- Limited Access – only the Essence Agent can access Powers. They are isolated from any other system resource making them protected from all known security exploits.
- Post-quantum Encryption – Powers are protected with post-quantum encryption using many different algorithms, including homomorphic encryption. The Essence Agent permutes the algorithms and creates billions of encryption keys, which applies on a granular level.
- Semantically Intelligent Access Control – Access-Rights can be described by the Owner for reading, changing ( writing ), cloning, erasing, and even “knowing the name” of any Content, whether inert data or dynamic behaviors.
There are many Power Brands that offer services, along with the Essence transformation of data to make them work as designed. An example Power-Brand is our TI994-A Emulator for the venerable 1980 Texas Instrument computer or the MAME arcade emulator for older arcade machines or Dolphin emulator for Nintendo. Each Power-Brand wraps the source code and connects “Ideas” such as input, screen & audio output, simulating time-steps, and modeling background work for the emulator. It lets us connect players to an emulator or A.I. models for actually learning/playing/testing, or means to generate videos for presentation purposes or many other tasks.
Each Power Action, which belongs to one or more of the 64 Power Categories, describes a context, such as Signals for importing images or Comms for reading controllers, all the questions that can be answered and trust-tests to verify that a specific Power Brand, such as Mozilla-JPEG-Reader vs Facebook-JPEG-Reader, does what is claims to.
Power Actions generically describe doing something, like adding two numbers or finding a name in a database, and Power Brands, which specifically provide the service to do it. Power-Actions act like an ‘interface’ along with Expression Templates ( think Mad-Libs for any given language ), and Trust Tests ( for verification ) as well as the same owernship/access-rights security, compression/encryption, and sharing that is available to any Essence Data Box.
A common and super-simple example Power-Action is “Clock”. Clock is for getting the local date and time, which may vary in results by different Power-Brands. One might use the Windows or POSIX API, another might directly read the BIOS Clock, and others might contact websites or network services, such as many of the famous time-servers, to get the answer. The Trust Tests for all of them check the time compared to other Brands and sample the clock elapsed time while using a ‘timer-counter’ ( different power than ‘local clock time’ ). Note that UTC/GMT times and various astronomy clock systems can all be used to identify the ‘local user’ time by providing a Power-Action that answers what timezone the user is in, which may or may not be correct given such a Power, and the lookup tables for various timezone settings, given Daylight Savings, etc.
An unusual and complex example Power-Action is ‘Emulator’, which simulates another computer machine, generally older PCs or Arcade Machines or embedded devices. This Power-Action, which is a member of Signal, Update, Sensor, Spatialize, Auralize, and many other Power Categories, handles startup, running, and shutdown of work to emulate another machine and manage the resources it uses in terms of memory, chips, peripherals and buses.
Each Power category can have many powers. For example, we have over a hundred powers that convert signals for media. Many of them are for movie, image and audio formats. Powers that enable security (e.g., ciphers, obfuscation, certificates, authentication, etc.) are applied as different methods that can all be partitioned for certain bits (non-consecutively) allowing different validation schemes to occur for different parts of source code and data.
This also means that products made this way are not limited to today’s technologies. Adding new Powers provides an open marketplace for rapidly responding to future needs.
The ability to dynamically weave Powers is a much more powerful and effective approach than fixed software solutions provide, including APIs and software containers.