The book helps us ponder over ways to aid the process of thinking creatively. Some of these tools are Deep Observing, …show more content…
One may observe through any of their senses. If one smells something bad, it is an observation. If one feels pain while touching thorns, it is an observation. People usually make the mistake of considering only visual knowledge as observations. For instance, although the terms 'looking', 'seeing' and 'observing' may be thought to be the same, there is a huge difference in their meanings. When comparing 'looking' to 'seeing', we can easily say that 'seeing' requires a bit more concentration between the two. But 'observing' is at a whole different level. To observe the details for anything, looking closely or even patiently may at times not be sufficient. An amazing example mentioned in the book is that of a medical professor who wanted to show his students the importance of observing the minute details. The professor took a urine sample in front his students, where he dipped a finger in it to taste it. Post this he urged his students to follow the same and taste the sample. The students had no choice but to follow in disgust. Once everyone had licked their fingers and agreed that the sample was sweet, he went ahead and mentioned to them that had they paid close attention to the details, they would have seen him dip one of his fingers and lick another/different …show more content…
I recently started working at a company and just finished my training. This past week I spent my entire time shadowing and observing my seniors and supervisor. By close observation, we learnt a lot of the work that is our team’s responsibility. Once we were done shadowing our seniors, we were then given demo projects and were asked to try our hand at the procedure and play with the demo program so as to get through the process of detecting malware in the programs, analyzing the code and transforming the code to function in the correct manner. During the detection phase, we were given the program’s code and were asked to scan through it and look for any known forms/patterns of malicious code. Once the programs were nicely cleaned, we were then asked to write a report for the program so as to let clients know in a few words what the issue was and how it was solved. Even here we used one of the tools from the book. Data Abstraction was carried out so that not every minute detail was put in the report. The client only needed to know in short and without much technical jargon about the problem that was at hand and how we had solved