asserting that the email is the property of blah blah blah.

Writing email has the same security protections as writing a postcard and tying it to a bird and letting it fly off. Your assertion that your communications are somehow proprietary or classified is utterly hilarious.

If people really wanted to make this not so utterly irrelevant, they should use public-key encryption or at least something like ROT–13 encryption so that the text isn’t readily apparent and takes some work to decode. Sending plaintext with this silly block at the bottom just musses up the display and doesn’t mean anything to anybody. So stop it.

Can you hear me now?

It all comes down to trusting the infrastructure. When you can’t trust the infrastructure anymore then it feels as though you are standing in an hourglass and the sand is running out beneath your feet.

This is how I felt after embarrassing myself towards a vendor by the name of eSpatial. I was asked by a coworker to investigate this vendor for geolocating alumni at work. I started their 14 day free trial and uploaded some data, nothing I thought that was too onerous, 250,000 US Postal Addresses. After some back and forth I learned that the trial account only can accept 10,000 addresses, but nowhere was that stated in the trial offer, that there was a limit. On January 12th I sent a link to an eSpatial rep so that they could create a demo account for me and show me what their company could do.

I waited until January 20th and then I wrote an email. I told them that I didn’t like being left in the dark for eight days when it should take them at most an afternoon to load my data and show me what their software could do. Then I got back an email telling me that they tried to email me and tried to call me to no avail. This is when I discovered that the infrastructure at work really isn’t working out for me. Apparently the messages just didn’t arrive. I checked all throughout “Webmail Plus” to no avail and I even checked the “PureMessage” spam system and the messages weren’t in there either. It’s as if the email wasn’t even delivered. Then the fellow from eSpatial told me that he tried to call me and the call never got through. I suspect that my setting my work phone to failover to my cell phone may be to blame on that one. I would put money behind the notion that international incoming calls will not be forwarded by the switches at Western to another line, instead they will simply be dropped. I have my phone set up that way because I absolutely detest voicemail and so I want incoming calls that are inbound to WMU to ring there first and then move on and ring my iPhone. There is a solution for that bit as well, and it involves turning my back on my work phone as well.

So how do I correct this? I can’t trust my work email any longer – I’m losing messages and making a fool of myself. I can’t live with doubt that the infrastructure works, and get anything done, so I have to compensate. The best way to compensate is to leave WMU behind when it comes to this infrastructure. My work phone number is now meaningless. My work email account is now meaningless. So everyone should strike those from their records and use a different number from now on, because I cannot trust that the infrastructure provided by my employer works properly.

I have to turn to Google at this point to provide the infrastructure that I need to do my work properly. Ironic if anyone has known me over the past few years that I’m turning to Google for infrastructure, after all, it was my crazy-eyed ranting that implored my workplace to use Google for their infrastructure but fell on deaf ears. So I’ll do it myself. The accounts and phone numbers will still be technically valid and reachable, but I’d rather people not use them. Instead, please use these instead:

Phone: 269-216-4597

Email: andymchugh75@gmail.com

If you have my personal gmail account, feel free to use that, as I trust gmail.com with my email, but no others.

I hate doubt and I will not accept it in my life.

Inbox Zero

Ever since my institution migrated to Web Mail Plus (I like to call it wimp for short) I’ve made it a workplace priority to never have anything stored on it that I can’t store someplace else. From the beginning, with our institutional migration to this new system I’ve been critical of it. I have no faith in either the dependability or privacy of the new system. The old system I did have a measure of faith in because my email was stored on my server in my machine room, not 10 feet from where I sit now. Now my professional email lives in Ann Arbor Michigan, in a place I have never seen and managed by people I have never met. There is a batch of paperwork that has been signed which should give me a sense of security, but again, it was one batch of strangers signing documents with another batch of strangers and a very nebulous promise that nothing upsetting would occur from this transition. As it is, I have developed a series of reflexes based on my zero-trust model that I use with strangers, especially institutional strangers. My livelihood is far too valuable to trust to the likes of my coworkers and peers. It’s nothing against them, but it’s a mix of wariness and “If you want it done right, do it yourself” mentality that so far has kept me happy and things working well in my life.

These reflexes regularly lead me to a state of geek nirvana, something called Inbox Zero. It’s a state where your inbox is totally clean, utterly empty. Nothing is malingering, loitering, and filling your mind with a fog of worry that if there are items there, you are somehow missing something or you haven’t completed something. Mostly it’s the sense that if there is something in there, I haven’t attended to it properly and that sits on my mind. It’s a kind of annoying background noise that lowers my happiness and sense of order, a fog of doubt. While this fog of doubt doesn’t really upset me or negatively impact my life, it contributes to my general sense of irritation and it’s one of those little passengers that contribute to stress breakdowns and spiraling vortexes of rage that I sometimes get trapped in. By eliminating this fog from my environment, it’s one less little niggling thing to wear me down.

My professional email gets only a few broad categories of information sent to it, that I have to attend to:

  • DBA Tasks – Highly structured task requests that usually include attached data. These almost always have a due date and a list of people to report to when the task is complete.
  • Help Desk/Office – More nebulous, mostly people asking for things or issuing trouble-tickets over email. In our office there is no single way to issue a trouble-ticket, people can walk up and verbally deliver one, they can email it in, leave voicemail, or try to ambush us as we walk through the office doing other tasks.
  • Organizational Chatter – Even more nebulous and needless are the myriad messages regarding the activities of the Trustees, Campus News, and little reminders sent out for events and/or meetings. I don’t claim they are worthless, but they are a kind of ‘hair that clogs the pipes’.
  • Vendor Spam – Generalized and unfocused bullshit from vendors we have or have had relationships with. Mostly this stuff is meaningless dreck related to things we will never need or find useful or even care about. These usually include anything sent from Dell, or HP, or the “Who’s Who” people.
  • Miscellaneous Bullshit – Very regularly I get meaningless messages from utter strangers with no content or worthless content. These are akin to email mosquitoes. They serve no real purpose, but there isn’t a reliable way to force them all into extinction. The best you can do is just swat them when they arrive.

So my strategies for handling these messages are as so:

  • If a message is worthy and important and has some sense of a due-date I forward it to my Toodledo account, which creates a task of the email with the body of the message as the meat of the task and the subject as the task title. This pushes the tasks that should originally go to toodledo in that direction. One of the side-effects of our transition was a massive retardation when it came to workflow. Our old system was great and nobody understood how to use it. The new system just doesn’t have the wits and the fact that nobody gets it is rendered meaningless from its absence.
  • If a message contains some hard nugget that I want to always retain I copy the relevant bits into an Evernote Note.
  • Everything else is bullshit. I have trained my Mac Mail.app using its Bayesian filters to separate utter bullshit from possible bullshit, so I just dump whatever mail puts in Junk right out and then toss the rest out after giving it a cursory glance.
  • If there is an item that isn’t task based, but does have a date – such as a meeting or some sort of event, I hover my mouse over the date parts and my Mail.app detects this and offers me a choice to create a new iCal Calendar Entry for that event. Talk about handy.

At the end of the day at best, or the end of the week at worst I should always be able to return to Inbox Zero. There is no reason to store items in the wimp, everything else can be sorted either into Evernote or Toodledo or the files taken out and placed in Dropbox with appropriate Finder comments attached. That all being said, I do store some things in my wimp account, mostly things that I probably should keep for documentations sake, especially if a coworker is going to wear their ass for a hat sometime in the future, it’s good to be at least a little prepared for those sorts of things. I principally store promises and protestations that something won’t ever happen again in my wimp account, and when they screw up, at least it’s handy there. Wimp glories in a 10GB quota. I use only a human-hairs worth of that quota and I have no desire to ever really make use of wimp beyond that. It’s a necessary evil, a funnel, not a bucket. I’m sure organizationally that bucks the conventions, as they wish it to be both a funnel and a bucket, but I have more faith in other buckets than what is in wimp itself.