Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Identity—picos represent a specific entity and KRL rulesets execute within the context of that identity
  2. Storage—picos persistently encapsulate both structured and unstructured data
  3. Open event network—picos provide an event network:
    1. As rulesets are installed and uninstalled, the salience of an event for different rules in the ruleset is automatically recorded. 
    2. The salience graph is used to automatically route events and schedule rules for execution
  4. Processing—picos run a unique set of rules based on the rulesets that have been installed
  5. Event Channels—picos have communication channels that connect them to other picos and external programs
  6. Authorization—picos manage authorization and access control for rulesets.

 

Pico Hosting Model

 

 

Event Loops

Each pico presents an event loop that handles events sent to the pico according to the rulesets that are installed in it. The following diagram shows the five phases of event evaluation. Note that evaluation is a cycle like any interpreter. The event represents the input to the interpreter that causes the cycle to happen. Once that event has been evaluated, the pico waits for another event.

...