The Essence Powers SystemKen2022-07-28T17:31:10+00:00
The Essence Powers System – Lego® Bricks for Data and Code
Introduction to the EPS
The EPS has 64 Powers Categories organized into 8 Families each with 8 Powers Subsystems that cover all possible ways that an Essence Agent can process native source code for any device, service, computing platform (e.g. AI algorithms, drivers, APIs, emulators, browser engines, virtual machines, operating systems, media types, network code, databases, etc.), all inputs and outputs. Powers are a way to make source code composable (mix and combine machine behaviors), like Lego Bricks. The Agent combines Powers with its own regenerative machine instructions to create customizable, adaptable, and highly-scalable experiences, in real-time.
There are many Power Brands that offer services, along with the Essence transformation of data to make them work as designed. An example Power-Brand is our TI994-A Emulator for the venerable 1980 Texas Instrument computer or the MAME arcade emulator for older arcade machines or Dolphin emulator for Nintendo. Each Power-Brand wraps the source code and connects WantWare “Ideas” such as input, screen & audio output, simulating time-steps, and modeling background work for the emulator. It lets us connect players to an emulator or A.I. models for actually learning/playing/testing, or means to generate videos for presentation purposes or many other tasks.
Each Power Action, which belongs to one or more of the 64 Power Categories, describes a context, such as Signals for importing images or Comms for reading controllers, all the questions that can be answered and trust-tests to verify that a specific Power Brand, such as Mozilla-JPEG-Reader vs Facebook-JPEG-Reader, does what is claims to.
Power Actions generically describe doing something, like adding two numbers or finding a name in a database, and Power Brands, which specifically provide the service to do it. Power-Actions act like an ‘interface’ along with Expression Templates ( think Mad-Libs for any given language ), and Trust Tests ( for verification ) as well as the same owernship/access-rights security, compression/encryption, and sharing that is available to any Essence Data Box.
A common and super-simple example Power-Action is “Clock”. Clock is for getting the local date and time, which may vary in results by different Power-Brands. One might use the Windows or POSIX API, another might directly read the BIOS Clock, and others might contact websites or network services, such as many of the famous time-servers, to get the answer. The Trust Tests for all of them check the time compared to other Brands and sample the clock elapsed time while using a ‘timer-counter’ ( different power than ‘local clock time’ ). Note that UTC/GMT times and various astronomy clock systems can all be used to identify the ‘local user’ time by providing a Power-Action that answers what timezone the user is in, which may or may not be correct given such a Power, and the lookup tables for various timezone settings, given Daylight Savings, etc.
An unusual and complex example Power-Action is ‘Emulator’, which simulates another computer machine, generally older PCs or Arcade Machines or embedded devices. This Power-Action, which is a member of Signal, Update, Sensor, Spatialize, Auralize, and many other Power Categories, handles startup, running, and shutdown of work to emulate another machine and manage the resources it uses in terms of memory, chips, peripherals and buses.
Each Power category can have many powers. For example, we have over a hundred powers that convert signals for media. Many of them are for movie, image and audio formats. Powers that enable security (e.g., ciphers, obfuscation, certificates, authentication, etc.) are applied as different methods that can all be partitioned for certain bits (non-consecutively) allowing different validation schemes to occur for different parts of source code and data.
This also means that products made this way are not limited to today’s technologies. Adding new Powers provides an open marketplace for rapidly responding to future needs.
The ability to dynamically weave Powers is a much more powerful and effective approach than fixed software solutions provide, including APIs and software containers.
Powers are Inside of Aptivs
Our version of applications, Aptivs, are made from Powers, Skills, Atoms, and wantverses (information needed to create customizable worlds), which are all processed by the Agent and combined with its own regenerative machine instructions in real-time. This is a major leap forward for the software industry and its users in numerous ways.
Note: See the Essence Agent to learn more about regenerative machine instructions and the Aptivs page to learn more about wantverses.
Example: Packaging and processing a new device driver.
Source Code Packaging
The new driver is packaged as binaries for each supported platform (e.g., Android, iOS, Linux, macOS, and Windows) using the Ditto Maker.
Source Code Processing
The Aptiv on the host device processes the binaries, hot swapping them in/out of memory on-demand.
Live Updating & Coexistence
Updating and adding new Powers does not require reboots. Different versions of features can coexist, giving users unprecedented control.
(Used by Engineers to create Powers)
Big Wins for the Open-source Movement
See the Ditto Maker to learn how it is used by engineers to package Powers so that they become the digital equivalents of Lego® Bricks. It’s about much more than connecting Powers. They are certified packages of code combined with Essence Atoms for meaning representation, which allows the Essence Agent to know what the intent of the code is and to limit what can be done with source code accordingly.
Powers are inserted into memory on-demand and removed after they are used. This provides a big advantage over approaches that load code into memory at boot up, wasting memory and making code vulnerable to security exploits.
The Agent is also able to detect when Powers have been altered. The fact that Powers are post-quantum encrypted and isolated from anything else in the system, increases the ability to trust that a given Power is hardened against exploits. This is a game changer.
Imagine what this approach means for the billions of lines of code in open-source libraries and trillions of lines of legacy code in operational systems. The term “open” becomes the reality when the 99% of the people in the world who don’t know how to code can safely make their own solutions to problems. Perhaps more importantly, Powers are a way to package legacy code so that it becomes far easier to maintain, to establish trust that the code will function as intended, as well as making code less vulnerable to security exploits.
Primary Benefits of Powers
Composable – a way to easily mix and combine source code, like Lego Bricks, in real-time. Any source code can become fully integrated into the runtime experience, in a trust-verified way, which goes well beyond the ability of APIs to pass communications between applications.
Hot-swappable – move powers in/out of memory for efficient use of resources and improved security.
Transformable – combine powers with a large and growing number of real-time transforms made from ephemeral regenerative machine instructions that are automatically tuned, synced and scaled.
Self-optimizing – regenerative machine instructions (assembly for CPUs and GPUs, computer kernels, shader, etc.) are self-optimized (both serial and parallel executable jobs) for performance, quality, energy efficiency, network latency, and adapting to choices at the user-level.
Modularity – organized into 64 categories with 8 families and 8 subsystems that are compressed (using multi-stage compression). Unlike software containers, different versions of Powers can coexist and be applied on-demand, within the same space.
Trust-certified – unit tested, context constrained, authenticated (code-signed), and run-time verified for a new level of security and trust.
Limited Access – only the Essence Agent can access Powers. They are isolated from any other system resource making them protected from all known security exploits.
Post-quantum Encryption – Powers are protected with post-quantum encryption using many different algorithms, including homomorphic encryption. The Essence Agent permutes the algorithms and creates billions of encryption keys, which applies on a granular level.
Semantically Intelligent Access Control – Access-Rights can be described by the Owner for reading, changing ( writing ), cloning, erasing, and even “knowing the name” of any Content, whether inert data or dynamic behaviors.
Unlike the Agent’s Core Powers, these Powers are not needed at boot up and are loaded, by the Agent, only when needed and unloaded when not in use. Hot swapping Powers brings new levels of efficiency and security to computing.
Powers Category 01: Govern Powers
The Govern Powers Subsystems manage work such as Host-Computer operations, Data-Processing tasks, Conditional evaluations, and resource balancing services.
Enables generation of instructions for a given chip architecture, security agreements, and operating system calling conventions. Includes preprocessors, atomics, speedups/optimizers, compilers, assemblers, linkers, debuggers, profilers, disassemblers, and analyzers.
Enables Involuntary, Automated OS Components. Server or OS-Kernel domains enable low-level kernel activity of the underlying operating system and any unique conventions it offers. Host enables privacy controls, security guarding, and appropriate accessing of OS-level changes or user accounts such as file locations, contacts, events, and other user authorized data.
Voluntary, Manually Configurable OS Components. Client or OS-Shell domains enable high-level user activity of underlying operating system. Includes notifications, menus, windows or panels, submissions of behavior, media production, message passing interfaces, and conformance behaviors.
Enables management and throttling of tasks for our platform, the resources requested, and load balancing everything requested by the user. Includes core threading or multitask models, parallel scheduling, and memory models for read/write of cached RAM, direct RAM (like HP), transactional or quantum units.
Serve uses existing blackbox programs or services, whether bundled with the OS or user installed, as external tools without direct access. Serve enables mid-level shell activity of running other programs, including installers, scripts, utilities, and general modification of data used by other programs or the operating system.
Serve obeys operating system requirements, a user’s wishes, and any additional complexities. Includes accessing dynamically loaded code, certificates, profiles, codesigning, packaging, install locations, and metadata. Project^Hrx7_Trz may use Serve^Hrz7_Kru to sync changes and follow dependencies.
Powers Category 02: Organize Powers
The Organize Powers enable data processing such as access, locations, re-orderings, and translations of data.
Enables creating, verifying and accessing any versions of any powers enabled on this platform. Includes generating Essence Powers source files, makefiles, and other processing of project and wantverse (an Essence® world instance) materials.
Computer are multiple devices enabling access to computing capabilities of any kind, such as wearables, laptops, mainframes, robots, drones, appliances, etc. These powers include communicating with all machines capable of functioning independently and scheduling their own tasks.
Enables translation between external data formats and network protocols, separate from the Store approach.
Powers Category 04: Simulate Powers
The Simulate Powers enable simulation processing as changes to a container of data following rules, styles, and other behaviors. Simulate represents the fidelity tradeoffs for simulating events in a Spacetime.
Run a simulation’s update as a step in time. Includes software and hardware emulation running former or imagined computer hardware, video game consoles, operating system configurations, virtual machines, web browsers, or other software applications as interfaces.
Manufacture experiences structures, connects, and balances a variation of simulations to produce a coherent experience. Compose requires modeling systems that are enables making and modifying related possibilities in a simulation.
Editing covers the add, modify, and remove cycles for a domain of data, such as database editing, scene placement, stage directions, or presentation crafting. Note that text-editing/word-processing occurs here for the atomic units of text/words/documents but the specifics of text, as symbol-streams, is handled by Symbolize.
Powers Category 05: Symbolize Powers
The Symbolize Powers enable symbolic processing, such as linguistic, cultural, and database processing.
Symbolize is primarily text formatting, pattern-matching, cultural conversions, and lexical conventions.
Seme enables semantic processing using semiotic rules for relating differing ontologies. This represents human ideas as data and attempt to capture as much personalized detail as possible with the least amount of ambiguity
Translate enables cultural and language mappings, processing, and storing of conventions for translations. Translate covers interpreting various user conventions, preferences and rules. Cultural processing.
Scribe generates cultural symbols, such as text and the variously combined glyphs and rules to use them. Scribe collections may contain icons, sprites, fonts, phoneme clips, or even analog handwriting.
Culture enables traditions, conventions and time planning, such as organizing calendars in different locales and fitting time slots, milestones, and other event staging activities. Note that something like an address book of contacts is accessed via a Portal^Hra6_Ku as its a database, but how you interact with each contact in terms of communication style and question-choices, is culture.
Handles how to convert meaning into the appropriate context with formatting and levels of detail.
Powers Category 06: Calculate Powers
The Calculate Powers enable numerical processing, such as formulas, solvers, generation of randomness, physics simulations, and navigation. Calculate is designed to handle data accuracy and solution selections.
Enables field processing math equations across dimensions of streams of numbers.
Powers Category 07: Temporalize Powers
The Temporalize Powers enable numerical processing, such as formulas, solvers, generation of randomness, physics simulations, and navigation. Temporalize is designed to handle data changing most significantly in time.
Responsible for evaluating tradeoffs in performance and quality.
Powers Category 08: Spatialize Powers
Enables spatial processing, such as visual creations, light propagation, sight recognition, and mapping database information to graphical models. Designed to handle data changing most significantly in space.