Digital nomad survival tips you can use anywhere
Living in Europe, the Middle East and Africa taught me that the conventional wisdom about mobility is all wrong
Computerworld - I'm a digital nomad. You're a digital nomad. According to my own definition, anyone who is able to work in various environments because of digital and mobile technology (home, office, Starbucks, plastic lounge chair by the pool while on vacation) is a digital nomad.
However, for the last year and a half I have lived truly nomadically. My wife and I put all our possessions into storage (except for two backpacks and two large dufflebags) and now live internationally, choosing countries to stay based on, well, whim more than anything else, and working from wherever we go.
During that time I've lived in Europe, the Middle East and Africa. I've been robbed, stranded, and, worst of all, disconnected from Internet connectivity and reliable electricity.
While living this lifestyle, I've learned a lot about being a digital nomad -- mostly the hard way -- and gained insights useful for anyone who can work with mobile technology or who travels abroad for any length of time.
So I thought I would share my hard-won knowledge with you. Let's start with the basics.
How to choose and use a backpack
The most important feature of a backpack is security. But the best way to achieve backpack security is different than nearly everyone imagines.
There's a whole sub-industry of backpack security that treats the problem as one of fortification. A company called Pacsafe is the leading brand in this space. Wire mesh backpack linings or covers are designed to prevent crooks from cutting into your bag. Zipper locks and hidden pockets prevent easy theft.
The marketing around these bags suggests that you're going to leave your backpack behind in some hotel room or hostel and you'll want to lock it down to prevent theft.
The belief that locking a backpack to, say, a pipe or desk and fortifying it will prevent theft is false. A determined thief will cut through the cables, rip out the pipe or figure out some other way to steal your stuff.
The best protection is social engineering and also following some basic guidelines. It starts with the backpack selection.
There are high-quality backpacks on the market, fortified or not fortified. If you have a conspicuously high-quality backpack, you'll make yourself a target for theft. For example, the SOOT Electropack project looks promising. And I've been tempted by the Pelican ProGear S130 Sport Elite Laptop Backpack. These are great products if you never leave the safety and comfort of safe and wealthy places.
But carry these packs into most countries and you might as well tape a sign to it in the local language that says: "Very expensive gear inside: Please steal me!" And a determined thief will do so.
The most important security feature in a backpack is to be boring. Buy a black backpack without fancy features or designer logos. The plainer the better.
The second most important security feature is that it hold everything of value and still be comfortable to wear.
Gear up in such a way as to never have to leave your valuable electronics behind. Make sure everything fits into one backpack. (In my case, I carry a MacBook Pro, iPad, iPhone (my Android phone lives in my pocket), Google Glass, chargers, cables, extra credit cards and more. The total value of what I carry in my backpack is about $5,000.)
Then never, ever leave it behind. Always have your backpack with you.
When you're in a coffee shop, don't place the backpack on a chair or on the floor next to you. Put it on the floor between your legs and under the table.
Finally, whenever you're in a situation where anyone can be close to you and behind you, put the backpack on backwards so it's in the front, to prevent razor-blade access. The most likely way thieves will steal stuff is to divert your attention. If something happens that's attention-grabbing, always move the backpack to the front and keep your head on a swivel.
How to keep your laptop from being stolen
After surviving many trips abroad, working often in coffee shops, I laugh whenever I hear someone at Starbucks saying to a stranger: "Will you watch my stuff while I go to the bathroom?" This provides you with exactly zero protection against theft.
Here's the global best practice for stealing a laptop from an American innocent abroad: Grab it and run.
The commonly used defenses against this crime are all perfectly wrong. Sitting there won't deter them. They'll steal it even while you're actually typing. If you can out-run a teenager familiar with the surrounding streets (Good luck with that), he will drop it before you catch him, destroying the laptop. If you chain it to the table, he'll drop it and smash it trying to get away. If you chase after the guy with the laptop, his partner will casually walk off with your backpack.
To protect your laptop, follow my three-second rule: Make sure a crook can't run from your laptop to the door in less than three seconds. Find a place to work that's tucked way back in the corner with lots of tables and chairs between you and the door. And make sure a thief can't approach your laptop without you seeing them. It's more important that you keep an eye on who's approaching your table than your stuff.
Second, if you need to leave the table for any reason, but want to maintain your claim to it, leave easily replaceable personal items on the table and take your laptop and other valuables with you, even into the bathroom.
Third, don't appear to have an expensive laptop. That Apple logo screams "black market retail value!," so buy a cover that makes it look like a cheap laptop, or something other than a laptop.
- API Playbook: Drive API Adoption Through Developer Engagement Learn the best practices of how to engage developers, whether your goal is to attract external developers to your public APIs or improve...
- Leverage the Power of APIs to Turbocharge Your Mobile Strategy: 7 Steps to a Successful API Program In this guide, Intel® Services-which offers industry-leading API management solutions for over 150 top enterprises, including Best Buy, Netflix, Expedia, ESPN, and The...
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- IDG Research Survey: Are you Paying Too Much for Your NMS? Feel like you're paying too much for network monitoring? You're not alone. This survey brief summarizes findings from research recently fielded by IDG...
- API Management: The Key to Improving the Consumer Travel Experience Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow...
- Tips to Simplify Database Administration and Development Make your job easier while getting the most from the leading productivity tool for database professionals. Learn tips from Dell Software's Oracle® ACE,... All Personal Technology White Papers | Webcasts