How Much is too Much? - STC India...• The missions, features, capabilities, and functions of the...

Post on 05-Apr-2020

0 views 0 download

Transcript of How Much is too Much? - STC India...• The missions, features, capabilities, and functions of the...

How Much is too Much?A Presentation on Cognitive Load Theory

Seema Gaurav,TIBCO Software

© Copyright 2000-2015 TIBCO Software Inc.

Agenda

Information Overload

Impact of Information Overload

How Do We Learn?

Understanding Cognitive Load Theory

Preventing Cognitive Overload in Documents2

3© Copyright 2000-2015 TIBCO Software Inc.

Information Overload

4

Impact of Information Overload

© Copyright 2000-2015 TIBCO Software Inc.

Automation

Analytics

Cloud

Disrupts learning

Diverts attention

Loss of interest

Prone to errors

Poor decision making

5

Why Does The Mind Get Overloaded?

© Copyright 2000-2015 TIBCO Software Inc.

Working Memory

© Copyright 2000-2015 TIBCO Software Inc.

Exercise

7

What is Working Memory?

© Copyright 2000-2015 TIBCO Software Inc.

• Working Memory is‘memory-in-action.’

• It is the ability totemporarily hold andprocess information forcognitive tasks neededon a daily basis.

8

Working Memory

© Copyright 2000-2015 TIBCO Software Inc.

Allows us to:• Store immediate

experiences.• Retrieve prior knowledge

stored in the long termmemory.

• Process informationbased on the currentgoal.

9

Long-term Memory

© Copyright 2000-2015 TIBCO Software Inc.

As the term suggests, it is a memorymodel in which data can be retained for

a longer period of time.

10

How Do We Learn?

© Copyright 2000-2015 TIBCO Software Inc.

• We learn by building schemas - memory structures that permitus to treat a large number of information elements as one.

11

Novice vs. Expert Users

© Copyright 2000-2015 TIBCO Software Inc.

12

What is Cognitive Load?

© Copyright 2000-2015 TIBCO Software Inc.

Is the amount of itemsthat can be held in theworking memory at anytime.

13

What is Cognitive Limit?

© Copyright 2000-2015 TIBCO Software Inc.

• Is the maximum limit of chunks of

information the working memory

can process at any one time.

• Working Memory can only hold

7 +/-2 items at a time.

15-20 seconds7

Amount ofInformation

Cognitive Limit

items

Length of time

14

An Ideal Situation…

© Copyright 2000-2015 TIBCO Software Inc.

Cognitive Load < Cognitive Limit of theWorking Memory

< Limit of theWorkingMemory

Limit of theWorkingMemory

15© Copyright 2000-2015 TIBCO Software Inc.

Cognitive Load Theory

Is a method of increasing efficiency andease of learning by developinginstructions that creates a cognitive loadthat is less than the cognitive limit of theworking memory.

16

Types of Cognitive Load

© Copyright 2000-2015 TIBCO Software Inc.

17

Extraneous Load

© Copyright 2000-2015 TIBCO Software Inc.

1+1=?

18© Copyright 2000-2015 TIBCO Software Inc.

Intrinsic Load

Complexityassociated withlearning the task.

In the example,1+1=?, the usermust be familiarwith the digits, the‘+’ operator andthe ‘=’ operator.

In Technical Writing,for example, “Add theCLASSPATH to theenvironmentvariables.”

19

Germane Load

© Copyright 2000-2015 TIBCO Software Inc.

Is the relevant or effective load.

Is the effort needed to convertincoming information to schemasand transfer them to long-term

memory.

In the example, “Add theCLASSPATH to the environment

variables.” I understandCLASSPATH, environment variables,

and how to set it.

20

What’s an Ideal Cognitive Load?

© Copyright 2000-2015 TIBCO Software Inc.

Intrinsic Load + Extraneous Load + Germane Load

Manage Minimize Maximize

Cognitive Load Exercise

© Copyright 2000-2015 TIBCO Software Inc.

Exercise

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

BeachIt’s a pleasant sunny day in Goa, andthe beach looks beautiful.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

ManThere’s a man sitting by the shore,soaking the sun and digging his feetin the sand.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

NewspaperAs he is lost in his thoughts, anewspaper cut-out drifts down byhis feet and catches his attention.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

PictureHis eyes stop at the picture of aconvict who seems to have escapedfrom prison.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

ScarfThe man in the picture lookscunning and is wearing a red scarfaround his neck.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

ShoesThe man loses interest, chucks thepaper, wears his shoes, and walksaway.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

JeepJust then, two cops come along anddrag him to their jeep.

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

MirrorThe man looks at the side-viewmirror and adjusts his red scarf.

30

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

How many words do you recollect now?

Preventing Cognitive Overload in Our Documents

31

32

Preventing Cognitive Overload while Planning

© Copyright 2000-2015 TIBCO Software Inc.

Start at the informationgathering stage of the product

Is everything inthe FunctionalSpec relevant?

Should my userknow all of it?

Should everythingtold by the SME

roll into mydocument?

33

Identify Your Target Audience

© Copyright 2000-2015 TIBCO Software Inc.

34

Preventing Cognitive Overload while Writing

© Copyright 2000-2015 TIBCO Software Inc.

Start byidentifying thecontent for the

targetaudience.

• Build on the skills they have.• While introducing new concepts, write in such

a way that they can relate to the concept.• Example:

• Target Audience: DBA• A tuple in FooSpaces is similar to a row in a

table.• Target Audience: Programmers

• A tuple in FooSpaces is similar to aninstance of a class.

35

Preventing Cognitive Overload while Writing

© Copyright 2000-2015 TIBCO Software Inc.

Introduce the components first beforediscussing how they interact with each other.

Logically chunk content into units that theusers can understand.

Convey one idea per topic.

36

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

PNGXMLZIPDOCCA

37

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

PN GXM LZI PDO CCA

38

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

PNG XML ZIP DOC CA

39

Exercise

© Copyright 2000-2015 TIBCO Software Inc.

Which one was easier?

40

Schema Formation

© Copyright 2000-2015 TIBCO Software Inc.

PN GXM LZI PDO CCA

PNG XML ZIP DOC CA

Total chunks: 5 + new schema formation

Total chunks: 5

PNGXMLZIPDOCCATotal chunks: 14

41

Chunking: Bad Example

© Copyright 2000-2015 TIBCO Software Inc.

Fetching Records from a Table Using JDBC

Before beginning, ensure that the database is up and running. You must first include thepackages containing the JDBC classes needed for database programming. Most often,using import java.sql.* will suffice. You must then initialize a driver so you can open acommunications channel with the database. Open a connection using theDriverManager.getConnection() method to create a Connection object, which representsa physical connection with a database server. Using an object of type Statement, buildand submit an SQL statement to select records from a table. Once SQL query isexecuted, you can fetch records from the table. When you are done, explicitly close alldatabase resources instead of relying on the garbage collection provided by JVM.

42

Chunking: Good Example

© Copyright 2000-2015 TIBCO Software Inc.

Fetching Records from a Table Using JDBCPrerequisites: Ensure that the database is up and running.

Importing the packages

Include the packages containing the JDBC classes needed for database programming. Most often, usingimport java.sql.* will suffice.Registering the JDBC driver

Initialize a driver so you can open a communications channel with the database.Opening a connection

Use the DriverManager.getConnection() method to create a Connection object, which represents a physicalconnection with a database server.

43

Chunking: Good Example

© Copyright 2000-2015 TIBCO Software Inc.

Fetching Records from a Table using JDBC (Continued)

Executing a query

Use an object of type Statement for building and submitting an SQL statement to fetch records from a table.Extracting Data

Use the object of type ResultSet to browse through the records fetched from the table.Cleaning up the environment

When the records are fetched, explicitly close all database resources instead of relying on the garbagecollection provided by JVM.

44

Preventing Cognitive Overload while Writing

© Copyright 2000-2015 TIBCO Software Inc.

Keep it simple to reduce extraneous load

Scintillate, Scintillate, asteroid minutia

Twinkle, twinkle, little star

45

Keep it Simple

© Copyright 2000-2015 TIBCO Software Inc.

Bad Example:Socket opened on each connection retry to remote site that was no longerreachable or had already shutdown was not properly released. This hadcaused the operation system to exhaust the maximum limit of open filedescriptors accumulated over a period of time and the primary site can nolonger able to reconnect to the remote site when it became availableagain.

Good Example:All retry attempts to connect to a remote site that was not reachableresulted in a socket leak.

46

Preventing Cognitive Overload while Writing

© Copyright 2000-2015 TIBCO Software Inc.

Use the rule of‘seven plus orminus two’ forlists and steps.

Use substepsfor a lengthyprocedure.

Use subheadersto categorize

them intosmaller chunks.

47

Lists: Bad Example

© Copyright 2000-2015 TIBCO Software Inc.

The following bulleted list has too many items presented at once:

System concept descriptions provide:• The missions, features, capabilities and functions of the system• Major system components and interactions• Operational environment including manual procedures required• Operational modes such as production, backup and maintenance• Interfaces with other systems• Required performance characteristics such as response time, throughput and data volumes• Quality attributes such as availability, reliability and usability• Other considerations such as security, audit, safety and failure modes in emergency situations• Deployment considerations such as acquisition of business data to support the system including data

cleansing and loading• The classes of users that will interact with the system• Requirements for support of the system such as maintenance organization and help desk.

48© Copyright 2000-2015 TIBCO Software Inc.

Lists: Good Example

The chunking principle requires you to classify the items into groups to reduce the information overload as follows:

System concept descriptions provide:

Functional requirements• The missions, features, capabilities, and functions of the system• Major system components and interactions• Operational environment including manual procedures required• Operational modes such as production, backup and maintenance• Interfaces with other systems

Non-functional requirements• Required performance characteristics such as response time, throughput and data volumes• Quality attributes such as availability, reliability and usability• Other considerations such as security, audit, safety and failure modes in emergency situations

Deployment and Operational Requirements• Deployment considerations such as acquisition of business data to support the system including data cleansing and loading• The classes of users that will interact with the system• Requirements for support of the system such as maintenance organization and help desk.

49

Use Illustrations

© Copyright 2000-2015 TIBCO Software Inc.

Diagrams lead to greatestefficiency for spatial tasks ofmedium to high complexity.

Using explanatory calloutsalong with the diagramspromote learning.

Keep the accompanying textand the diagram together.

50

Example of Using an Illustration

© Copyright 2000-2015 TIBCO Software Inc.

With shared-nothing persistence,each node that joins a space as aseeder maintains a copy of thespace data on disk. Each node thatjoins as a seeder writes its data tothe disk and reads the data whenneeded for recovery.

51

Use Infographics

© Copyright 2000-2015 TIBCO Software Inc.

52

Use Videos

© Copyright 2000-2015 TIBCO Software Inc.

53

Avoid Redundancy

© Copyright 2000-2015 TIBCO Software Inc.

Do not repeat the explanation of the same content twice.

Use cross-references to guide users to the relevantsections.

Do not use different terms to mean the same thing.

54

Avoid Redundancy in Sentence Construction

© Copyright 2000-2015 TIBCO Software Inc.

Bad Example Good Example

The purpose of the … systemis to provide…

The … system provides…

This document has beenprepared to outline the … Plan

This document outlines the …Plan

in the form of as

in the event of if

In order to to

exhibits the ability to can

55

Use a Task-based Approach

© Copyright 2000-2015 TIBCO Software Inc.

Bad Example for a Heading Good Example for a Heading

Using a Put Operation Inserting a Tuple into a Space

Using Input Maps Importing Metadata in MDM

Setting a Private Key Encrypting Data

56

Avoid Noun Clusters

© Copyright 2000-2015 TIBCO Software Inc.

Bad Example Good Example

The request acknowledgementexchange data bit is set inHIMEM.

The data bit to exchange requestacknowledgments is set inHIMEM.

The media access controlprotocols are available in threevariants.

The protocols to control mediaaccess are available in threevariants.

This release offers cloud servicedeployment workflows.

This release offers workflows todeploy cloud service.

57

Go The Extra Mile

© Copyright 2000-2015 TIBCO Software Inc.

Provide samples. Provide cheatsheets.

Providesimulations forcomplex tasks.

Provide job aids.For example, achart of default

ports.

58

Tips to Improve Working Memory

© Copyright 2000-2015 TIBCO Software Inc.

Learning aids

• Repeat tasks till you automate them in yourmind.

• Use mnemonics to aid learning. Forexample, VIBGYOR to remember the colorsof the rainbow.

• Learn by association.• Learn by visualisation.

Use braintraining

• https://www.lumosity.com/• http://www.brainhq.com/• Doodle

59

Tips to Improve Working Memory

© Copyright 2000-2015 TIBCO Software Inc.

Playboardgames

• Scrabble• Uno

Exercise• Aerobics• Meditation• Sleep

60

Tips to Improve Working Memory

© Copyright 2000-2015 TIBCO Software Inc.

Learn anew skill

• A new language• A new musical instrument

Eat right

• Greens such as, spinach,lettuce, broccoli, kale

• Fruits such as, bananas,apricots, plums, cherries

• Dark chocolates

61

In Closing

© Copyright 2000-2015 TIBCO Software Inc.

11• Cognitive load is the result of Extraneous Load + Intrinsic Load+ Germane

Load.

22• Reduce the extraneous load, manage the intrinsic load, and increase the

germane load on the user.

33• Working Memory has the capacity of storing 7 +/- 2 items.

44• Ensure that you write in a way that promotes new schema formation.

55• Ensure that the cognitive load on the working memory is manageable.

62

In Closing

© Copyright 2000-2015 TIBCO Software Inc.

Some waysof not

overloadingthe user

Introduce new concepts, one at atime.

Stick to one idea per topic.

Create logical chunks ofinformation.

Follow the 7 +/-2 rule for lists andsteps.

Use illustrations, infographics,videos.

Avoid redundancy and nounstacks.

63

Questions?

© Copyright 2000-2015 TIBCO Software Inc.

64© Copyright 2000-2015 TIBCO Software Inc.

Seema GauravTIBCO Software India Pvt. Ltd. | www.tibco.com