AI Enablement

Your AI is Blind, and Your "Clever" Naming Strategy is the Culprit

Written by David Russell Published on 6 minutes read
Your AI is Blind, and Your

The first step in any AI enablement is data. This is the core truth we bring to every AI enablement project:

AI inherently needs data to succeed. It can't forecast your close rates until it knows your current close rate. It can't tell if a deal being 90-days-old deals means it's dead if you're not accurately tracking open and close dates in your CRM. AI needs this fuel to do its magic.

So, when clients engage us, one of the first things we do is load existing data. But before we can work our magic, that data has to be clean. And what we're seeing a lot of is that 'clean' doesn't just mean accurate... it means findable.

And that's where the "put all of our knowledge into AI" initiative can break down.


The Hidden Tax of "Project Bluebird"

You've been there, I'm sure. You're trying to find that one crucial report: a due diligence file, a client summary that you know exists. But it’s not called what it should be. It’s buried under a “clever” alias like "Project Bluebird" or "Operation Munchausen," created in the name of confidentiality.

Fast-forward six months. The people who named it have moved on, the logic is forgotten, and your team wastes a week recreating work it already did. You don't "search" for data anymore. You just wander through servers, hoping to get lucky.

This culture of cryptic naming starts with good intentions. Private equity deals are sensitive. M&A work is confidential. But this habit scales horribly. Instead of protecting intelligence, it obscures it.

Someone inevitably asks, “Didn’t we already do this analysis for XYZ Fund?”
The answer: “Yes, but it’s in a folder labeled ‘Project Musk Ox.’”

Hours are lost. Insights are duplicated. And what should be institutional knowledge becomes institutional noise.


If Humans Can't Find It, AI Never Will

As we press to implement AI anywhere and everywhere possible, this problem compounds exponentially. Why? Because the very first step an AI takes when looking for unstructured data is to look at the names of files and directories.

Think of your file system as a treasure map. The AI is the explorer, and the file and folder names are its first set of clues.

  • When the map says:
    Finance/Reports/Client_Acme_Q4_Review.pdf
  • The AI thinks:
    "Treasure! This is a relevant, high-value document. I'll prioritize this."
  • When the map says:
    Projects/Operation_Munchausen/Bluebird_vFinal_3.pdf
  • The AI thinks:
    "What is this? I'll ignore it." (Or worse, misinterprets it.)

This is where machine blindness begins-at the front door. Before the AI even reads the document's content, your "clever" name has already told it to look elsewhere.

From this point on, the AI is working blind. AI systems don’t infer meaning magically. They rely on concrete relationships between data points - connections based upon words and meanings. The strength of those connections determines how effectively an inference engine can connect the dots.

When your most important document refers to "Project Bluebird" instead of "Company X," you’ve effectively cut the neural link between what’s real and what’s named.

Now, a simple, high-value question like:
“Show me all our past interactions with Company X.”
…becomes unanswerable.

The data is there, but it’s invisible to the very system you're funding to make sense of it. You didn’t just mislabel a file. You broke the semantic connection your AI depends on to reason about reality. This increases adoption friction and results in the "Our AI is Stupid" response from those most in need of its help.


The Solution: A Data Governance Strategy for Findable Intelligence

The irony is that secrecy and intelligence don’t have to be enemies. You can protect confidentiality without sabotaging findability.

Protecting information doesn’t mean hiding it from yourself. It means shifting your strategy from security-by-obscurity to security-by-design. This is achieved with a data governance strategy that makes information both secure and AI-ready.

Here is the 4-pillar framework we implement with our clients:

1. The Dual-Layer System: Mask vs. Map

Your first move is to separate the human-facing name from the machine-readable metadata.

  • The Mask (Filename): Keep your "Project Bluebird" codename for the public-facing filename and folder. This satisfies security protocols and maintains confidentiality in directory views.
  • The Map (Metadata): Enforce a mandatory metadata policy. Every file, upon creation, must be tagged with actual identifiers. This metadata is the "map" for your AI.
    • Client_Real_Name: Company X
    • Project_Type: M&A
    • Workstream: Due Diligence
    • Status: Closed

2. The "Single Source of Truth" Lookup Key

Maintain a central, secured database or "Rosetta Stone" that explicitly maps all codenames to their real-world entities. This is not a forgotten spreadsheet on someone's desktop; it is a governed corporate asset.

  • Why it works for AI: You can grant your AI system secure, read-only access to this lookup key. When it encounters "Project Bluebird," it references the key, translates it to "Company X," and can then find all related documents, regardless of their codename.
  • Why it works for Security: Access to this key is strictly controlled and auditable, ensuring confidentiality remains locked down.

3. Structured Tags over Creative Tags

Stop the "creative" tagging. A tag like #ProjectMuskOx is just noise. Your AI needs a controlled vocabulary to build relationships.

  • Bad: #Munchausen #SpecialProject
  • Good: Entity:Company_X Department:Finance Analysis:Q3_Forecast

This structured data is what allows an AI to move from simple search to complex reasoning, like "Show me all Q3 forecasts for finance clients we acquired."

4. Security Through Access Control, Not Obscurity

Shift your security posture. True data protection doesn't come from hoping no one can find the file. It comes from robust access control systems (like role-based permissions) that define who can access the file, regardless of what it's called. Your IT team should be focused on permissioning (protecting the data itself) rather than validating your codenames (obscuring the data).


The Cost of Disconnection

Every time someone rebuilds a report that already exists, your organization pays more than twice: once in time, then trying to find it, then again to rebuild it.

As AI takes over more analytical heavy lifting, these invisible gaps - the mislabeled, the mislinked, the missing - become the single biggest barrier to success. In the age of inference engines, meaning isn't optional.

It’s the map.

So, here's something you can do long before you pay anyone to AI-enable your organization: Name things what they are. Because the cost of naming things stupidly isn’t just human confusion anymore: it’s machine blindness.

The Efficiency Illusion
AI Enablement 11 min read

The Efficiency Illusion

Why automating a process doesn't mean you've improved it.

By David Russell Published on Mar 23, 2026 11 minutes