1.1 – Track Powers
Enables recording of changes, the ability to replay critical system failures and critical messaging. Includes black box priority levels, host powers, media exports, tables, forms, and sharing data.
1.2 – Analyze Powers
Enables examining existing behaviors for analysis, assistance, and warnings. Includes coding conventions, debugging, design, future speculation, memes, estimates, project management, and psychology.
1.3 – Instruct Powers
Enables generation of instructions for a given chip architecture, security agreements, and operating system calling conventions. Includes preprocessors, atomics, speedups/optimizers, compilers, assemblers, linkers, debuggers, profilers, disassemblers, and analyzers.
1.4 – Kernel Powers
Enables low-level kernel activity of the underlying operating system and any unique conventions it offers. Kernel enables privacy controls, security guarding, and appropriate accessing of OS-level changes or user accounts such as file locations, contacts, events, and other user authorized data.
1.5 – Shell Powers
Enables high-level user activity of the underlying operating system. Includes notifications, menus, windows or panels, submissions of behavior, media production, message passing interfaces, and conformance behaviors.
1.6 – Engine Powers
Enables management and throttling of tasks for our platform, the resources requested, and load balancing everything requested by the user. Includes core threading or multitask models, parallel scheduling, and memory models for read/write of cached RAM, direct RAM (like HP), transactional or quantum units.
1.7 – Produce Powers
Enables marketing, packaging, user analytics, and other activities related to shipping products. Includes logos, ratings, feedback, strategy, shipping, analytics, and memes.
1.8 – Assist Powers
Enables mid-level shell activity of running other programs, including installers, scripts, tools, and general modification of data used by other programs or the operating system.
Assist obeys operating system requirements, a user’s wishes, and any additional complexities. Includes accessing dynamically loaded code, certificates, profiles, codesigning, packaging, install locations, and metadata.