A CIO’s Dream Come True

The biggest challenges in computing exist because our data resides, and our interactions take place on legacy approaches created when security simply was not a concern

The original computer scientists and engineers thought the world would only need a few computers and code was written by mathematicians who were more interested in easy access than secure access.

Now there are billions of connected devices, all running software with inherited benefits and flaws from the legacy of computing. There are potentially multiple looming crises within the global inventory of devices. This is the CIO’s nightmare.

Some large tech companies have repeatedly tried to move developers away from legacy tech and have failed, like Microsoft’s efforts to replace the Win32 API. It simply costs too much effort, time, money, and risk to migrate existing software, tools, chips, etc. to something new.

Until now! With wantware, rapidly try before moving over, quickly and cheaply rebuild existing functionality, and operate in a secure environment where there is transparency [via natural language], while entire classes of defects and vulnerabilities simply do not exist.

A CIO’s Dream Come True

The biggest challenges in computing exist because our data resides, and our interactions take place on legacy approaches created when security simply was not a concern

The original computer scientists and engineers thought the world would only need a few computers and code was written by mathematicians who were more interested in easy access than secure access.

Now there are billions of connected devices, all running software with inherited benefits and flaws from the legacy of computing. There are potentially multiple looming crises within the global inventory of devices. This is the CIO’s nightmare.

Some large tech companies have repeatedly tried to move developers away from legacy tech and have failed, like Microsoft’s efforts to replace the Win32 API. It simply costs too much effort, time, money, and risk to migrate existing software, tools, chips, etc. to something new.

Until now! With wantware, rapidly try before moving over, quickly and cheaply rebuild existing functionality, and operate in a secure environment where there is transparency [via natural language], while entire classes of defects and vulnerabilities simply do not exist.

Concerned about software getting hacked during updates or new code breaking old code?

Wantware for Software

Redefining Software Security & Reliability

  • Wantware is natural language descriptions that are not executable code, which means there’s no code to hack
  • Wantware can be symbolic meanings that are not executable code, but are levels of detail that coders rarely provide
  • When wantware is provided as code, it is transformed to map to natural language and symbolic meanings, which makes it understandable, predictable and controllable
  • The Essence® Agent checks wantware for arithmetic, logic, syntax, resource, code conflicts, parallelization and other errors and will not execute them

The Future of Software Updates

Wantware = Normal

Code ≠ Normal

Software updates with wantware are behavior-transparent, which reduces the chances that attempts to perform malicious acts will go undetected

Updating software with code is opaque-security, letting unauthorized acts occur through concealed means

Concerned about software getting hacked during updates or new code breaking old code?

Wantware for Software

Redefining Software Security & Reliability

  • Wantware is natural language descriptions that are not executable code
  • Wantware can be symbolic meanings that are not executable code
  • When wantware is provided as code, it is transformed to map to natural language and symbolic meanings, which makes it understandable, predictable and controllable
  • The Essence® Agent checks wantware for arithmetic, logic, syntax, resource, code conflicts, parallelization and other errors and will not execute them

The Future of Software Updates

Wantware = Normal

Code ≠ Normal

Software updates with wantware are behavior-transparent, which reduces the chances that attempts to perform malicious acts will go undetected

Updating software with code is opaque-security, letting unauthorized acts occur through concealed means

There is an abundance of evidence that there is no effective security in computing without transparency.

Why the World Needs Wantware for Better Software Security

Crises in Security

At the root of the most pressing software security crises today sits the problem of the opaqueness of code.

2020 Security Breach at Microsoft
The recently reported 2020 network security breach at Microsoft by Russian hackers  shows how even the largest corporations are vulnerable.
An Ethical Crises in Computing
The ethics challenges associated with AI, is described as “An ethical crisis in computing” by the Microsoft Research team. The increased use of AI algorithms brings new levels of software complexity resulting in unexpected biases against people of color, heightened privacy concerns, and a sense of urgency to address software-opaqueness.
Public Infrastructure Vulnerabilities
In 2020, a hacker tried to poison a Florida city’s water supply. The alarms are sounding loudly over the global infrastructure vulnerabilities that an increasingly connected world brings with its many advantages.

Why the World Needs Wantware for Better Software Security

Crises in Security

At the root of the most pressing software security crises today sits the problem of the opaqueness of code.

2020 Security Breach at Microsoft
The recently reported 2020 network security breach at Microsoft by Russian hackers  shows how even the largest corporations are vulnerable.
An Ethical Crises in Computing
The ethics challenges associated with AI, is described as “An ethical crisis in computing” by the Microsoft Research team. The increased use of AI algorithms brings new levels of software complexity resulting in unexpected biases against people of color, heightened privacy concerns, and a sense of urgency to address software-opaqueness.
Public Infrastructure Vulnerabilities
In 2020, a hacker tried to poison a Florida city’s water supply. The alarms are sounding loudly over the global infrastructure vulnerabilities that an increasingly connected world brings with its many advantages.

There is an abundance of evidence that there is no effective security in computing without transparency.

Bringing Software Into the 21st Century

Getting existing and even new applications to fully leverage the latest advances in hardware, such as GPU acceleration, are challenges that are difficult to address without untethering from legacy approaches.

Wantware, powered by Essence®, is the ultimate enabler for moving software into a new era of computing without throwing away the billions of lines of code that have already been written. Turning existing software into wantware offers an unprecedented set of benfits.

It has historically been a difficult proposition to get engineers to learn a new lexicon and organizations to adopt it. There are typically significant costs and risks associated with adopting a new lexicon. We understand that and have taken it into consideration.
With Essence®, engineers don’t have to change their lexicon. Engineers can keep using their current lexicon and we map it into our new one. The advantages of creating wantware versions of existing applications and systems are many. Here is a subset of core capabilities that become available when software becomes wantware.

A Bridge Worth Crossing

Parallel Code Generation
Wantware unlocks the ability for applications and systems to achieve parallel processing on CPUs and GPUs at unrivaled levels of performance and efficiency in the software industry.
Natural Language Dialog
Turning existing applications and systems into wantware allows them to be modified with natural language dialog in real-time.
Visual Programming
Software converted to wantware becomes as easy to modify as drag-n-drop, but with control that goes well beyond app builders that use code libraries.
Real-time Sensory Synchronization
With wantware, use an automatic-tuning approach to balance sensory-quality (such as visual detail or audio fidelity) with responsiveness to user input and latency of changes.
Translatable Data Structures
Wantware uses Translatable Data Structures to map the same data groups to many different chunks of code as well as the ability to profile and regenerate the actual implementation, its algorithmic units (conventional or AI), and the final machine instructions on the fly.
Meaning Based Computing
Using a semantic periodic chart for computing, wantware provides unprecedented access to the fullness of what computing can do, including AI/Machine Learning, Neural Networks, and any other computing approach.
Fully Homomorphic Encryption
A homomorphic approach is applied to sections of code; they are only decoded in blocks when needed and are never decoded at rest or in transit, making it significantly more challenging to rebuilding the entire puzzle of source code.
Platform Agnostic Computing
Use wantware to access 64 interfaces that cover all possible ways that an Essence® Agent can process source code from developers for any hardware device, service, computing platform (e.g. drivers, APIs, emulators, browser engines, virtual machines, operating systems, media types, network protocols, databases, etc.), data and all inputs
The Semantic Web
We have a system to capture meanings and find similar meaning expressions in other languages, styles of speech or personalization. The system enables semantic search and the ability to understand, tweak, edit, and create on the web without the limitations of learning how to code. Soon, any natural language will do to become a creator, not just a user of the web.

Wantware, the Missing Link in Computing

With Essence®, MindAptiv ushers in an entirely new era of software that adapts to the runtime environment, and inputs from developers and users by auto-generating exponentially more powerful code on demand. MindAptiv empowers everyone, not just coders, to understand, tweak, edit, and create machine behaviors with wantware. Over two decades of research and 10 years of dedicated development, have resulted in capabilities that are previously unheard of.

Essence-based apps/Aptivs can run on existing supported platforms, currently Mac OS X, and soon on Windows, Android, iOS and Linux. Once a platform has an Agent, all Aptivs run on that newly supported platform. In the future, Essence® will run without an OS, using Agents measured in kilobytes. Essence® is designed to adaptively optimize the computing resources wherever it runs. As long as there is an Agent and platform-specific code (e.g. APIs, drivers, file support, and other required code), Essence® offers a wide range of unique [patented] advantages over alternative approaches.

A Paradigm Shift

Diversity
Making it easier for the nearly 8 billion people in the world to become creators, not just users of software
Simplicity
Instead of using programming languages or templates that limit creating software, anyone can understand, tweak, edit and create with words
Security
All chunks of data and code have a Guard, which manages access, trust, security and a means to Synchronize and Coalesce changes reading-the-correct-values-at-the-correct-time
Quality
The ability to generate code eliminates entire classes of errors that coders create
Space
Accelerating performance using Essence offers an unprecedented opportunity to reduce space requirements for IT by as much as 80% for the same performance
Time
Create software in hours, days or weeks that would otherwise take months or years. Modify/tweak software in real-time
Energy
Reduce energy consumed by computing devices by as much as 80%
Scalability
Expanding the ability of more people to quickly understand, tweak, edit and create software offers a new level of scalability beyond any other approach to date
Interoperability
Turn any source code (e.g., APIs, drivers, media formats, emulators, AI algorithms, etc.) into digital equivalents of Lego® Bricks that can be hot-swapped in and out of memory, as needed
Maintainability
The wantware process captures meanings expressed as words or choices from menus/lists for generating code, reducing the need to maintain code
Adaptability
All of the generated code in Essence-based apps is automatically optimized for the computing environment and developer/user wants
Agility
Rapidly and easily achieve High Performance Computing (HPC) in homes, cars, airplanes, schools, cloud, edge, space and where the most data intensive business and scientific applications reside [at exascale and quantum]

3 Powerful Essence® Solutions

Chameleon®

A tool for ingesting and transforming text or code. Modify and export transformed text or code or run it as Essence® powered software.

Morpheus®

A platform that allows Essence® tools and applications to run on existing operating systems like MacOS, with Android, iOS, Linux and Windows versions coming soon.

Essence® Noir

Run Essence® as an appliance and create software without an operating system. Use Chameleon® and Morpheus® to run software built for supported OSes.

3 Powerful Essence® Solutions

Chameleon®

A tool for ingesting and transforming text or code. Modify and export transformed text or code or run it as Essence® powered software.

Morpheus®

A platform that allows Essence® tools and applications to run on existing operating systems like MacOS, with Android, iOS, Linux and Windows versions coming soon.

Essence® Noir

Run Essence® as an appliance and create software without an operating system. Use Chameleon® and Morpheus® to run software built for supported OSes.

Use Cases

Jewel Web Browser

Accelerating support for every language on the planet and enabling communities to create software solutions without writing code.

Learn More

i8 Teleport

Connecting people and communities around the world, with high resolution video and audio over low-speed connections.

Learn More

illumin8

A new generation of video and editing software that combines many different AI algorithms to deliver a wide range of quality and editing improvements.

Learn More

The Gem (Basic)

The first green modular computer that is simple to combine/unify to meet changing needs. The AI-powered OS inside makes it a computer made for the 21ST century.

Learn More

The Gem Pro

Designed for the prosumer, the Gem Pro will have higher performance capabilities and an SDK for creating a new generation of no code/low code software products.

Learn More

The Gem Super

Enables building the greenest and most powerful conventional computing systems at lower cost, space, energy, and maintenance costs.

Learn More

The Technology Inside the Gem

Pivotal Innovation

3 solutions to choose from for alignment with your business needs. Essence technology is designed to address legacy, current and future computing needs.

Learn More

Wantware

A new approach to computing that combines human expressed wants with semantic units to generate highly efficient machine-level code in real-time.

Learn More

Essence Elements – e2

A new curated semantic unit ontology for mapping meaning to machine behaviors. e2 has been refined over 7 years to cover the fullness of what computing can do.

Learn More

3 Essence Solutions

New set of options for modernizing legacy systems, adding powerful software to existing platforms, and transcending legacy computing.

Learn More

A Deeper Dive

As we discuss our technology with engineers, we will post answers to their questions on our website. We look forward to sharing more about our approach.

Learn More

Past, Present, Future

3 Solutions for improvements in current legacy code, current generation platforms, and delivering the era of computing when computers are much more like appliances.

Learn More
Contact Us for Investment & Partnering Enquiries