This document discusses the imperfect nature of methods and the need to balance mechanistic methods with organic adaptations and intuitions. It argues that in a complex world, no single method can capture all realities and that rigid application of methods often leads to stress and inefficiency. The document explores various disciplines that theorize imperfections and limitations in rational systems, such as bounded rationality. It advocates for "imperfect enough" methods that allow for individual and collective intuition.
This document discusses the concept of imperfect methods and the limits of logical and mathematical systems in decision making. It argues that in a complex world, purely rational and mechanistic methods are insufficient and that room must be left for individual intuition and organic adaptations. While methods are indispensable, overly rigid application of methods can lead to stress and inefficiency. The document explores various disciplines that theorize imperfection and bounded rationality, such as systems theory, game theory, and fuzzy logic. It advocates for balancing mechanistic approaches with organic approaches in organizations.
This document discusses supply chain management and key concepts related to SCM. It provides examples of how Dell optimized its supply chain to reduce inventory levels. The document also summarizes the basics of SCM including the key links in the supply chain and how information technology can help manage SCM more effectively through increased visibility, responsiveness to consumer demands, and competitive advantages.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
This document discusses the concept of imperfect methods and the limits of logical and mathematical systems in decision making. It argues that in a complex world, purely rational and mechanistic methods are insufficient and that room must be left for individual intuition and organic adaptations. While methods are indispensable, overly rigid application of methods can lead to stress and inefficiency. The document explores various disciplines that theorize imperfection and bounded rationality, such as systems theory, game theory, and fuzzy logic. It advocates for balancing mechanistic approaches with organic approaches in organizations.
This document discusses supply chain management and key concepts related to SCM. It provides examples of how Dell optimized its supply chain to reduce inventory levels. The document also summarizes the basics of SCM including the key links in the supply chain and how information technology can help manage SCM more effectively through increased visibility, responsiveness to consumer demands, and competitive advantages.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
This document discusses the concepts of serendipity, emergence, and complexity. It explores how serendipity is more than just chance encounters, and involves an ability to creatively connect events and see opportunities that others may miss. True serendipity requires being open, attentive, and listening for unexpected discoveries and insights. The document suggests we are all capable of serendipity, but many are not given the freedom or trust to allow new ideas and patterns to emerge in a self-organizing way. Letting go of control and listening authentically to others may help unlock more serendipitous breakthroughs.
The document discusses Howard Gardner's theory of multiple intelligences, which identifies seven distinct types of intelligence: linguistic, logical-mathematical, visual-spatial, musical, bodily-kinesthetic, interpersonal, and intrapersonal. It also discusses teaching styles based on visual, auditory, and kinesthetic learning modalities and provides examples of activities teachers can plan using each modality. The document emphasizes that teaching well requires more than just imparting information - it involves understanding students' varied intelligences and learning styles.
The document discusses creating a culture of trust and openness in organizations to foster creativity and innovation. It argues that most organizational cultures today still operate with mental models from the industrial age and fail to adapt to the ideas economy. Creating a culture with high emotional intelligence where people feel psychologically safe to share ideas and have constructive dialogue is key to unleashing an organization's full potential. Such cultures exhibit characteristics like transparency, loyalty, and a focus on learning from mistakes rather than judgment.
This document discusses design thinking for software developers. It begins by classifying different types of systems, including natural vs artificial and deterministic vs complex systems. It then discusses two perspectives on design and introduces "wicked problems," which are difficult to solve due to incomplete or changing requirements. The document states that the only way to solve wicked problems is through an iterative process of exploring, experimenting, evaluating, and iterating (EEEI). It provides examples of essential concepts, principles, practices, and methods for evaluation that can guide the design thinking process when addressing wicked problems.
The document discusses leadership in a knowledge economy. It notes that the future will be different and the main skill will be unlearning old patterns from the industrial age. Culture plays a key role in how organizations view things and whether they are open to new possibilities. Creating a culture of emotional intelligence, dialogue, and flow states can help organizations be more creative and adaptive.
of the PDC+++ in Integral Permaculture
see www.PermaCultureScience.com
What is the Integral Model & how does it work? Why is it so significant for this time in history?
In this class we study the integral model in depth & ask why it could be one of the most important maps for directing us in the creation of more sustainable human societies.
Integral theory is an all-inclusive framework that draws on the key insights of the world’s greatest knowledge traditions.
The awareness gained from drawing on all truths and perspectives allows the Integral thinker to bring new depth, clarity and compassion to every level of human endeavor — from unlocking individual potential to finding new approaches to global-scale problems.
The theory of multiple intelligences proposes that intelligence is composed of distinct abilities rather than a single general ability. Howard Gardner identified eight types of intelligence: linguistic, logical-mathematical, spatial, bodily-kinesthetic, musical, interpersonal, intrapersonal, and naturalist. Teachers should recognize students' diverse intelligences and structure lessons to engage multiple intelligences. This contrasts with traditional education's emphasis on linguistic and logical abilities and better addresses varied student needs.
By thinking about systems thinking, our aim was to provide other system thinkers with a mind map for the key elements of the thinking that took place.
The sepsis problem is highly complex and spans not just the biological system, but also the healthcare enterprise. Sepsis is the context in which systems thinking has been applied and examined.
Sepsis is an emergency situation that if left unrecognised and untreated in its early stage leads to multiple organ dysfunction and death.This case study highlights the attitudes; comments on the system approach, and puts forward the cognitive concepts.
All these concepts are integrated in an overall mind map looking like a tree: the branches of the tree represent the systems thinker's attitudes; the roots of the tree represent features of systems that are commonly considered when systems’ thinking.
This document discusses the need for new paradigms and strategic thinking to address major problems. It argues that minds and markets influence each other, and new paradigms emerge from scientific breakthroughs, not arguments. The author advocates taking a first principles approach to problems rather than just addressing symptoms. Design thinking is presented as a method to understand problems, generate ideas, and test solutions through collaboration and prototyping to identify potential paradigm shifts and catalysts for change. Education is key to developing more original thinkers who can hasten paradigm shifts.
The document discusses practice-based research, which aims to advance knowledge through both practice and theory. Practice-based research results in an artifact, like a game, that embodies knowledge which can only fully be understood by examining the artifact. The document then discusses various methodological approaches that can inform practice-based research, including Aristotelian concepts of episteme, techne, and phronesis. It also discusses interpretive inquiry, hermeneutics, and iterative design processes.
The document discusses the Kipling-Zachman lens, which is based on six questions from a poem by Rudyard Kipling ("What and Why and When And How and Where and Who"). These six questions form the columns of the Zachman framework for enterprise architecture. The document explores extending the traditional interpretations of these questions to provide additional perspectives. It suggests using multiple lenses or triangulating different viewpoints to gain a more comprehensive understanding. The goal is to use frameworks like this as tools to explore real problems, while also understanding each lens' potential for value or distortion depending on how it is applied.
Cognitive psychology is the study of mental processes such as attention, memory, perception, problem solving and thinking. It developed as a field in response to behaviorism, which could not adequately explain complex human behaviors and abilities like language use. Cognitive psychologists study topics like how people learn and remember information, perceive different shapes, and acquire language. Understanding cognition can help fields like education, medicine, AI and interface design. The human mind is complex and cognition involves acquiring, storing, retrieving and processing knowledge.
This document discusses different types of problems including problematic problems, complex contradictions, muddy messes, dilemmas, and paradoxes. It notes that problems are often perceived incorrectly due to biases, assumptions, and limited perspectives. Different approaches are needed to address different problem types, such as applying rational problem solving for clear problems, negotiation for contradictions, and exploring dilemmas interactively with stakeholders. True problems cannot be ignored, while non-problems or perceived problems may not require solutions.
of the PDC+++ in Integral Permaculture
see www.PermaCultureScience.com
What are 'Models' & why are they so important for Permaculture Designers? In this class we study the basic nature of the Scientific Method & it's problems, taking as an example of our difficulties in changing paradigms a rEvolutionary model of the human mind.
This document provides an overview of a course on mathematics in the modern world. The 3-unit course aims to help students appreciate mathematics beyond formulas by exploring its practical, intellectual and aesthetic dimensions. It covers topics like data management, geometric designs, coding, finance and more. Students will discuss the nature of mathematics and use reasoning to analyze concepts. The goal is for students to see how math is used in everyday life and affirm its honest applications. The course introduces mathematics as a way to explore natural patterns and uses logic and reasoning. Later lessons survey how math is used as a tool in various modern contexts like personal finance and social choices.
Article 2The Physics and Mathematics of BusinessBy Edward G. .docxdavezstarr61655
Article 2
The Physics and Mathematics of Business
By: Edward G. Engh (2013)
Assistant Professor, Salt Lake Community College
Physics is a science. Mathematics is a science. What about Business or Engineering? Are they sciences too? Academics make a distinction. Physics and Math are sciences, but business and engineering are applications of science: they use the laws discovered elsewhere for their own reasons. Sometimes there is a danger in using an application without remembering the source. Without keeping the source of an idea in one's mind it is easy to make false associations. Every law of nature or theory of science comes with consequences; and these are not always taught. Too often the student is left completely on their own to connect a formula with a consequence. This sometimes causes us to misapply things. For example, shown below is the formula for kinetic energy:
ke = ½[m(v2)]
Where: ke = kinetic energy, m = mass, and v = velocity
This formula above is a species of formula (in the mathematical sense) using algebra, like the formula financiers use for compound interest: shown below.
v = P (1 + r/n)nt
Where: v = value, P= the principle (or beginning amount or initial investment), r = rate of interest, n = periods of times compounding occurs per period of time, t = number of years invested)
Kinetic energy is real, it exists in the Universe, it can be measured, quantified, maximized, minimized, etc. Does this also mean that financial abstractions are real? Yes, but not in the same sense. Value exists in the mind, whereas energy (like entropy) exist in the Universe. This may seem like a subtle distinction: it is like comparing love to gravity, one exists in the mind, the other everywhere. Nevertheless it is very common to find people who treat the 'laws' of Finance (banking and mortgages) as if they were laws of nature! They are not! If one treats compound interest as if it were founded on physics there is great risk. If a nation makes important decisions on this kind of assumption, no one should be surprised if the results are not what was hoped for: collapsed economies, bankrupt companies, laid-off workers, defunct households. As with Politics and political science, Economics is scientific, but it is not a science, even if it uses the tools of calculus. It will remain a non-science until it adopts a fundamental theorem founded on empirical evidence, using the scientific method of hypothesis testing, in order to become a predictive tool.[1] Every discipline suffers from this disconnection of consequence.
Kinetic energy is real, but Capital is purely in man's head, it is not equivalent to kinetic energy. Too often this is painfully made clear when the books are opened in court, revealing that the capital (or wealth) was purely imaginary! Hind-site is always perfect 20/20 vision. Why do not we see these things in advance? How many times must we see many investors accept a purely abstract accounting of their capital?.
This document discusses different definitions and approaches to artificial intelligence (AI). It begins by defining AI as helping machines solve complex problems like humans by applying human-like algorithms. It then discusses AI's links to other fields and its history. The rest of the document explores definitions of AI and different goals or approaches in AI research, including systems that think or act like humans and systems that think or act rationally. It focuses on the Turing Test approach of acting humanly and the cognitive modeling approach of thinking humanly by modeling human cognition.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
This document discusses the concepts of serendipity, emergence, and complexity. It explores how serendipity is more than just chance encounters, and involves an ability to creatively connect events and see opportunities that others may miss. True serendipity requires being open, attentive, and listening for unexpected discoveries and insights. The document suggests we are all capable of serendipity, but many are not given the freedom or trust to allow new ideas and patterns to emerge in a self-organizing way. Letting go of control and listening authentically to others may help unlock more serendipitous breakthroughs.
The document discusses Howard Gardner's theory of multiple intelligences, which identifies seven distinct types of intelligence: linguistic, logical-mathematical, visual-spatial, musical, bodily-kinesthetic, interpersonal, and intrapersonal. It also discusses teaching styles based on visual, auditory, and kinesthetic learning modalities and provides examples of activities teachers can plan using each modality. The document emphasizes that teaching well requires more than just imparting information - it involves understanding students' varied intelligences and learning styles.
The document discusses creating a culture of trust and openness in organizations to foster creativity and innovation. It argues that most organizational cultures today still operate with mental models from the industrial age and fail to adapt to the ideas economy. Creating a culture with high emotional intelligence where people feel psychologically safe to share ideas and have constructive dialogue is key to unleashing an organization's full potential. Such cultures exhibit characteristics like transparency, loyalty, and a focus on learning from mistakes rather than judgment.
This document discusses design thinking for software developers. It begins by classifying different types of systems, including natural vs artificial and deterministic vs complex systems. It then discusses two perspectives on design and introduces "wicked problems," which are difficult to solve due to incomplete or changing requirements. The document states that the only way to solve wicked problems is through an iterative process of exploring, experimenting, evaluating, and iterating (EEEI). It provides examples of essential concepts, principles, practices, and methods for evaluation that can guide the design thinking process when addressing wicked problems.
The document discusses leadership in a knowledge economy. It notes that the future will be different and the main skill will be unlearning old patterns from the industrial age. Culture plays a key role in how organizations view things and whether they are open to new possibilities. Creating a culture of emotional intelligence, dialogue, and flow states can help organizations be more creative and adaptive.
of the PDC+++ in Integral Permaculture
see www.PermaCultureScience.com
What is the Integral Model & how does it work? Why is it so significant for this time in history?
In this class we study the integral model in depth & ask why it could be one of the most important maps for directing us in the creation of more sustainable human societies.
Integral theory is an all-inclusive framework that draws on the key insights of the world’s greatest knowledge traditions.
The awareness gained from drawing on all truths and perspectives allows the Integral thinker to bring new depth, clarity and compassion to every level of human endeavor — from unlocking individual potential to finding new approaches to global-scale problems.
The theory of multiple intelligences proposes that intelligence is composed of distinct abilities rather than a single general ability. Howard Gardner identified eight types of intelligence: linguistic, logical-mathematical, spatial, bodily-kinesthetic, musical, interpersonal, intrapersonal, and naturalist. Teachers should recognize students' diverse intelligences and structure lessons to engage multiple intelligences. This contrasts with traditional education's emphasis on linguistic and logical abilities and better addresses varied student needs.
By thinking about systems thinking, our aim was to provide other system thinkers with a mind map for the key elements of the thinking that took place.
The sepsis problem is highly complex and spans not just the biological system, but also the healthcare enterprise. Sepsis is the context in which systems thinking has been applied and examined.
Sepsis is an emergency situation that if left unrecognised and untreated in its early stage leads to multiple organ dysfunction and death.This case study highlights the attitudes; comments on the system approach, and puts forward the cognitive concepts.
All these concepts are integrated in an overall mind map looking like a tree: the branches of the tree represent the systems thinker's attitudes; the roots of the tree represent features of systems that are commonly considered when systems’ thinking.
This document discusses the need for new paradigms and strategic thinking to address major problems. It argues that minds and markets influence each other, and new paradigms emerge from scientific breakthroughs, not arguments. The author advocates taking a first principles approach to problems rather than just addressing symptoms. Design thinking is presented as a method to understand problems, generate ideas, and test solutions through collaboration and prototyping to identify potential paradigm shifts and catalysts for change. Education is key to developing more original thinkers who can hasten paradigm shifts.
The document discusses practice-based research, which aims to advance knowledge through both practice and theory. Practice-based research results in an artifact, like a game, that embodies knowledge which can only fully be understood by examining the artifact. The document then discusses various methodological approaches that can inform practice-based research, including Aristotelian concepts of episteme, techne, and phronesis. It also discusses interpretive inquiry, hermeneutics, and iterative design processes.
The document discusses the Kipling-Zachman lens, which is based on six questions from a poem by Rudyard Kipling ("What and Why and When And How and Where and Who"). These six questions form the columns of the Zachman framework for enterprise architecture. The document explores extending the traditional interpretations of these questions to provide additional perspectives. It suggests using multiple lenses or triangulating different viewpoints to gain a more comprehensive understanding. The goal is to use frameworks like this as tools to explore real problems, while also understanding each lens' potential for value or distortion depending on how it is applied.
Cognitive psychology is the study of mental processes such as attention, memory, perception, problem solving and thinking. It developed as a field in response to behaviorism, which could not adequately explain complex human behaviors and abilities like language use. Cognitive psychologists study topics like how people learn and remember information, perceive different shapes, and acquire language. Understanding cognition can help fields like education, medicine, AI and interface design. The human mind is complex and cognition involves acquiring, storing, retrieving and processing knowledge.
This document discusses different types of problems including problematic problems, complex contradictions, muddy messes, dilemmas, and paradoxes. It notes that problems are often perceived incorrectly due to biases, assumptions, and limited perspectives. Different approaches are needed to address different problem types, such as applying rational problem solving for clear problems, negotiation for contradictions, and exploring dilemmas interactively with stakeholders. True problems cannot be ignored, while non-problems or perceived problems may not require solutions.
of the PDC+++ in Integral Permaculture
see www.PermaCultureScience.com
What are 'Models' & why are they so important for Permaculture Designers? In this class we study the basic nature of the Scientific Method & it's problems, taking as an example of our difficulties in changing paradigms a rEvolutionary model of the human mind.
This document provides an overview of a course on mathematics in the modern world. The 3-unit course aims to help students appreciate mathematics beyond formulas by exploring its practical, intellectual and aesthetic dimensions. It covers topics like data management, geometric designs, coding, finance and more. Students will discuss the nature of mathematics and use reasoning to analyze concepts. The goal is for students to see how math is used in everyday life and affirm its honest applications. The course introduces mathematics as a way to explore natural patterns and uses logic and reasoning. Later lessons survey how math is used as a tool in various modern contexts like personal finance and social choices.
Article 2The Physics and Mathematics of BusinessBy Edward G. .docxdavezstarr61655
Article 2
The Physics and Mathematics of Business
By: Edward G. Engh (2013)
Assistant Professor, Salt Lake Community College
Physics is a science. Mathematics is a science. What about Business or Engineering? Are they sciences too? Academics make a distinction. Physics and Math are sciences, but business and engineering are applications of science: they use the laws discovered elsewhere for their own reasons. Sometimes there is a danger in using an application without remembering the source. Without keeping the source of an idea in one's mind it is easy to make false associations. Every law of nature or theory of science comes with consequences; and these are not always taught. Too often the student is left completely on their own to connect a formula with a consequence. This sometimes causes us to misapply things. For example, shown below is the formula for kinetic energy:
ke = ½[m(v2)]
Where: ke = kinetic energy, m = mass, and v = velocity
This formula above is a species of formula (in the mathematical sense) using algebra, like the formula financiers use for compound interest: shown below.
v = P (1 + r/n)nt
Where: v = value, P= the principle (or beginning amount or initial investment), r = rate of interest, n = periods of times compounding occurs per period of time, t = number of years invested)
Kinetic energy is real, it exists in the Universe, it can be measured, quantified, maximized, minimized, etc. Does this also mean that financial abstractions are real? Yes, but not in the same sense. Value exists in the mind, whereas energy (like entropy) exist in the Universe. This may seem like a subtle distinction: it is like comparing love to gravity, one exists in the mind, the other everywhere. Nevertheless it is very common to find people who treat the 'laws' of Finance (banking and mortgages) as if they were laws of nature! They are not! If one treats compound interest as if it were founded on physics there is great risk. If a nation makes important decisions on this kind of assumption, no one should be surprised if the results are not what was hoped for: collapsed economies, bankrupt companies, laid-off workers, defunct households. As with Politics and political science, Economics is scientific, but it is not a science, even if it uses the tools of calculus. It will remain a non-science until it adopts a fundamental theorem founded on empirical evidence, using the scientific method of hypothesis testing, in order to become a predictive tool.[1] Every discipline suffers from this disconnection of consequence.
Kinetic energy is real, but Capital is purely in man's head, it is not equivalent to kinetic energy. Too often this is painfully made clear when the books are opened in court, revealing that the capital (or wealth) was purely imaginary! Hind-site is always perfect 20/20 vision. Why do not we see these things in advance? How many times must we see many investors accept a purely abstract accounting of their capital?.
This document discusses different definitions and approaches to artificial intelligence (AI). It begins by defining AI as helping machines solve complex problems like humans by applying human-like algorithms. It then discusses AI's links to other fields and its history. The rest of the document explores definitions of AI and different goals or approaches in AI research, including systems that think or act like humans and systems that think or act rationally. It focuses on the Turing Test approach of acting humanly and the cognitive modeling approach of thinking humanly by modeling human cognition.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Imperfect methods
1. 1
Imperfect methods
It is increasingly difficult, for the decisions in our professional and personal lives, to decide whether we should trust
blindly the methods learned or if it is better to rely on our intuitions, sometimes transgressive. In a complex and
changing world, list of "duties" is long, you may feel guilty not to do everything well enough.
We will here legitimize a right to imperfection, suggest a new set of methodologies, imperfect enough to leave room
for individual and collective intuition, advocating the right balance points between statutes often mechanistic and
organic innovations and adaptations, and perhaps approach … a discourse on method.
Discourse on methods
Whether to choose our strategies and make plans, to deploy, whether to implement lean management, improving
quality, measuring up to 6 σ, listening customers and markets, manage our processes, succeed our projects, better
manage, analyze the world, there is no shortage of methods!
Methods took power, probably as a result of the splendid Descartes' metaphor in the Discourse on Method:
"….travelers who, when they have lost their way in a forest, ought not to wander from side to side, far less remain in
one place, but proceed constantly towards the same side in as straight a line as possible, without changing
their direction for slight reasons, … …this way, if they do not exactly reach the point they desire, they will come at
least in the end to some place that will probably be preferable to the middle of a forest."
So we all learned: who math, who technology, who philosophy, but also theses, antitheses, syntheses, and how to
use the instruments of our car or our IPad. The manuals are ubiquitous in the hard sciences or the humanities, and
even in very personal life, tool boxes are everywhere1
.
1
See in this context Dunod specific publishing series, very useful, with, by volume, description of sixty tools for each
profession, from facilitator to marketing specialist, from manager to consultant ...
2. 2
And despite all this set of models, methodologies, laws, rules, sometimes very elaborated, we are still often lost in the
forest!
The use of methods, totally indispensable, is often subverted by their hardliner application. These are hyper detailed
and unusable dashboards, process maps pushed up to the description of detailed procedures, ... One consequence
is that the actors live under constant stress, completely paradoxical, do well and respect the rules, and ... wisely
break those rules.
Unconscious being structured as it may, I remembered belatedly, starting this article elaboration, that many of these
themes had already been treated, sometimes superb way, by a "passer" I greatly admired it several years ago,
Abraham Moles2
, passionate of "imprecise science"3
.
2
http ://fr.wikipedia.org/wiki/Abraham_Moles, see eg The Sciences of Vague, Seuil, 1990.
3
Certainly the vague is not the imperfect. We can use "perfect" tools (data mining, ...) to identify the vague. But we
will see, these tools cannot understand complexity and imprecision if we don't add to them tools of judgment,
appreciation, by nature imperfect!
3. 3
This publication, imperfect ;-) of course, is based on deep personal convictions acquired in professional and
managerial practices:
- Any methodology inherently carries the trace of a quest for perfection. And often, unfortunately we do not know
when to stop, when to put the method in perspective, stop "terrorist" implementation induced, with its harmful
consequences: technocracies, stress involved, and inefficiency. It is easy to cite cases.
- This issue obviously goes well beyond the context of professional life; this theme is by nature multidisciplinary. We
will so wander a lot "elsewhere"…
- There is a set of "perfect" imperfect methods, giving in many cases "good enough" results for action. When using
more scientific methods, a fundamental rule is to decide, in each case, how hard to push the method and where allow
adaptive level of freedom, where to put the cursor.
Aesthetic and imperfection
Most of us love the feeling of perfection.
Snowboarder or skier who feels the perfect curve, ideal balance between the elements, in its beauty and fragility,
craftsman or artist who succeeds the gesture, coming from elsewhere, where intuition joined the real, lovers who
sublimate these rare, magical and perfect moments, mathematician who is just on the way of his aesthetic
demonstration, actor or top speaker suddenly illuminating his audience, author just writing his great sentence,
musician, jazz musician who poses a perfect note (or perfect silence), manager who set up miraculously, within the
complexity of the world, a delicate balance of decision ...
4. 4
But everyone knows too well the limits of these perfections, their instantaneous and illusory appearance. How to
sustain it for oneself, for the others, for the world? The set of methods and techniques that we invent are maybe there
to try to communicate the recipe of this perfection to all?
Children's education, learning, training often aim to try to bring others with tips, tools, the "Swiss Army knife" blades
can be useful for them to live, to improve the world, to perfect it.
In counterpoint, we all of course have the personal perception of our finitude, our imperfections...
And everyone feels deeply ideological hazards involved by a total sustainability of some "perfect" methods.
Management theories have the same goal, inventing representations (frameworks), methodologies, to try to help
make companies less imperfect.
Logical-mathematical mind has - sometimes unfairly - a privileged role in all areas. Ubiquitous in theoretical sciences
(fundamental physics), in practical sciences, it is considered as one of the royal access way to the real. Teaching
privileged it, to be "no math" is often regarded as a total defect. Implacable logic structures our brains, global finance
and its dysfunctions are based on imaginative algorithms...
Aesthetics is the heart of mathematics. Bertrand Russell gave his sense of mathematical beauty in these words:
« Mathematics, rightly viewed, possesses not only truth, but supreme beauty—a beauty cold and austere, like that of
sculpture, without appeal to any part of our weaker nature, without the gorgeous trappings of painting or music, yet
sublimely pure, and capable of a stern perfection such as only the greatest art can show. The true spirit of delight, the
exaltation, the sense of being more than Man, which is the touchstone of the highest excellence, is to be found in
mathematics as surely as poetry. »
Mathematical logic is in most cases the initial training of IT professionals. They structure the world with their artifacts,
their iPad and software that affect our lives, our processes and businesses, with, of course, the heritage of
mathematical research "perfection", of the endless pursuit of "good algorithm" ... The techniques can be seen as a
willingness to perpetuate perfection, to generalize. The advances of science and technology can sometimes be
interpreted as that.4
.
4
In these rational disciplines, there are (thankfully) often several paths. To demonstrate a proposition, we can
mentally use a heavy instrumentation of our knowledge, sometimes at length. But one can also think outside the box,
finding paths in related disciplines, drawing on our ability to "view" spatial concepts and their interrelationships, and
obtaining a brilliant short demonstration, elegant...
5. 5
By analogy, each of us are sometimes prisoner of hellish logics, notices, documentation, procedures ("explicit"
knowledge) and try (and succeed) to find our simplified personal "instructions" , our good "short-circuit "inside these
mechanisms, to make it a part of our daily behavior and reflexes ("tacit" knowledge).
A.Moles described fairly well all these daily micro-choices5
, optimal way go to work this morning, with timing and
traffic jams complexity, and with my impulsive desires. There is often a "bet" part in these choices, random decisions,
similar to the hero of this 70's cult book, "the dice man".6
Imperfection theorized?
Is there any theoretical basis supporting the notion of imperfection, of the limits of logical-mathematical systems?
Many disciplines have addressed this theme. Without being exhaustive, we will recall some contributions to this area.
Herbert Simon formalized the concept of bounded rationality7
. Every actor, individual or group, has an inherently
bounded rationality in terms of cognitive ability and information available. Therefore, actor will often stop at the first
choice it considers satisfactory. System theory incorporates these concepts, the analyst or modeler is "in the loop",
absolutely not neutral, and its rationality is inherently limited. Any modeling technique is so obviously an imperfect
method.
If we now look at organizations from a strategic, "war game" perspective, Crozier8
school describes quite well the role
of hidden information in strategic games. Power is often related to the fact to know much about the issues hidden
from others, without revealing his own. Any actor knows, even unconsciously, that the less he reveals, the more he
5
A. Moles, Micropsychologie et vie quotidienne, Paris, Denoël, 1976.
6
Luke Rhinehart, L'homme-dé, (published in 1971), Editions de l'Olivier, 1998.
7
Claude Parthenay, Herbert Simon : rationalité limitée, théorie des organisations et sciences de l'artificiel, Document
de Travail CEPN (Paris XIII et Université de Cergy-Pontoise).
8
Michel Crozier, L'Acteur et le système (collaboration with Erhard Friedberg), Paris, Seuil, 1977.
6. 6
increases his level of freedom. One will therefore mask the others the reality of his own issues, with strategic use of
game theory 9
, where optimization is often using imperfect rules.
What distinguishes for Popper10
a scientific approach from an ideological approach is the "falsifiability", the fact that
one can always be able to imagine an event, something that would indicate that theory is wrong. Thus a method that
cannot imagine an instance where it is totally questionable becomes ideological, it is not scientific!
Cognitive science approach the role of "tacit" knowledge (see above) in relation to "explicit" knowledge (coded
information stored in books and on the web, etc..). Methods that can be used to detect, store, communicate, treat
tacit knowledge are just now emerging, and are by nature imperfect.
The truth is not unequivocal. The traditional mathematical logic is sometimes less effective than logic integrating
"maybe", "why not". The fuzzy set theory of L. A. Zadeh11
belongs to this category, also with computers neuronal
logic, with i.e. neural cores circuits...12
Many innovations require "trigger thoughts", timely introduction of a grain of sand that will change the logic. Imperfect
methods mentioned in this article are intended to allow, with simple tools, the emergence of these new logics,
possible changes of paradigms (Kuhn13
), and encourage rapid construction of some possible future prototypes.
9
Gaël Giraud, La théorie des jeux, Flammarion, 2009.
10
Karl Popper, La connaissance objective, Éditions Aubier, 1991.
11
http ://www-bisc.cs.berkeley.edu/Zadeh-1965.pdf
12
Many consultants speak today about Big Data, super machines and logics (IBM Watson,...), capable, in the
information explosion, of chewing the billions of billions of data in order to aid the decision, structuring knowledge.
The decision-maker, lost in the amount of data, would only have that as an alternative of being advised by these
logics. But everyone knows that the real interesting things are in the "weak signals", those who are not in the center
of statistics, which are in the "long tail" of the facts. Can computers integrate these new approaches?
13
T. S. Kuhn, La Structure des révolutions scientifiques, Flammarion, 1983
7. 7
"Modeling" objects and phenomenon of the world, and related techniques are often coming from a logical a priori
thinking. Systems analysis14
is a bit apart, pursuing these objectives of representation of reality, while trying to
integrate real complexity. But as Korzybski15
said sharply, "the map is not the territory", modeling is not reality, it is
just a reality reflect. Modeler is "in the loop"16
, not neutral to the outcome! In a fuzzy, imprecise world, are models,
representations illusory? Do they only try to create temporary zones of apparent stability, illusions of possible areas
of mastership on the real?
Many players refer, with reason, to this ideology in their speeches, their consulting or modeling proposals. For sure
systemic approach is for them an approach to problems, but there is a great lack, in most cases, of methodological
"Swiss Army knife", always in the pocket, with real systems methods ready to use!
14
In France General System Theory has been well developed, with IS systemist like Melese, general methods Merise
type, but also advances in objects modelization and semantic aspects (ontology creation). I have long been a
"groupie" and proselyte of system theory. Conferences of J.-L. Le Moigne
http ://www.mcxapc.org/inserts/ouvrages/0609tsgtm.pdf converted me in the 70's, I was an avid reader and buyer of
six successive books of Edgar Morin's "The Method" (Seuil, 1977-2004), I was in one of my jobs at IBM a proselyte
of Axial, method of systemic systems modeling (similar to Merise), admiring the Macroscope (The Macroscope on
Principia Cybernetica Web, Harper & Row, 1979) by Joël de Rosnay, this old but still exciting synthesis. The "Palo
Alto school" stimulated me too, including systemic therapy techniques of Waslawick, I participate to Praxeme
http ://www.praxeme.org/, public method of system modeling for organizations, I continue to closely follow Morin, Le
Moigne and others in their advances http ://www.mcxapc.org/,…
15
Alfred Korzybski, Polish engineer, General Semantics inventor.
16
General System Theory basically says:
-There are general common, transdisciplinary laws, governing complex systems, whether the system is physical,
biological, ecological, economic, social, cognitive, natural, built or hybrid.
-These laws are cybernetic, linked to inside and outside network-related interactions.
-Certain rules apply to the entire system, they cannot be reduced to a component.
-The "goals" of the system are more important than its "causes" (teleonomy).
-Natural systems are not easily predictable and deterministic. The non-linear evolution laws of systems makes them
very sensitive to fluctuations and noise. We are in the world of "chaos theory" and butterfly's creative wing beating
can have structuring consequences.
-The modeler is "in the loop", not neutral to the outcome.
8. 8
Theorists of self-organization are at the heart of this debate on imperfect methods. The concept of self-organization is
associated with the notion of emergence, the principle of complexity by noise (Atlan17
). For Morin, it is "organizer
disorder". What makes an organization, what is its binder? How an organization can converge towards a goal, build a
shared "vision18
", common values, in a disordered, divergent structure?
In an entropic world, by nature, where the disorder may still outweigh the order, are we, speaking of imperfect
methods, promoting a new anarchy, neither God nor Master, no rules nor methods...? Obviously not, what matters is
the constant search for "good" equilibrium, always moving, between mechanisms and organisms, in all areas.
At the heart of business...
Everyone knows there is in our organizations an ongoing battle between mechanistic approaches and organic
approaches. Between the inventor with its teeming and innovative thinking and the methodological organizer, how
many fights! Between the commercial that promotes adaptation to customer wishes and defenders of financial rigor
and risk control, how many discussions!
Since Taylor, management based much of its "methods" on scientific (scientist?) approaches. This generates major
malfunctions, particularly in terms of human impacts. Certainly we are no longer in "Modern Times", however, there
are still critical issues in these areas, a lot of unhappiness at work. Unfortunately many actors are satisfied in these
cases to oppose the "human" incantation to technocratic approaches, to fight a battle, albeit entirely legitimate, but
too often only ideological, between psychosocial specialists and "technicians"…19
Transversality clearly requires the use of imperfect methods. François Dupuy20
illustrates the apparent safety mode
inside silos face to the uncertainty of work in the transverse mode, where everyone is facing the unknown of the
other. In a silo, using the methods consistent with the culture of the silo (the methods in a research department are
not the same as inside an administrative department ...). Relationship involves cross cultural adjustments, to be able
to find the intersection between our own culture and the culture of others, to create a prototype of a possible
operation in common21
. Believe in a method for reconciling everything (Quality, Lean, etc.) is a myth of consulting
business. Each of the silos will try to continue to use its own imperfect modes, compatible with its own paradigms, its
own culture, and this will inherently be often efficient enough!
The word quality e.g. carries unconscious connotations, the notion of seeking perfection, the type of quality of work of
the cabinetmaker. Certainly its definition22
is more pragmatic, and tries to adapt to the needs or desires of clients. But
very often these super-humanist connotations are present in the quality dynamics (zero defects, etc...). This is true
too in 6σ approaches, one of the goals of Lean is to completely remove non-value added activities, ... But the quality
strategies that work are those who manage to reconcile the often top-down analytical aspects and the use of local
adaptation (eg quality circles, bottom-up, etc..), to adapt, negotiate, cross-functionally innovate.
17
Henri Atlan, Entre le cristal et la fumée, Seuil, Paris, 1979.
18
Vision, to be shared, must be both sufficiently clear (to be understood) and enough not clear (to create
commitment), and should therefore balance perfection / imperfection ...
19
For sure technicalities and human are intimately linked, and feed and confront since the dawn of time ...
20
François Dupuy, Lost in management, La vie quotidienne des entreprises au XXIe
siècle, Seuil, 2011.
21
This topic is a life generality. Find the mode of operation with the other never leads to cultural fusion, to full sharing
of approaches. It is in "trial and error" mutual adjustment, methods adopted in common are by nature imperfect.
22
"A quality product or service is a product whose characteristics allow it to satisfy stated or implicit needs of
consumers." AFNOR
9. 9
A known condition for success is to successfully find the "right" balance between the application of global
methodologies and ... where and when to stop, handing over self-organization and its imperfect methods. Put the
cursor in the right place between what is the "perfect" mechanistic approach and "imperfect" organic strategy is
basically one of the key responsibilities of any leader or manager.
Chaos theory23
warns us too on the nonlinear aspects of complex problems. But, to survive, companies are often
obliged to try to over-simplify reality, to move towards lean, JIT, to make mechanistic simplifications in a by nature
organic system, using imperfect way a priori "perfect" methods.
Process management is of course primarily concerned. Depending on philosophy adopted by the pilots, one can
easily fall into the trap of technocratic end to end analytical approaches, detailed descriptions of procedures,
protocols, processes, operations, systems of generalized measurements, mechanistic (mechanization word is often
employed!) computerizations, associated with BPM tools. But companies are familiar with the limitations of these
"perfect" methods. We will describe below some imperfect methodological tools, and how structurally introduce
necessary imperfection in business processes approaches.
Small detour, personal life, daily life...
Life is full of incentives to perfection. Superego imposes its rules, terrorisms, , Id tries to introduce relevant
disturbances, Ego tries to structure himself. What teenager has not lived existentially revolts against rules, against
prescribed methods?
In times of passion (a word certainly inconsistent with the word method!), we try desperately, as Lacan said, "to offer
something one does not have to someone who does not want it", aphorism totally symbolic of what is... an imperfect
method!
Everyone can be blocked in infernal psychological systems, within loops without solutions. Palo Alto24
school, general
systems thinking, succeeds brief therapies, introducing the grain of sand that "breaks" some systems loop and
enable change.
23
For vulgarization see James Gleick, La Théorie du Chaos, Albin Michel, 1989.
24
P. Watzlawick, J. Weakland, R. Fisch, Changements : Paradoxes & psychothérapie, Seuil, 1975.
10. 10
Are we so far from our company subject, is working life so different?
We are members of many "social" networks, LinkedIn, Viadeo, Facebook, we tweet our news, our discoveries, our
thoughts, we have so many electronics friends! But nobody is fooled. We have the first circle of close friends, the
second circle of useful and / or stimulating relations, the third circle of other people that we know or who know you...
Again, everyone will intuitively invent personal tactics for managing its networks. Certainly, we are potentially related
to any other person in the world, through a chain of personal relationships with at most six25
links. But Dunbar's
number26
tells us that our neocortex limits us to 150 people at one time, in the context of a stable relationship!
By nature, our method of managing our relationship network is completely voluntary imperfect. Some reminders,
some teasing, but we are structurally unfaithful, unable to be really "present" for the network that we create. We can
use tips like forwarding information, send many bottles into the sea, believe that your blog will be read carefully ... but
our "real club", at a given time, will be inherently limited (it is a sense of the idea of "circles" attempted by Google +).
We are returning to the fundamentals, relationship of trust, common interests, exchanged services, with a deep
importance of "locality" (sometimes the opposite of "politics"!)
Latin countries are known for that, we are in the countries of "ordinary transgression", the first thought of many is to
escape the rules. Whatever the "method" used by governments to regulate, prevent fraud ... everyone is often in
search of "balance point" between the rules and risks taken to transgress.
It could be said that we are true inventors to make imperfect methods permanent!
Moreover, we paradoxically do not tolerate any imperfection in the functioning of our artifacts, our everyday objects.
We don't admit that our smartphone, our computer has a fault, it is mandatory that the washing machine runs,
programming objects must be perfect...
Programming, an imperfect method?
Programming is a quite particular art. 35 years ago, Joseph Weissenbaum27
, one of the gurus of artificial intelligence
and inventor of the famous Eliza program28
described dramatically and realistically29
obsessive programmer (already
25
http ://en.wikipedia.org/wiki/Six_degrees_of_separation
26
Robin Dunbar, Theory of Mind and the evolution of language, Cambridge University Press.
11. 11
the "geek"!!). A computer analyst, a programmer has no limits. Just written, any program can be constantly improved,
modified, remodeled to infinity. "The computer programmer is a creator of universes for which he alone is the
lawgiver".
Unlike other disciplines, often limited by physics, where one can not quite make anything (eg in building construction),
the programmer never hears the "father's voice" whispering:"You lost". He plays dice with the universe; there is no
limit to his imagination, without penalty, pushing creativity always further.
However, a program without error is impossible to conceive. Gödel's theorem30
(quoted in numerous publications,
often unfair way!) demonstrates us that, within a given set of syntax (what programming is), there will always be at
least one undecidable proposal. Program therefore inherently contains bugs, defects, imperfections.31
.
Programming is promoting the myth of potential perfection, but it is structurally an imperfect method.
Micro-psychology of daily business life...
In everyday business life, we are naturally faced with multiple micro-choices, often implying complex hidden
rationality.
An example is emails treatment in professional life. Everybody, faced with 200 or 400 emails / day in some large
organizations, with a mixture of important messages (meeting tonight is postponed), informational messages (I was
at a meeting yesterday where I got this interesting presentation), "umbrella" messages (I forward you this mail), etc..,
must adopt a strong tactical and personal selection/reading/suppression tactic32
.
Some executives promote elimination of emails, but a world of "real time" is surely no better! Without defending the
mail, I think dangerous this tendency towards a more "real time" world, with only instant communication, twitter like.
Fortunately everyone still have the choice to activate the answering machine on his telephone, to allow arbitration
between requests. Everyone still has the choice to stock, for later treatment (or not), the messages it receives,
selectively exercise its discretion, its freedom and rights of "no answer."
Email processing is totally symbolic of the actors' relationship with the time: too many things to do, to absorb,
individual systems of priority, impasses chosen, ongoing latent guilt...
We know that the man has a limited capacity (short term memory) to absorb the information (Miller's famous number
seven33
, we cannot absorb more than seven information chunks34
every 6 seconds, average one information per
second!!). Immersed inside informational explosion, everybody finds his own imperfect tactics to prioritize, choose
what it takes and what it leaves, manage his information "queues". That is often one of the main obstacles to
responsiveness of the organization.
Web natives tend to prefer direct contact. "If you do not answer now, you do not exist!". This leads them to favor, in
their inner circle, people who are generally in real time with them to chat, share on Facebook, with people they know
that their tweets will reach them quickly, etc... This philosophy of intrusion has its own protocols. If you do not
respond "real time", you are no longer in the inner circle! We can like that generate "enemies", often without knowing
it, we choose our camps.
27
http ://fr.wikipedia.org/wiki/Joseph_Weizenbaum, Computer Power and Human Reason : From Judgment To
Calculation, San Francisco : W. H. Freeman, 1976.
28
http ://www.eliza.levillage.org/
29
http ://www.sacbusiness.org/cs/hesterj/HACKER.htm
30
Douglas Hofstadter, 1980. Gödel, Escher, Bach. Vintage.
31
This generates all those Windows updates, these hackers community seeking hidden defaults, the importance of
computer security, …
32
Faced with this kind of formal system, where we cannot, through the mails, use a nonverbal influence, we attempts
to civilize the system with small codes, smileys, … trying to add some "soft" in these "hard" relationship systems.
33
http ://cogprints.org/730/1/miller.html 1956
34
See G. A. Miller, How big is a chunk ?, The Psychology of Communication, Basic Books, 1966.
and Bruno Lussato, Le Dossier de la Micro-informatique, p. 69-72, EO, 1980.
12. 12
I find serious heap opprobrium on those kind of media (e-mail, voicemail, ...). They allow this great opportunity to
wait, think, do or don't. Everybody can so manage, as he want, his "queues", its emergencies, decide whether or not
to procrastinate, to defer action, ... Able at any moment to choose what we will do or not within communicational
explosive opulence, what a luxury!
There are many cases. We can look at the examples cited by A. Moles, eg daily choice of optimal path to go to work
by car in a congested city. A fundamental mode of knowledge acquisition mode is "trial and error". It is by definition a
"perfect" imperfect method.
Indeed, we are in the agile programming era, X-Programming, DSDM, RAD (rapid application development). Beyond
slogans, what is there in common between these methods? They are all based on the Boehm spiral35
, which is to
quickly build a working prototype in cooperative mode with the client, test, modify, thus possibly on the way tilt the
ultimate goal36
.
Successive prototypes can approach the ultimate goal more accurately than conventional development techniques
(cascading, V development).
We are there inside methods, certainly structured, but somehow working in "test / error / adjustment" mode, typical of
"perfect" imperfect methods.
Innovating, an imperfect method by nature?
We have already mentioned a little about how innovation can emerge from disorder, by paradigms changes, by
grains of sand, by some transgressions ... I would use now the analogy of a jazz musician, improvising within a
band37
.
35
http ://fr.wikipedia.org/wiki/Modèle_en_spirale ....
36
I remember one night in Miami, a city that I did not know yet and that night without map, searching for a possible
location for nightlife. One of the best methods (that is demonstrably ...) is to explore the city spiral way from the place
of departure, trying thereby to systematically detect these places, instead of taking some great linearly axes! Are we
there so far from modern computer programming techniques?
37
Leadership Jazz, Max DePree, Dell, 2009.
13. 13
In traditional jazz, there are some rhythmic and harmonic "rules". Of course you can follow the scores and play the
chords representing harmonies. But when it is individual instrumentalist "chorus" time, we are in a space that is at the
same time constrained (by harmony and rhythm rules) and free. You can (must) wander elsewhere, without losing
sight on the rules, balancing constraints and freedom, improvising. In some cases, you may even temporarily change
the rules, in a more complete transgression. There is certainly risk-taking, but sometimes it is the total invention, the
discovery of a new world38
.
Invention is surely not enough for innovation! You have "harden" the prototype, formalize, explore clients' needs and
desires, invent adequate business model, find partnerships, structure marketing plans, communicate, ...
Theory U of Otto Scharmer39
, which concerns mainly leadership, can be applied quite well to the act of invention,
describing conditions of its emergence. We have acquired knowledge. ". But then, we must remember, in an attitude
somewhat new age, to switch to "perception". With some luck, we can then arrive at the "blind spot" (bottom of the
U), the "presencing", where knowledge is present and perceived, but where there is already some anticipation of the
future. Then we have to test the prototype invented, then deploy it
Swiss Army knife blades, some examples of methods
What are these imperfect methods, easy to use, usable by everyone in this uncertain world? How to integrate
anticipation of the future in methodologies, allow creative innovation, without losing sight on necessary rationality,
taking into account the accumulation of our knowledge?
What are the more useful methods when you try to be at "presencing" point of U theory?
"U is a journey in five apparently simple steps: initiate, sense, be present, create, deploy, the purpose being to
integrate a greater awareness of situations and issues, develop new ways of emergence of better alternatives,
prototype the future, and renovate collaborative approaches and project management."
Otto Scharmer of MIT observed and interviewed the greatest leaders to capture the invisible mechanisms of their
actions, he calls that the "blind spots" of leadership.
We'll try to talk now about some tools, very useful to all the "blind spot".
38
All this is quite different from classical music, where the constraint set is heavier (which does not preclude other
modes of innovation for interpreters).
39
Theory U: Leading from the Future as it Emerges, Otto Scharmer, Pearson - 2011.
14. 14
Few banalities first:
Consultants are major users of various brainstorming technique. Among the most commonly used of these "paper
wall" methods, I quote Metaplan ® which allows the expression and consolidation of ideas with Post-it ®40
.
An imperfect method in this context is e.g. KJ method41
.
In a brainstorming session, the actors express ideas on the factual issue being addressed, as many posts as they
wish. After review, each group is trying, in silence, to regroup ideas by affinities on the board.
Once groupings stabilized, we try to give a name to the groups thus formed. This is the moment when you can force
a creative semantic abstraction, the naming of groups being a real team creativity technique, between rational
choices and anticipation.
All those techniques bringing out a new meaning, a new sense42
from the initial spontaneous expressions are quite
powerful.
The method of group voting share is also very powerful. Voting in group is really to co-decide, imperfect way, to
structure collective intuitions and bets.
To expose some "perfect" imperfect methods, we will now use the business case of a medium size insurance
company (3000 people), inspired by a real case.
All five methods described here are part of a deployment will cascade strategy (strategic alignment) ...
40
http ://www.metaplan.fr/downloads/Guide pratique les regles de la methode.pdf
41
Karakita Jiro, consult for that Robin et Crepin remarkable book
http ://www.eyrolles.com/Entreprise/Livre/resolution-de-problemes-9782708125834
42
http ://livre.fnac.com/a3436342/Sandrine-Zerbib-Donner-du-sens-a-son-management
15. 15
a) Strategy and Balanced Scorecard
For example, a steering committee (or group manager) want to structure its dashboard, the list of its strategic
objectives.
On the figure, example of dashboard (Balanced Scorecard) in this company
When there is agreement, by a collective vote, on the relative weight of these strategic objectives for the current year,
(which is not always easy), we strongly structure, without full rationality, operations within the organization.
In such circumstances, there will always be one of the actors asking for further rationalization, for an in-depth
investigation, a real analysis to go beyond limited rationality of the vote. But we notice statistically that, even if you do
that, it never challenges the anticipatory intuition of the group...
Imperfect method is good enough!
Let's see now other uses of the imperfect methods in this case:
b) Strategy deployment, strategic alignment
Hoshin Kanri is a technique that structures strategic alignment within an organization. It enables to apply the same
cascade approach to spread dashboards across the enterprise, creating alignment accepted by all, since everyone is
building loosely its strategy, consistent enough, of course, with higher levels.
Hoshin Kanri can be used on other objects. It creates "free" coherency between organization (mechanisms,
processes) and strategy, between projects and strategy, etc..
For example, suppose, within the same insurance company, we have listed the process and that there are questions
about the potential leverage effect of these processes on strategic success.
We can use an executive committee vote (0, no impact, 4, strong impact) on the basis of the question: "If this process
becomes miraculously world best for all points of view, what would be the immediate impact on strategic objectives?"
16. 16
We deduce immediately the relative "weight" of processes compared to others, just by adding its leverage effects
(weighted by the importance of related strategic objectives).
Again, from experience, management can often demand a more precise study of real earnings, real leverage. But
these studies are often complex, if not impossible to achieve, and for those who have tried, conclusions are fairly
close to initial intuitive vote. Imperfect method is good enough!
17. 17
c) Matrix organization
One of the most significant tools is a kind of ABC/ABM43
prototype.
Using a simple technique, process list in hand, go to the vertical silos and ask them, "How many times in a typical
year are people of your function involved in the processes 1, 2 ... , n?" (Filling by columns). This questionnaire can
easily help to visualize structures/processes matrix.
We can that way:
- Immediately visualize the matrix of the company (horizontal), the most cross-functional processes, indicated here
by an arrow( ),
– Calculate immediately, knowing the vertical costs, the human cost of the processes, a figure often unknown (by
multiplying the cost of people by the percentage of time),
– Imagine, on this "as is" pattern, some "to be" scenarios with new distribution of tasks and roles, build a prototype
and estimate gains and costs.
We also see clearly visualize populations involved in the reality in each process, which will simplify the process maps
work.
Again, this rapid survey, this prototype is often sufficient. Companies that push more technocratic investigation, to the
finest detail (although more detailed ABC has some advantages for finance control, its true scope ...), do not get
much more actionable information than with this imperfect approach.
d) Hidden correlations
A powerful technique of data mining to find hidden truths is the Principal Component Analysis (PCA), a factorial
analysis technique, a branch of statistics.
This is one of the "imprecise sciences" of Moles. All "marketer" knows like that how to use to determine the
population and segment its markets (see eg sociostyles B. Cathelat44
).
PCA can be used as soon as the data is available in tables (statistics tables, votes about contribution of lines to
columns, etc...), so in many cases.45
The results are generally on two axes, rows and columns criteria appear scattered, proximities and oppositions
appear clearly, analyst has to find a "meaning" for the axes.
If we apply this to the previous table (process/objectives relations), this gives the following result:
43
Activity-Based Cost Management Making It Work: A Manager's Guide to Implementing and Sustaining an Effective
ABC System, Gary Cokins, McGraw-Hill 1996.
44
Bernard Cathelat, Socio-styles: The New Lifestyles Classification System for Identifying and Targeting Consumers
and Markets, EO, 1993.
Styles de vie, Editions d'Organisation, Paris, 1985.
45
…take care, too "mechanistic" CPA use can lead to errors, we must learn a little on the technicalities ...
18. 18
We see attractions appearing:
Horizontally sell, study the market maintain client, are in growth strategy "club", opposed to sector management,
people management that are more in the people "club". Vertically, IT management, invoices recovery are in the
profit strategy "club" in opposition with damages refund, more in the customer satisfaction "club".
It is an imperfect discovery mechanism (coming from some votes), giving a name to axes (e.g. "medium term / short
term" to the horizontal axis, "spend / save" to the vertical axis) is a strong act, revealing organization and strategy
hidden mechanisms.
For PCA, you can use more or less expensive statistical software (SPSS, STATLAB ...), or simple tools, free Excel
add-on, as here 46
.
e) Systems, complexity
Among the most representative tools of imperfect methods, we must speak of a key instrument of any systems
analysis, MicMac (CNAM / Lipsor) product, popularized by Michel Godet47
.
It allows estimating how an element impacts another element (influence, change, ...), to unravel, in a complex
system, which is the hen and which is the egg, where to start, what are the "motors" factors, that affect all but which
46
http ://www.numericaldynamics.com/
47
Godet Michel, Manuel de prospective stratégique, tome 2, 3e
édition, Dunod, 1998.
19. 19
are not influenced, "dependant" factors, totally influenced, rather "independent" factors, and finally the key "levers"
factors, in the center of the complex, both motors and dependent.
Let's come back to our insurance company, as an example. We want to study the 13 macro-processes
interdependence. This gives the following matrix, in which Executive Committee vote, in the light of its knowledge of
the company and its intuitions48
.
Vertical addition gives dependence, horizontal addition gives influence.
The result appears immediately with the complex graph of influences, and especially the characterization of process
profiles
48
Micmac software uses additionally graph theory to calculate the cascade influence, factor x influencing factor y,
which in turn affects factor z…. Micmac can be obtained at Lipsor: http ://en.laprospective.fr/methods-of-
prospective/softwares/59-micmac.html
20. 20
This method, imperfect by nature (coming from appreciations and votes) is quite universal and can be applied in
many cases. One can for example represent in row and column, not process like here, but individuals. We can then
try to assess their inter-cross-influences. This will help you, if you want to act, most preferably go to the "levers" (the
"dependent" have no power, "motors" are too difficult to meet.
It can be applied to solve personal problems, putting in rows and columns your assumption on factors causing this
problem. Again, "motor" causes are too difficult to solve, "dependent" causes will reappear again, focusing on
"levers" is the most efficient to solve the problem!
It is in all of these tools in "bounded rationality", each player knowing only part of the truth, but enough action in most
cases.
What possible managerial conclusion?
What can we say after this walk inside imperfect methods?
Let's be clear: methods are essential, "mental models" representations alone (frameworks) are totally useless without
an arsenal of related methods to apply, without some toolbox! What is the value of methodologies is that they are
able to help us liberate our creative potential with some instruments?
Promote imperfect methods is by no means a license to inaccuracy given to managers, who already have too much
tendency to avoid this rationality effort.
It is very useful for everyone, regardless of its responsibilities, to arm with light, simple tools, not to completely solve
problems, but to prototype dynamic actions.
Address this issue in the training of managers, executives, leaders is a challenge. Difficulty is that knowledge is
partitioned by areas, there is little multidisciplinary. Teaching and research in colleges and universities require that
research remains within its discipline (except for some, like Arrow, Mintzberg, ... coming out of the system by the top).
Each specialty promotes its own methodologies, often "perfect". So, interdisciplinary methodologies have that way
small chance to emerge!
Whenever a "perfect" methodology is advocated, to solve problems or change the future, activism or skepticism of
everyone is not enough. Any method that focuses on strategy, organization, human, techniques, must be at the same
time applied... and subverted. Managerial art is to invent, in each case, the subtle "equilibrium" between the
effectiveness of the method and the time when pushing it too far is really stupid.
Finally, why not choose, in professional and personal life, to resist actively and creatively to the innumerable
paradoxical "be perfect" injunctions?
Welcome to imperfect methods club.