The Essence Powers System – Lego® Bricks for Data and Code

Primary Benefits of Powers
- Composable – a way to easily mix and combine source code, like Lego Bricks, in real-time. Any source code can become fully integrated into the runtime experience, in a trust-verified way, which goes well beyond the ability of APIs to pass communications between applications.
- Hot-swappable – move powers in/out of memory for efficient use of resources and improved security.
- Transformable – combine powers with a large and growing number of real-time transforms made from ephemeral regenerative machine instructions that are automatically tuned, synced and scaled.
- Self-optimizing – regenerative machine instructions (assembly for CPUs and GPUs, computer kernels, shader, etc.) are self-optimized (both serial and parallel executable jobs) for performance, quality, energy efficiency, network latency, and adapting to choices at the user-level.
- Modularity – organized into 64 categories with 8 families and 8 subsystems that are compressed (using multi-stage compression). Unlike software containers, different versions of Powers can coexist and be applied on-demand, within the same space.
- Trust-certified – unit tested, context constrained, authenticated (code-signed), and run-time verified for a new level of security and trust.
Security Factors
- Limited Access – only the Essence Agent can access Powers. They are isolated from any other system resource making them protected from all known security exploits.
- Post-quantum Encryption – Powers are protected with post-quantum encryption using many different algorithms, including homomorphic encryption. The Essence Agent permutes the algorithms and creates billions of encryption keys, which applies on a granular level. Newly available algorithms (e.g. as approved post-quantum algorithms are made available) can be added to the recipe of multiple algorithms that make up a weave of algorithms packaged as Guard Powers (see Powers Category 02: Organize Powers – Guard, below).
- Semantically Intelligent Access Control – Access-Rights can be described by the Owner for reading, changing ( writing ), cloning, erasing, and even “knowing the name” of any Content, whether inert data or dynamic behaviors.
Power Brands
There are many Power Brands that offer services, along with the Essence transformation of data to make them work as designed. An example Power Brand is our TI994-A Emulator for the venerable 1980 Texas Instrument computer or the MAME arcade emulator for older arcade machines or Dolphin emulator for Nintendo. Each Power Brand wraps the source code and connects “Ideas” such as input, screen & audio output, simulating time-steps, and modeling background work for the emulator. It lets us connect players to an emulator or A.I. models for actually learning/playing/testing, or means to generate videos for presentation purposes or many other tasks.
Power Actions
Each Power Action, which belongs to one or more of the 64 Power Categories, describes a context, such as Signals for importing images or Comms for reading controllers, all the questions that can be answered and trust-tests to verify that a specific Power Brand, such as Mozilla-JPEG-Reader vs Facebook-JPEG-Reader, does what is claims to.
Power Actions generically describe doing something, like adding two numbers or finding a name in a database, and Power Brands, which specifically provide the service to do it. Power Actions act like an ‘interface’ along with Expression Templates ( think of filling in the blanks with fitting-words/matching terms ), and Trust Tests ( for verification ) as well as the same ownernship/access-rights security, compression/encryption, and sharing that is available to any Essence Data Box.
A common and super-simple example Power Action is “Clock”. Clock is for getting the local date and time, which may vary in results by different Power Brands. One might use the Windows or POSIX API, another might directly read the BIOS Clock, and others might contact websites or network services, such as many of the famous time-servers, to get the answer. The Trust Tests for all of them check the time compared to other Power Brands and sample the clock elapsed time while using a ‘timer-counter’ ( different power than ‘local clock time’ ). Note that UTC/GMT times and various astronomy clock systems can all be used to identify the ‘local user’ time by providing a Power Action that answers what timezone the user is in, which may or may not be correct given such a Power, and the lookup tables for various timezone settings, given Daylight Savings, etc.
An unusual and complex example Power Action is ‘Emulator’, which simulates another computer machine, generally older PCs or arcade machines or embedded devices. This Power Action, which is a member of Signal, Update, Sensor, Spatialize, Auralize, and many other Power Categories, handles startup, running, and shutdown of work to emulate another machine and manage the resources it uses in terms of memory, chips, peripherals and buses.
Power Categories
Each Power Category can have many Powers. For example, we have over a hundred Powers that convert signals for media. Many of them are for movie, image and audio formats. Powers that enable security (e.g., ciphers, obfuscation, certificates, authentication, etc.) are applied as different methods that can all be partitioned for certain bits (non-consecutively) allowing different validation schemes to occur for different parts of source code and data.
This also means that products made this way are not limited to today’s technologies. Adding new Powers provides an open marketplace for rapidly responding to future needs.
The ability to dynamically weave Powers is a much more powerful and effective approach than fixed software solutions provide, including APIs and software containers.
Example: Packaging and processing a new device driver.
Ditto Maker
(Used by Engineers to create Powers)
- Unit Testing
- Qualified Compiling
- Post-quantum encryption
- Multi-stage compression
- Code-signing
- Security Hardening
- Runtime Verification
- Integrated Behaviors

Products in Development