Get-it-Done Guy resources
Here are articles on Get-it-Done Guy resources
Today’s episode is about using delegation tracking to keep on top of your boss and co-workers who, sadly, need to be managed as if they were minions.
Prior episode on A Fail Proof Way to get co-workers to keep their promises.
Delegation tracking sheet download
This Get-it-Done Guy episode, How to Keep Track of Irregular Events, discusses several tools that can be used to manage events in the future, even if you don’t know when or where those events will take place. Here are the resources mentioned in the episode.
This Get-it-Done Guy episode is about how to do a learning post-mortem when you leave a job.
Download graph paper resources
These PDFs contain engineer graph paper you can use for your job event learning session. These were created using the free Incompetech graph paper generator.
Missi and Zach Might BANG! Podcast
Jonathan’s a serial entrepreneur, angel investor, and lifehacker born and raised in Silicon Valley. Since 2014, Jonathan has been one of the top-performing instructors on online learning platform Udemy, and has snowballed this success into the launch of his rapidly growing information products company, SuperHuman Enterprises, which produces such products as the top-rated Becoming SuperHuman Podcast; the bestselling “Become a SuperLearner” print, digital, and audiobooks; and numerous other online courses through it’s own online training portal, SuperLearner Academy. He is based in Tel Aviv, Israel.
Jonathan Levi, Supercharge Your Memory
Here are links to the products mentioned in the episode.
I chose all of these products because I use them and love them. Some of these links are affiliate links, and I would greatly appreciate it if you buy through those links.
|Link to SCOTTeVEST|
Big Skinny CURVE wallet
|Link to BigSkinny|
|Focus website blocker.||Click here|
|Blacklist iOS website blocker|
|iA Writer Multimarkdown distraction-free writing Mac OS X|
|iA Writer iOS version|
|YOINK smart drag-and-drop|
|Alfred launcher, searcher, remote control|
|Paste clipboard history|
|1Password iOS password manager|
|1Password Mac OS X password manager|
|Path Finder||Link to PathFinder|
|Better Touch Tool||Link to Better Touch Tool|
|BTT Remote iOS|
|Marked 2 markdown preview|
Creating redirects for hard-to-remember URLs is quite useful. You can use it to create URLs you can easily give to people outside your organization. “Just visit http://mycompany.com/meeting to schedule a meeting” is easier to tell people than giving them a long, complicated link to a meeting scheduling page. You can use public link-shortening services to create short links.
Public link-shortening services
- http://TinyUrl.com is the earliest, free link-shortening service.
- http://bit.ly is more recent and much better known.
Creating redirects on your own site
There are many ways to create your own redirects, depending on your level of comfort with technology and your specific website configuration.
Listen to the Get-it-Done Guy Episode
Buy Chris’s Book
You can find Chris’s book anywhere fine books are found. Of course, I’d be most grateful if you would use my affiliate link to help support my efforts.
It's OK to hear "NO" with Chris Voss
Today’s Get-It-Done Guy episode features Gregory Diehl, author of the new book Brand Identity Breakthrough. Gregory’s book is #1 bestseller in Public Relations on Amazon, and is available in Kindle, print, and audiobook formats. He joined me on the Get-it-Done Guy podcast to talk about how to create a distinct brand for yourself, and get ahead.
Buy Gregory’s Book
You can find Gregory’s book here!
IT's Better to be Different with Gregory Diehl
Responding to an offer of “Exposure”
As I outline in Get-it-Done Guy episode 404, being offered “exposure” as compensation is almost always a crass attempt to exploit you. Here’s the letter I sent back the last time someone offered me the opportunity to be exploited. It makes a simple counter-proposal in which you take the risk associated with you doing a bad job, you get paid fairly, and they take the risk if their exposure turns out to be worthless.
It also includes a little hook at the end to make it very clear that the only legitimate reason for rejecting the counter-proposal is if they realize that their exposure is worthless, in which case they’re just being an exploitative hack.