Not everyone wakes up to the soothing sounds of an adaptive alarm clock. One that increases in volume or increases the light in the room as the alarm goes off. Not everyone uses clock radios some people still prefer the traditional alarms. Finally, there are people who just get up. Perhaps they have a blog to write or they to reflect on the day that is coming.
The same is true of technology. Frankly not everyone uses technology. Technology exists around us in two distinct forms, the tacit form of broadcast such as television and the more active form such as the gathering for specific information (email, web) from a device. The passive form of technology is this broadcast reality. The active form is the one we are seeking to build as a component of an IGKT. The goal is not to force people that only consume passive technology to modify their behavior and suddenly become an active technology user. The goal is to create a system that allows for consistent managed interactions with both types. Like the old adage, I like both types of music “Country and Western.”
Note: The use of active and passive is to denote the type of interaction with technology it is not a statement, or a value judgment on the interactions.
The value of information is also not the answer to this problem. All information has value, we may not understand the value of it today, but it has value. The more we capture the better things will be as we finally shed the last vestiges of the limits to the information age. Inclusion knowledge systems don’t have value judgments on sources, only on applicability to the problem we are trying to solve.
The next graphic lays out the concept of information acquisition. Where we have the concept at the top of get to done (I got what I needed). The paralleled is the children’s game go fish. When you draw and get what you wanted your turn continues. However, information doesn’t work like that. Sometimes you get close to done, but have to modify the information. Sometimes you get some of what you need. Sometimes you realize the source in question isn’t reliable so you have to weigh the risk/reward of using the source and finally you have the no help on the problem bucket.
In an inclusive IP system this scale also applies to people but we don’t use the unreliable designation for sources. We move that to unverified rather than unreliable. The concept is the same for either. Information provided by that source needs to be validated regardless.
We need to get the information into the system first before we start worrying about the validity of sources. The scale is more for driving towards getting to done. Ultimately an IGKT is a process improvement system. We are taking information hat previously wasn’t even in the system, adding it back into the system to improve the orientation. The OODA Loop system designed by John Boyd drives constant feedback loops to both modify orientation but also to improve decisions. Getting the right information into the system is critical.
So what do we do about people that don’t use technology today. The reality of this system going forward is that no matter what it will require technology to implement the system that provides the answers. It has to be easy to use, simple and it has to be easy to input date into.
OODA Loop dreamer