Abstract

Modern memory is distributed across email, documents, drives, CRMs, wikis, databases, local files, chat systems, second brains, memory palaces, project systems, public websites, private notes, and agentic runtimes. The dominant technical response is often to centralise, index, embed, or synchronise. Those approaches can improve retrieval, but they do not by themselves answer the harder human and governance questions: where does authority live, what is safe to connect, what has changed, what has aged, what should be acted on, and what should remain protected?

Woodlands proposes a model of connected memory in which a coherent memory is understood as a tree and a purposeful field of memory is understood as a wood. The model is not a replacement for existing stores. It is a navigation, identity, source-authority, boundary, ageing, judgement, and visualisation layer over native systems.

The core storage rule is simple: systems keep bodies; Woodlands keeps identity, meaning, pointers, boundaries, links, revisions, tombstones, and audit.

Keywords: connected memory; agentic AI; knowledge management; distributed cognition; memory palace; MemPalace; mind maps; provenance; personal information management; context ownership; Woodlands; judgement; boundary objects; FAIR metadata; knowledge graphs; Zettelkasten; information foraging.

Reader Guide

What to look for

  • Authority: notice where the paper separates an entry route from the source of truth.
  • Boundary: look for firebreaks before personal, company, client, tenant, or public memory can mix.
  • Shape: treat diagrams, tables, and bullets as orientation aids. They show how the model behaves, not just what it is called.
  • Action: ask what a person or agent is allowed to do after reading a memory object.

1. Introduction

The practical problem Woodlands addresses is not that people have nowhere to store information. The problem is that useful information now lives in many useful places at once.

A course may involve a calendar invitation, a teaching plan, a Google Drive folder, readings saved in a reference tool, a personal note in a second brain, a route in a memory palace, a wiki page, email commitments, and later a reusable lesson. A company decision may involve a CRM record, a SharePoint board pack, a source-of-truth register, a process card, an email thread, a meeting transcript, and a judgement route. A public idea may begin as a note, become a blog post, turn into a paper, become agent-readable context, and later seed another project.

Each system has a reason to exist. The difficulty is not simply fragmentation. It is loss of orientation.

When a person or agent enters memory through one surface, they need to know what the thing is, where authority lives, what system owns the body, what boundaries apply, what language the source system uses, what is current or stale, what related material is nearby, and what action is now allowed.

Memory becomes useful when it is rooted, connected, bounded, aged, and actionable.

Woodlands treats those orientation questions as first-class design requirements. It gives the problem a language: roots, trunks, branches, leaves, rings, seeds, deadwood, coal, oil, tree families, wood shapes, firebreaks, Rosetta Stone translations, typed links, and judgement routes.

The naming is not meant to be cute. It is meant to stop a dangerous flattening. An email is not always the source of truth. A folder is not always a boundary. A summary is not always authority. A memory palace cue is not evidence. A CRM deal is not a generic note. A public page is not permission to access private context.

Research diagram showing entry surfaces resolved through a Woodlands orientation layer before safe action.
Section 1 diagram: the useful control is not the entry surface. It is the orientation step that resolves authority, boundary, age, and action before work continues.

2. Research Problem

Most information environments optimise for storage, search, or collaboration inside a product boundary. That creates several recurring problems.

Entry points are mistaken for authority. Email may be where a person arrives, but the authoritative trunk may be a signed agreement, a course plan, a board paper, a CRM account, or a governance record. Search engines and agent tools can make the first thing found feel like the right thing. Woodlands deliberately separates entry route from trunk.

Source languages are flattened. Email has threads and senders. CRMs have companies, deals, contacts, owners, stages, activities, and associations. Drive has files, folders, comments, revisions, and owners. SharePoint has sites, libraries, pages, lists, permissions, and inheritance. A memory layer that ignores those native languages loses meaning.

Raw ingestion creates risk. Copying everything into one store may make retrieval feel easier while weakening permission boundaries, provenance, privacy, auditability, and source authority. This matters more when agents can summarise, copy, connect, and act at speed.

Memory does not age cleanly. Old ideas, superseded documents, repeated exceptions, and dormant lessons can be clutter or value. Systems need a way to distinguish deadwood, coal, and oil rather than treating every old object as equally live or equally irrelevant.

Agentic systems make the problem sharper. Agents do not merely retrieve. They plan, transform, propose, and sometimes act. That means a memory layer needs judgement routes, not just retrieval routes.

Woodlands is proposed as an answer to this set of problems. It is not a universal database or a raw export layer. It is a method for making distributed memory navigable while respecting native authority, permissions, and meaning.

3. Theoretical Anchors

Woodlands is a new applied model, but it stands on several existing traditions.

Research diagram mapping theory anchors such as method of loci, distributed cognition, transactive memory, boundary objects, PIM, PROV, RDF, FAIR, Zettelkasten, and information foraging to Woodlands operations.
Section 3 diagram: the references matter because each contributes an operating behaviour, not because the model needs decorative academic scaffolding.

3.1 Method of Loci, Memory Palaces, and MemPalace

The method of loci, often described through memory palaces, uses spatial structures to support recall. A person places remembered items along a route or inside imagined locations, then retrieves them by moving through that spatial layout. Contemporary survey work describes the method as a long-standing mnemonic practice with continuing research interest.

Woodlands borrows the insight that memory improves when it has a navigable shape. It differs in scope. A memory palace is primarily a mnemonic method for recall. Woodlands is a cross-system orientation model for people and agents. It can use memory palace locations as entry routes, but it also tracks source authority, boundaries, provenance, typed links, ageing, and judgement.

Open-source project note

MemPalace is a useful concrete test case because it turns the memory-palace idea into a local-first recall surface for agents. In Woodlands terms, it should be treated as an optional recall sidecar or entry-route adapter: excellent for finding and re-entering context, but not automatically the canonical store, policy gate, source authority, or audit record.

3.2 Mind Maps and Radial Thinking

Tony Buzan's mind map philosophy adds a second visual anchor. A mind map starts from a central idea and grows outward through branches, keywords, images, colour, association, and hierarchy. That matters for Woodlands because many memory problems are not linear. A person may reach the useful thing through a cue, a project, a place, a person, a phrase, a recurring exception, or a half-remembered association.

Woodlands should therefore support mind-map-like views for exploration and sensemaking. But the map must not become theatre. Associative branches are useful only when they remain tied back to source pointers, confidence, boundaries, and judgement routes. A beautiful mind map that hides weak provenance is still unsafe.

Research diagram showing method of loci, MemPalace, and mind maps as spatial and associative entry routes into Woodlands.
Section 3 diagram: memory palaces, MemPalace, and mind maps are powerful entry-route patterns. Woodlands keeps them useful by tying each route back to source authority, confidence, boundary, and judgement.

3.3 Distributed Cognition

Distributed cognition argues that cognition is not confined to the individual mind. It is spread across people, tools, artefacts, representations, and practices. Edwin Hutchins's Cognition in the Wild is a central reference point here.

Woodlands applies this insight to modern operational memory. A memory may be distributed across a person, a document, a CRM, a calendar, a folder, a meeting habit, an agent, and a governance process. The Woodlands map does not pretend all cognition lives in one store. It asks how the distributed system can remain legible.

3.4 Transactive Memory

Transactive memory describes how groups remember by knowing who knows what. The group does not need every person to hold every fact. It needs a reliable system of expertise, location, trust, and retrieval.

Woodlands extends this idea into hybrid human-agent environments. The question is not only "who knows this?" but also "which system owns this?", "which route is safe?", "which source is authoritative?", and "which judgement gate applies before action?"

3.5 Boundary Objects

Star and Griesemer's boundary-object work explains how different social worlds can cooperate around artefacts that are stable enough to maintain identity but flexible enough to support local interpretation.

Woodlands treats maps, trees, Rosetta Stone mappings, and context cards as boundary objects. A CRM user, board member, agent, developer, teacher, and future version of the organisation may all need different local language. The Woodlands identity and relationship layer gives them a shared point of orientation without forcing all systems into one vocabulary.

3.6 Personal Information Management

Personal information management research has long studied how people keep, organise, maintain, retrieve, and re-find information across emails, files, web pages, documents, tasks, and notes.

Woodlands inherits that concern with re-finding, but adds source authority and safe agentic action. The question is not only "can I find it again?" It is "when I find it, do I know what it is, whether I can use it, what it is rooted in, and what it connects to?"

3.7 Provenance, RDF, and FAIR Metadata

W3C PROV gives a standard family for expressing provenance: the entities, activities, and agents involved in producing or influencing something. RDF provides a graph-based model for statements and relationships. FAIR gives a discipline for making data and metadata findable, accessible, interoperable, and reusable.

Woodlands does not require any one of those standards as its internal storage format, but it adopts their discipline. Roots are the human-facing expression of provenance. Typed links stop every relationship collapsing into "related". Metadata can remain useful even when raw bodies cannot or should not be copied.

3.8 Zettelkasten and Information Foraging

Zettelkasten practice respects small, connected, reusable notes. Information foraging theory describes information seeking as a cost-benefit activity guided by cues, paths, and information scent.

Woodlands takes both lessons seriously. A useful wood should make the next path visible. From any entry point, the user should be able to see the trunk, roots, nearby branches, active leaves, firebreaks, and possible next actions.

3.9 Tonywood.org Thinking

Woodlands also grows from Tony Wood's existing public work. "Your Context Is the Next Lock-In" frames context as the strategic layer in agentic work. "Sharing Is a Language" argues that software systems create shared vocabulary. "Don't Build a Hoarder-Build a Learner" argues that agentic memory should not store every scrap of operational noise. "When Do We Need Judgement?" gives the operating gate: consequence changes the required standard. "Stop Paying The Data Tax" supports owned, structured, agent-readable context.

Woodlands is one way of making that context usable without pretending every source can be safely absorbed into one pile.

4. Woodlands Thesis

A memory system should not be judged only by how much it stores or how quickly it retrieves. It should be judged by whether it helps a person or agent answer seven orientation questions:

  1. What am I looking at?
  2. Where does the authoritative body live?
  3. What roots prove, constrain, or weaken it?
  4. What is connected to it?
  5. What boundaries or firebreaks apply?
  6. What is its lifecycle state?
  7. What judgement or action is required now?
Research diagram showing seven Woodlands orientation questions surrounding a safe memory object.
Section 4 diagram: a memory object becomes usable only when identity, authority, roots, links, boundaries, lifecycle state, and action route are explicit.

The theory turns those questions into a practical vocabulary.

A memory is a tree. A project, domain, course, company, idea, or outcome is a wood. A system-specific object is often an entry point. The trunk is the authoritative source. Roots are provenance, evidence, permissions, and hidden context. Branches are visible connected surfaces. Leaves are active details. Rings are chronology and revision history. Seeds are reusable future value. Deadwood explains old shape. Coal is compressed deep archive. Oil is dormant archive value that can be carefully extracted for new work.

The trunk is not always the entry point. This is one of the model's most important distinctions. A user may enter through an email, but the trunk may be a signed document. A user may enter through a memory palace cue, but the trunk may be a course plan. A user may enter through a CRM deal, but the trunk may be an account record or board-approved source.

5. Conceptual Model

Research diagram showing Woodlands as a schema: wood, tree, item, source pointer, roots, trunk, branches, rings, and archive states.
Section 5 diagram: the tree language becomes useful only where it changes routing, retrieval, provenance, boundary, ageing, or action.

5.1 Tree Anatomy

Tree part Meaning in Woodlands
Roots Provenance, source trail, permissions, hidden dependencies, tacit context, evidence, confidence, and constraints.
Trunk The authoritative source or main store for the memory.
Branches Visible connected surfaces such as wiki pages, summaries, templates, source cards, examples, and outputs.
Leaves Current working details, live notes, recent signals, active decisions, and short-lived context.
Rings Chronology, revision history, version history, decision trail, and maturity.
Seeds Reusable ideas, prompts, patterns, exercises, lessons, and future projects.
Deadwood Superseded material that is no longer active but still explains why the memory has its shape.
Coal Stable, compressed deep archive that is no longer normally active.
Oil Dormant archive value that may be extracted carefully for a new purpose.

5.2 Tree Families

The first taxonomy should be deliberately small. If a family name does not change behaviour, it is decorative and should be pruned.

Tree family Role
OakDurable institutional memory and long-term truth.
WillowProcesses and workflows.
Silver BirchIdeas, synthesis, theory, and exploration.
HazelReferences, citations, and saved sources.
RowanRisk, caution, judgement, and guardrails.
AshProjects, actions, delivery, and execution.
BeechTeaching, courses, learning, and curriculum.
HollyProtected, private, confidential, or tenant-scoped memory.
YewLegacy, archive, closure, deadwood, coal, and oil transition.

5.3 Wood Shapes

Woods are purposeful arrangements of trees. A grove is a small bounded outcome such as a course, workshop, proposal, meeting, or project. A copse is a temporary cluster of active work. An orchard is a repeatable output-producing system. An arboretum is a comparative collection, taxonomy, or reference set. Ancient woodland is a mature domain with deep history and archive layers. A nursery holds early ideas, prototypes, seedlings, and experimental concepts. A clearing is a decision point where several paths become visible. A firebreak is a boundary that prevents unsafe mixing.

Woods should normally be named by purpose or outcome. Time periods, people, and domains can be useful names only when they clarify the boundary.

6. Storage Method: Identity Without Ingestion

The technical centre of Woodlands is identity without ingestion.

Research diagram showing native bodies staying in source systems, a Woodlands metadata record, and bounded context delivered to agents.
Section 6 diagram: Woodlands reduces risk by storing identity and meaning around source bodies rather than copying every body into a new universal store.

Woodlands should not try to become the place where all information bodies live. Native systems keep their bodies. Wiki keeps explanatory pages. Second brain systems keep approved personal durable memory. Memory palace tools keep spatial recall cues and routes. Reference systems keep saved sources. Process systems keep reusable methods. Vaults keep company, client, tenant, board, governance, and evidence-backed truth. Email, chat, and calendar keep entry points, signals, actions, and time anchors. Drive, SharePoint, and local files keep documents, folders, revisions, and evidence. CRMs keep relationship, deal, company, owner, and activity context. Websites keep public canonical context.

Woodlands stores the map around those bodies:

  • stable Woodlands IDs;
  • safe source pointers;
  • source ecosystem and native type;
  • tree and wood assignment;
  • trunk and root meaning;
  • boundaries and firebreaks;
  • judgement route;
  • archive state;
  • typed links;
  • revisions, tombstones, and audit events;
  • validation state.

The default body rule is:

raw_body_stored: false

This keeps Woodlands from becoming a hoarder. It maps meaningful items only: items that help retrieval, source authority, provenance, boundary, judgement, action, ageing, or reuse.

6.1 Woodlands IDs

Proposed ID shapes are:

wood.<scope>.<slug>
tree.<scope>.<slug>
item.<scope>.<slug>.<short_id>
source.<ecosystem>.<opaque_ref>
rel.<short_id>

IDs should be stable, lowercase, machine-safe, and free of secrets or unnecessary personal data. Source-native IDs should be preserved as pointers, not treated as the only cross-system identity.

Woodlands uses typed relationships rather than vague association. Core relationship types include belongs_to_wood, tree_in_wood, has_trunk, rooted_in, branches_to, current_leaf_of, references, derived_from, contradicts, supersedes, blocked_by_firebreak, requires_judgement, ages_into, and seeds.

This gives the memory map enough semantics to support validation, visualisation, CRUD operations, ageing, and judgement. A backlink says "there is a connection". A typed link says why the connection matters.

6.3 Validity

A mapped memory is Woodlands-valid only when it has a stable Woodlands ID, at least one safe source pointer, a clear source ecosystem and native type, a trunk or explicit reason that the trunk is unknown, provenance roots or restricted confidence, sensitivity and source scope, firebreaks where boundaries touch, judgement routes where consequence appears, and at least one relationship to a wood, tree, source, or archive state.

That creates three levels of validity:

  • Parseable: the record is syntactically valid JSON or XML.
  • Schema-valid: the record conforms to a declared schema.
  • Woodlands-valid: the record is safe and meaningful inside the Woodlands model.

The distinction matters. A memory can be well-formed and still unsafe.

7. Rosetta Stone Translation

Woodlands needs a Rosetta Stone because every ecosystem speaks its own language.

Research diagram showing native ecosystem vocabularies passing through a Rosetta adapter into Woodlands meanings such as entry route, trunk, root, and firebreak.
Section 7 diagram: Rosetta translation preserves native source meaning while mapping each object to a Woodlands role. It is the antidote to flattening.
Ecosystem Native language Possible Woodlands meaning
Email Thread, sender, recipient, attachment, subject Entry point, Ash leaf, Hazel root, Rowan signal
Google Drive File, folder, owner, comment, revision Trunk, branch, ring, source pointer
SharePoint Site, library, list, page, permission inheritance Protected trunk, root, firebreak, board-safe branch
CRM Company, contact, deal, stage, activity, owner Oak company memory, Ash action tree, Rowan risk branch
Wiki Page, section, backlink, revision Explanatory branch, concept trunk, public or internal surface
Process system Process card, method, template, room Willow trunk, reusable method, not company truth
Vault Record, tenant, company, evidence, board truth Protected Oak or Holly trunk or root
Memory Palace / MemPalace Route, room, location, cue, wing, drawer, diary Entry route, recall anchor, deep-recall sidecar, not source truth

The Rosetta Stone prevents two common failures: flattening all source objects into generic "content" and mistaking a convenient entry point for an authoritative trunk.

It also protects source-system meaning. A CRM deal should not become a generic note. A vault fact should not become a process method. A memory palace cue should not become source truth. A public blog page should not imply access to private operational context.

8. Growth, Ageing, and Judgement

Woodlands must be able to grow. It should admit new sources, ideas, concepts, trees, woods, and words. But growth without judgement becomes sprawl.

The growth loop is: notice, classify, root, judge, place, link, review, and mature.

Research diagram showing the Woodlands growth loop from notice to classify, root, judgement, place, and archive states.
Section 8 diagram: new memory is rooted before it is trusted, judged before it creates consequence, and aged into the right state when its role changes.

This makes Woodlands more than a filing method. It becomes a practice of knowledge stewardship. Knowledge is welcomed when new sources and ideas arrive; rooted before it is trusted; translated before it crosses systems; judged before it creates consequence; protected before it crosses boundaries; pruned when it becomes noise; aged when its role changes; harvested when old knowledge becomes newly useful.

8.1 Judgement Routes

Judgement should not run all the time. It should appear when consequence appears: action, disclosure, commitment, cost, policy, customer promise, people impact, board advice, protected material, or public claim.

A judgement route can decide to plant a new tree, graft a branch, hold a seed, apply a firebreak, ask for provenance, ask for approval, archive as deadwood, compress to coal, extract as oil, or refuse.

Judgement cannot bypass source permissions, merge tenant boundaries, promote an interpretation into truth, publish private material, or make durable memory without review.

8.2 Rubrics

Rubrics help Woodlands decide what belongs where. Early rubrics should include data safety, trust calibration, fear and anomaly signals, output quality, task decomposition, done and good-enough standards, execution versus reflection, and energy or cost governance.

Rubrics are not decoration. They are the mechanical guides that let the system adapt without drifting.

9. Visual Method and Graphic Programme

Woodlands is meant to be seen as well as stored. The first visual language should be plain, reviewable, and versionable. Mermaid diagrams are useful for quick maps because they can be generated from IDs and links. PNG infographics are useful for public reading because they are stable, inspectable, and easy to share.

Five visual jobs matter:

  1. Orientation: show the wood, trees, entry point, trunk, and nearby paths.
  2. Authority: show roots, trunk, confidence, and evidence.
  3. Translation: show source ecosystem language beside Woodlands language.
  4. Boundary: show protected areas, firebreaks, and judgement routes.
  5. Motion: show active leaves, ageing, next actions, deadwood, coal, oil, and seeds.
Research diagram showing the five visual jobs for Woodlands diagrams: orientation, authority, translation, boundary, and motion.
Section 9 diagram: research diagrams should be generated from model facts such as IDs, source pointers, typed links, boundaries, and archive state.

The next graphics should be developed as a small visual set, not one giant poster:

  • The Woodlands map: native bodies, Woodlands metadata layer, and safe agentic context.
  • The tree anatomy diagram: roots, trunk, branches, leaves, rings, seeds, deadwood, coal, and oil.
  • The mind-map view: central idea, radial branches, associative cues, source pointers, confidence, and boundary markers.
  • The Rosetta Stone table: how email, CRM, SharePoint, wiki, vault, memory palace, and website language translates into Woodlands meaning.
  • The firebreak diagram: personal, company, client, tenant, and public boundaries with allowed and blocked routes.
  • The ageing timeline: active leaf to deadwood, coal, oil, seed, or deletion tombstone.

The visual method is not separate from the storage method. A good Woodlands diagram should be generated from IDs, source pointers, typed links, boundaries, judgement, and archive state.

10. Early Field Tests

Research diagram showing early Woodlands field tests including Exeter course grove, board-pack willow, founder and company memory, TonyWood.org arboretum, source systems, CRM records, and Memory Palace or MemPalace recall.
Section 10 diagram: the field tests are not simply examples. Each case stresses a different control: boundary preservation, source authority, native language, or version noise.

10.1 Exeter Course Grove

The Exeter course example is a grove: a bounded outcome with teaching, references, ideas, actions, and later durable lessons.

It contains a Beech tree for course structure and learning outcomes, an Ash tree for dates and preparation, a Hazel tree for readings and references, a Silver Birch tree for themes and possible exercises, and an Oak tree for durable lessons after delivery.

The field test shows strong fit because Woodlands can connect course outcome, teaching design, source materials, preparation actions, and later learning without mixing student-identifiable material or raw source bodies.

10.2 Governance Board-Pack Willow

A board-pack process maps as a Willow tree inside a governance orchard. The trunk may be the process card. Roots include prior governance reasoning, evidence requirements, and board-safety assumptions. Branches include definitions, templates, examples, and approved scoped context. Leaves include current questions, missing evidence, owner gaps, and active decision points.

The key finding is boundary separation. A reusable process remains method. A protected source remains company truth. Woodlands links them without copying protected facts into the method layer.

10.3 Founder and Company Memory Tree

Founder and company memory maps as Oak with Holly boundaries. The trunk may be a scoped company record. Roots include source documents, meetings, permissions, and company records. Branches include board-safe summaries, advisor context, and process guidance when approved. Firebreaks prevent private, company, and client context from merging casually.

The test shows that Woodlands is valuable precisely because it refuses to turn all memory into one blended pile.

10.4 TonyWood.org Public Context Arboretum

TonyWood.org functions as a public arboretum: a comparative collection of public pages, writing, research, agent-readable routes, and canonical claims.

It gives Woodlands public trunks and Hazel references while preserving a clear firebreak between public material and private operational memory.

10.5 Email, Drive, SharePoint, and CRM Tests

Email works best as an entry point, signal source, action leaf, or root. It should not automatically become the trunk.

Drive and SharePoint work well as document trunks, branches, rings, and evidence paths, but version noise must be pruned.

CRM records work as relationship and commercial context, especially for Oak, Ash, Rowan, and Holly trees. The model must preserve the CRM's own language: company, contact, deal, stage, activity, owner, association.

10.6 Memory Palace and MemPalace Adapter Test

Memory palace routes and MemPalace-style recall are a separate field test because they are especially tempting to over-promote. They can make old context discoverable again, help an agent wake up inside a project, and support associative movement across people, places, conversations, and decisions.

The Woodlands control is that recall remains recall. The route, room, wing, drawer, diary, or search result can bring a person or agent to the right neighbourhood, but it should still resolve to a trunk, root, source pointer, confidence state, and boundary before it becomes durable truth or action.

These tests support the need for the Rosetta Stone. The model works only if each ecosystem keeps its native meaning.

11. Technical Implications

Woodlands can be implemented gradually. The first implementation should be a read-only metadata and judgement layer, not a new memory product.

Core operations are:

  • register_source_pointer
  • register_mapped_item
  • link_items
  • validate_woodlands_item
  • resolve_wood_context
  • request_woodlands_judgement
  • render_mermaid_map
  • woodlands.update
  • woodlands.delete
Research diagram showing Woodlands technical operations where create, read, update, and delete operate as governance over metadata.
Section 11 diagram: CRUD is treated as governance over the Woodlands map. Delete creates a tombstone rather than pretending history never happened.

CRUD should behave as memory governance, not raw store mutation. Create writes metadata only after tree context is read. Read loads the target tree plus directly linked neighbours. Update writes a new revision event and impact scan. Delete creates a tombstone, not a casual hard delete.

This turns delete into a meaningful statement: the link or item is no longer active, but history can still explain why it was once present.

JSON is the first practical storage format for runtime exchange and validation. XML is useful for archive, governance, document workflows, and long-lived interchange. Both need semantic validation beyond syntax.

12. Risks and Controls

Research diagram mapping Woodlands risks to controls: over-mapping, false authority, boundary failure, staleness, privacy leakage, and metaphor drift.
Section 12 diagram: the control test is whether the map makes weak information look strong. If it does, the map is unsafe no matter how neat it appears.

Metaphor overreach. The tree and wood language is useful only when it changes behaviour. If names become decorative, the model becomes theatre. Each term must help routing, retrieval, provenance, boundary, judgement, ageing, or action.

Over-mapping. Mapping every object would recreate the hoarding problem. Woodlands must map meaningful items only and let routine noise decay in native systems.

False authority. A neat map can make weak information look stronger than it is. Woodlands must mark unrooted items, low-confidence records, interpretations, and source gaps.

Boundary failure. The largest risk is unsafe mixing of personal, company, client, public, and tenant memory. Firebreaks, source scopes, sensitivity fields, and judgement are not optional.

Staleness. Links decay. Trunks move. Documents are superseded. People change roles. Projects close. Woodlands needs rings, freshness checks, revision events, tombstones, and archive states.

Privacy and consent. Even metadata can reveal sensitive facts. Source pointers must be safe, opaque where needed, and scoped to the audience.

13. Research Questions

The next phase should test the model against harder cases:

Research diagram showing the Woodlands research programme as a backlog of metadata, taxonomy, adapter, archive, usability, comparison, and telemetry tests.
Section 13 diagram: draft v0.1 becomes useful when the research questions are turned into field tests that can change the model.
  • What is the minimum metadata needed to enter a wood from any point and understand the whole shape?
  • Which tree families genuinely improve routing and judgement?
  • Are coal and oil both useful archive states, or should deep archive be simpler?
  • How should woods be named: by outcome, domain, person, project, or time?
  • Which source ecosystems need dedicated Rosetta Stone adapters first?
  • How much Mermaid visualisation is enough before richer graphics are needed?
  • Can field users understand firebreaks and judgement routes quickly?
  • Does Woodlands improve retrieval, prioritisation, and action compared with search, folders, tags, or backlinks alone?
  • How should Woodlands handle consent, privacy repair, and hard delete?
  • What daily telemetry shows that the theory is working without exposing raw bodies?

14. Agent-Facing Companion Draft

This section is a draft companion for agents and people reviewing agent summaries. It is not private instruction and does not grant permission to act.

Outcome: preserve the core Woodlands distinction: native systems keep bodies; Woodlands keeps the safe map around them.

Use when: summarising the paper, designing a memory layer, evaluating an agentic context system, or checking whether a proposed implementation protects source authority and boundaries.

Do not use when: the user needs legal, security, privacy, or production architecture advice without local source review and responsible human approval.

Must preserve: entry points are not necessarily authority; source-system language matters; raw ingestion increases risk; judgement is required before consequential action; firebreaks are part of the model, not a later compliance add-on.

Human handoff: cite the paper and send readers to the canonical article rather than pretending this compact summary is the full argument.

Research diagram showing the publication surfaces for Woodlands: canonical research text, agent companion, and adapted audio companion.
Sections 14 and 15 diagram: the text, agent companion, and audio companion should preserve the same meaning and boundaries while taking the shape their audience needs.

15. Audio and Publication Model

This release includes an audio companion as well as the text-first research version. The audio is not a verbatim reading. It is a spoken adaptation of the paper: paced, explained, and shaped for someone walking, driving, or thinking away from the screen.

The text remains the canonical paper. The audio is an adapted audible version. Differences between the text and the audio are intentional when they make the spoken version clearer.

The mature publication shape therefore has three surfaces: the full research text, an agent-facing companion, and an audio companion. They should agree on meaning, but they do not need to be word-for-word identical.

16. Conclusion

Woodlands is a philosophy and operating method for connected memory.

Its first contribution is conceptual: memory should be understood as rooted, connected, bounded, aged, and actionable. Its second contribution is practical: native systems keep bodies while Woodlands keeps identity, safe pointers, typed links, boundaries, judgement, archive state, revisions, tombstones, and audit. Its third contribution is visual: people and agents should be able to enter a wood from any tree and understand the surrounding shape.

The model answers a real pressure in agentic work. As AI systems become better at retrieval, summarisation, and action, the limiting factor becomes not whether information can be found, but whether it can be understood safely.

Woodlands gives that safety and understanding a language.

References

  1. Tony Wood. "Your Context Is the Next Lock-In." Tonywood.org, May 14, 2026.
  2. Tony Wood. "Sharing Is a Language." Tonywood.org, May 14, 2026.
  3. Tony Wood. "Don't Build a Hoarder-Build a Learner: Exception-Driven Memory for Agentic AI." Tonywood.org, January 2, 2026.
  4. Tony Wood. "When Do We Need Judgement?" Tonywood.org, May 16, 2026.
  5. Tony Wood. "Stop Paying The Data Tax: The Agentic-First Website Playbook Leaders Are Quietly Switching To." Tonywood.org, April 21, 2026.
  6. Cole R. Lawson. "The Method of Loci: A Survey Review." International Journal of Psychological Studies, 2026.
  7. MemPalace. "MemPalace open-source repository." GitHub.
  8. Tony Buzan and Barry Buzan. The Mind Map Book. BBC Active / Penguin Random House.
  9. Edwin Hutchins. Cognition in the Wild. MIT Press, 1995.
  10. Daniel M. Wegner. "Transactive Memory: A Contemporary Analysis of the Group Mind." In Theories of Group Behavior, 1987.
  11. Susan Leigh Star and James R. Griesemer. "Institutional Ecology, 'Translations' and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39." Social Studies of Science, 1989.
  12. William Jones. Keeping Found Things Found: The Study and Practice of Personal Information Management. Morgan Kaufmann, 2007.
  13. W3C. "PROV-Overview: An Overview of the PROV Family of Documents." 2013.
  14. W3C. "RDF 1.1 Concepts and Abstract Syntax." 2014.
  15. Mark D. Wilkinson et al. "The FAIR Guiding Principles for scientific data management and stewardship." Scientific Data, 2016.
  16. GO FAIR. "FAIR Principles."
  17. Zettelkasten.de. "Introduction to the Zettelkasten Method."
  18. Peter Pirolli. Information Foraging Theory: Adaptive Interaction with Information. Oxford University Press, 2007.