|Organizers||Nick Drage Nick Drage|
|Participants||Jim Newman Jim Newman , Chris Dobson Chris Dobson , Florian Buetow Florian Buetow , Tom Ling Tom Ling|
This is the latest version of this idea, partly inspired by a quick conversation with Dinis on Thursday evening.
Answers to the following questions, raised during the week:
Is the approach of finding similar industries or situations valid?
Does Dave Snowden’s experience support following or abandoning this methodology?
If it’s not valid, what methodologies should be used to create or find, and test, the correct strategies?
Can we learn from other practitioners in related areas as a useable “hack” to choose effective new strategies rapidly?
What are the underlying assumptions of the current strategies? Are those underlying assumptions valid?
Is this area of study financially or practically viable?
Register as participant
To register as participant add
Security Challenges - Next step to either:
sessionsmetadata field from your participant's page (find your participant page and look for the edit link).
- or the
participantsmetadata field from this git session page
Back to list of all Working Sessions