Changes for page Requirements
Last modified by Robert Schaub on 2025/12/24 20:34
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Parent
-
... ... @@ -1,1 +1,1 @@ 1 -FactHarbor.Specification.WebHome 1 +FactHarbor.Archive.FactHarbor V0\.9\.18.Specification.WebHome - Content
-
... ... @@ -1,91 +1,682 @@ 1 1 = Requirements = 2 2 3 -This chapterdefinestherequirements for FactHarbor.3 +This page defines **Roles**, **Responsibilities**, and **Rules** for contributors and users of FactHarbor. 4 4 5 -== UserRoles ==5 +== Roles == 6 6 7 7 === Reader === 8 -* **Responsibilities**: Browse, search, view scenarios/verdicts, flag issues. 9 -* **Permissions**: Read-only access. 10 -* **Limitations**: Cannot change content. 11 11 9 +**Who**: Anyone (no login required). 10 + 11 +**Can**: 12 + 13 +* Browse and search claims 14 +* View scenarios, evidence, verdicts, and timelines 15 +* Compare scenarios and explore assumptions 16 +* Flag issues, errors, contradictions, or suspicious patterns 17 +* Use filters, search, and visualization tools 18 +* Create personal views (saved searches, bookmarks - local browser storage) 19 +* **Submit claims automatically** by providing text to analyze - new claims are added automatically unless equal claims already exist in the system 20 + 21 +**Cannot**: 22 + 23 +* Modify existing content 24 +* Access draft content 25 +* Participate in governance decisions 26 + 27 +**Note**: Readers can request human review of AI-generated content by flagging it. 28 + 12 12 === Contributor === 13 -* **Responsibilities**: Submit claims, draft scenarios, attach evidence. 14 -* **Permissions**: Create/Edit drafts, comment. 15 -* **Limitations**: Cannot publish without review. 16 16 31 +**Who**: Registered and logged-in users (extends Reader capabilities). 32 + 33 +**Can**: 34 + 35 +* Everything a Reader can do 36 +* Submit claims 37 +* Submit evidence 38 +* Provide feedback 39 +* Suggest scenarios 40 +* Flag content for review 41 +* Request human review of AI-generated content 42 + 43 +**Cannot**: 44 + 45 +* Publish or mark content as "reviewed" or "approved" 46 +* Override expert or maintainer decisions 47 +* Directly modify AKEL or quality gate configurations 48 + 17 17 === Reviewer === 18 -* **Responsibilities**: Validate contributions, check consistency. 19 -* **Permissions**: Change status to "Published" or "Rejected". 20 20 21 -=== Expert === 22 -* **Responsibilities**: Domain-specific judgment, refine assumptions. 23 -* **Permissions**: Attach expert annotations, propose re-evaluation. 51 +**Who**: Trusted community members, appointed by maintainers. 24 24 53 +**Can**: 54 + 55 +* Review contributions from Contributors and AKEL drafts 56 +* Validate AI-generated content (Mode 2 → Mode 3 transition) 57 +* Edit claims, scenarios, and evidence 58 +* Add clarifications or warnings 59 +* Change content status: `draft` → `in review` → `published` / `rejected` 60 +* Approve or reject **Tier B and C** content for "Human-Reviewed" status 61 +* Flag content for expert review 62 +* Participate in audit sampling 63 + 64 +**Cannot**: 65 + 66 +* Approve Tier A content for "Human-Reviewed" status (requires Expert) 67 +* Change governance rules 68 +* Unilaterally change expert conclusions without process 69 +* Bypass quality gates 70 + 71 +**Note on AI-Drafted Content**: 72 + 73 +* Reviewers can validate AI-generated content (Mode 2) to promote it to "Human-Reviewed" (Mode 3) 74 +* For Tier B and C, Reviewers have approval authority 75 +* For Tier A, only Experts can grant "Human-Reviewed" status 76 + 77 +=== Expert (Domain-Specific) === 78 + 79 +**Who**: Subject-matter specialists in specific domains (medicine, law, science, etc.). 80 + 81 +**Can**: 82 + 83 +* Everything a Reviewer can do 84 +* **Final authority** on Tier A content "Human-Reviewed" status 85 +* Validate complex or controversial claims in their domain 86 +* Define domain-specific quality standards 87 +* Set reliability thresholds for domain sources 88 +* Participate in risk tier assignment review 89 +* Override AKEL suggestions in their domain (with documentation) 90 + 91 +**Cannot**: 92 + 93 +* Change platform governance policies 94 +* Approve content outside their expertise domain 95 +* Bypass technical quality gates (but can flag for adjustment) 96 + 97 +**Specialization**: 98 + 99 +* Experts are domain-specific (e.g., "Medical Expert", "Legal Expert", "Climate Science Expert") 100 +* Cross-domain claims may require multiple expert reviews 101 + 102 +=== Auditor === 103 + 104 +**Who**: Reviewers or Experts assigned to sampling audit duties. 105 + 106 +**Can**: 107 + 108 +* Review sampled AI-generated content against quality standards 109 +* Validate quality gate enforcement 110 +* Identify patterns in AI errors or hallucinations 111 +* Provide feedback for system improvement 112 +* Flag content for immediate review if errors found 113 +* Contribute to audit statistics and transparency reports 114 + 115 +**Cannot**: 116 + 117 +* Change audit sampling algorithms (maintainer responsibility) 118 +* Bypass normal review workflows 119 +* Audit content they personally created 120 + 121 +**Selection**: 122 + 123 +* Auditors selected based on domain expertise and review quality 124 +* Rotation to prevent audit fatigue 125 +* Stratified assignment (Tier A auditors need higher expertise) 126 + 127 +**Audit Focus**: 128 + 129 +* Tier A: Recommendation 30-50% sampling rate, expert auditors 130 +* Tier B: Recommendation 10-20% sampling rate, reviewer/expert auditors 131 +* Tier C: Recommendation 5-10% sampling rate, reviewer auditors 132 + 25 25 === Moderator === 26 -* **Responsibilities**: Handle abuse, spam, and manipulation. 27 -* **Permissions**: Hide content, ban users. 28 28 29 -=== Maintainer / Administrator === 30 -* **Responsibilities**: Node config, security, role assignment. 31 -* **Permissions**: System configuration. 135 +**Who**: Maintainers or trusted long-term contributors. 32 32 33 -=== AKEL (AI) === 34 -* **Responsibilities**: Propose drafts, normalize, classify. 35 -* **Permissions**: Create machine-generated drafts. 36 -* **Limitations**: Never publishes without human approval. 137 +**Can**: 37 37 38 -== Functional Requirements == 139 +* All Reviewer and Expert capabilities (cross-domain) 140 +* Manage user accounts and permissions 141 +* Handle disputes and conflicts 142 +* Enforce community guidelines 143 +* Suspend or ban abusive users 144 +* Finalize publication status for sensitive content 145 +* Review and adjust risk tier assignments 146 +* Oversee audit system performance 39 39 40 -=== Claim Intake & Normalization === 41 -* **FR1**: Support text, URL, document input. 42 -* **FR2**: Normalize wording while preserving original. 43 -* **FR3**: Classify by domain/type. 44 -* **FR4**: Cluster similar claims. 148 +**Cannot**: 45 45 46 -=== Scenario System === 47 -* **FR5**: Create scenarios linked to clusters. 48 -* **FR6**: Require Definitions, Assumptions, Boundaries. 49 -* **FR7**: Full versioning. 50 -* **FR8**: Side-by-side comparison. 150 +* Change core data model or architecture 151 +* Override technical system constraints 152 +* Make unilateral governance decisions without consensus 51 51 52 -=== Evidence Management === 53 -* **FR9**: Ingest external sources. 54 -* **FR10**: Assess reliability/quality. 55 -* **FR11**: Link evidence to multiple scenarios. 154 +=== Maintainer === 56 56 57 -=== Verdicts & Truth Landscape === 58 -* **FR12**: Likelihood-based verdicts **per scenario**. 59 -* **FR13**: Aggregate into Truth Landscape. 60 -* **FR14**: Show evolution over time. 156 +**Who**: Core team members responsible for the platform. 61 61 62 -=== Workflow & Audit === 63 -* **FR15**: Draft -> Review -> Publish states. 64 -* **FR16**: Moderation tools. 65 -* **FR17**: Full audit trail. 158 +**Can**: 66 66 160 +* All Moderator capabilities 161 +* Change data model, architecture, and technical systems 162 +* Configure quality gates and AKEL parameters 163 +* Adjust audit sampling algorithms 164 +* Set and modify risk tier policies 165 +* Make platform-wide governance decisions 166 +* Access and modify backend systems 167 +* Deploy updates and fixes 168 +* Grant and revoke roles 169 + 170 +**Governance**: 171 + 172 +* Maintainers operate under organizational governance rules 173 +* Major policy changes require Governing Team approval 174 +* Technical decisions made collaboratively 175 + 176 +---- 177 + 178 +== Content Publication States == 179 + 180 +=== Mode 1: Draft === 181 + 182 +* Not visible to public 183 +* Visible to contributor and reviewers 184 +* Can be edited by contributor or reviewers 185 +* Default state for failed quality gates 186 + 187 +=== Mode 2: AI-Generated (Published) === 188 + 189 +* **Public** and visible to all users 190 +* Clearly labeled as "AI-Generated, Awaiting Human Review" 191 +* Passed all automated quality gates 192 +* Risk tier displayed (A/B/C) 193 +* Users can: 194 +** Read and use content 195 +** Request human review 196 +** Flag for expert attention 197 +* Subject to sampling audits 198 +* Can be promoted to Mode 3 by reviewer/expert validation 199 + 200 +=== Mode 3: Human-Reviewed (Published) === 201 + 202 +* **Public** and visible to all users 203 +* Labeled as "Human-Reviewed" with reviewer/expert attribution 204 +* Passed quality gates + human validation 205 +* Highest trust level 206 +* For Tier A, requires Expert approval 207 +* For Tier B/C, Reviewer approval sufficient 208 + 209 +=== Rejected === 210 + 211 +* Not visible to public 212 +* Visible to contributor with rejection reason 213 +* Can be resubmitted after addressing issues 214 +* Rejection logged for transparency 215 + 216 +---- 217 + 218 +== Contribution Rules == 219 + 220 +=== All Contributors Must: === 221 + 222 +* Provide sources for claims 223 +* Use clear, neutral language 224 +* Avoid personal attacks or insults 225 +* Respect intellectual property (cite sources) 226 +* Accept community feedback gracefully 227 + 228 +=== AKEL (AI) Must: === 229 + 230 +* Mark all outputs with `AuthorType = AI` 231 +* Pass quality gates before Mode 2 publication 232 +* Perform mandatory contradiction search 233 +* Disclose confidence levels and uncertainty 234 +* Provide traceable reasoning chains 235 +* Flag potential bubbles or echo chambers 236 +* Submit to audit sampling 237 + 238 +=== Reviewers Must: === 239 + 240 +* Be impartial and evidence-based 241 +* Document reasoning for decisions 242 +* Escalate to experts when appropriate 243 +* Participate in audits when assigned 244 +* Provide constructive feedback 245 + 246 +=== Experts Must: === 247 + 248 +* Stay within domain expertise 249 +* Disclose conflicts of interest 250 +* Document specialized terminology 251 +* Provide reasoning for domain-specific decisions 252 +* Participate in Tier A audits 253 + 254 +---- 255 + 256 +== Quality Standards == 257 + 258 +=== Source Requirements === 259 + 260 +* Primary sources preferred over secondary 261 +* Publication date and author must be identifiable 262 +* Sources must be accessible (not paywalled when possible) 263 +* Contradictory sources must be acknowledged 264 +* Echo chamber sources must be flagged 265 + 266 +=== Claim Requirements === 267 + 268 +* Falsifiable or evaluable 269 +* Clear definitions of key terms 270 +* Boundaries and scope stated 271 +* Assumptions made explicit 272 +* Uncertainty acknowledged 273 + 274 +=== Evidence Requirements === 275 + 276 +* Relevant to the claim and scenario 277 +* Reliability assessment provided 278 +* Methodology described (for studies) 279 +* Limitations noted 280 +* Conflicting evidence acknowledged 281 + 282 +---- 283 + 284 +== Risk Tier Assignment == 285 + 286 +**Automated (AKEL)**: Initial tier suggested based on domain, keywords, impact 287 +**Human Validation**: Moderators or Experts can override AKEL suggestions 288 +**Review**: Risk tiers periodically reviewed based on audit outcomes 289 + 290 +**Tier A Indicators**: 291 + 292 +* Medical diagnosis or treatment advice 293 +* Legal interpretation or advice 294 +* Election or voting information 295 +* Safety or security sensitive 296 +* Major financial decisions 297 +* Potential for significant harm 298 + 299 +**Tier B Indicators**: 300 + 301 +* Complex scientific causality 302 +* Contested policy domains 303 +* Historical interpretation with political implications 304 +* Significant economic impact claims 305 + 306 +**Tier C Indicators**: 307 + 308 +* Established historical facts 309 +* Simple definitions 310 +* Well-documented scientific consensus 311 +* Basic reference information 312 + 313 +---- 314 + 315 + 316 +---- 317 + 318 +== User Role Hierarchy Diagram == 319 + 320 +The following diagram visualizes the complete role hierarchy: 321 + 322 +{{include reference="Test.FactHarborV09.Specification.Diagrams.User Class Diagram.WebHome"/}} 323 + 324 +---- 325 + 326 +---- 327 + 328 +== Role Hierarchy Diagrams == 329 + 330 +=== User Class Diagram === 331 + 332 +The following class diagram visualizes the complete user role hierarchy: 333 + 334 +{{include reference="Test.FactHarborV09.Specification.Diagrams.User Class Diagram.WebHome"/}} 335 + 336 +=== Human User Roles === 337 + 338 +This diagram shows the two-track progression for human users: 339 + 340 +{{include reference="FactHarbor.Archive.FactHarbor V0\.9\.23 Lost Data.Specification.Diagrams.Human User Roles.WebHome"/}} 341 + 342 +=== Technical and System Users === 343 + 344 +This diagram shows system processes and their management: 345 + 346 +{{include reference="FactHarbor.Archive.FactHarbor V0\.9\.23 Lost Data.Specification.Diagrams.Technical and System Users.WebHome"/}} 347 + 348 +**Key Design Principles**: 349 + 350 +* **Two tracks from Contributor**: Content Track (Reviewer) and Technical Track (Maintainer) 351 +* **Technical Users**: System processes (AKEL, bots) managed by Maintainers 352 +* **Separation of concerns**: Editorial authority independent from technical authority 353 + 354 +---- 355 + 356 + 357 + 358 +---- 359 + 360 += Functional Requirements = 361 + 362 + 363 + 364 +This page defines what the FactHarbor system must **do** to fulfill its mission. 365 + 366 +Requirements are structured as FR (Functional Requirement) items and organized by capability area. 367 + 368 +---- 369 + 370 +== Claim Intake & Normalization == 371 + 372 +=== FR1 – Claim Intake === 373 + 374 +The system must support Claim creation from: 375 + 376 +* Free-text input (from any Reader) 377 +* URLs (web pages, articles, posts) 378 +* Uploaded documents and transcripts 379 +* Structured feeds (optional, e.g. from partner platforms) 380 +* Automated ingestion (federation input) 381 +* AKEL extraction from multi-claim texts 382 + 383 +**Automatic submission**: Any Reader can submit text, and new claims are added automatically unless identical claims already exist. 384 + 385 +=== FR2 – Claim Normalization === 386 + 387 +* Convert diverse inputs into short, structured, declarative claims 388 +* Preserve original phrasing for reference 389 +* Avoid hidden reinterpretation; differences between original and normalized phrasing must be visible 390 + 391 +=== FR3 – Claim Classification === 392 + 393 +* Classify claims by topic, domain, and type (e.g., quantitative, causal, normative) 394 +* Assign risk tier (A/B/C) based on domain and potential impact 395 +* Suggest which node / experts are relevant 396 + 397 +=== FR4 – Claim Clustering === 398 + 399 +* Group similar claims into Claim Clusters 400 +* Allow manual correction of cluster membership 401 +* Provide explanation why two claims are considered "same cluster" 402 + 403 +---- 404 + 405 +== Scenario System == 406 + 407 +=== FR5 – Scenario Creation === 408 + 409 +* Contributors, Reviewers, and Experts can create scenarios 410 +* AKEL can propose draft scenarios 411 +* Each scenario is tied to exactly one Claim Cluster 412 + 413 +=== FR6 – Required Scenario Fields === 414 + 415 +Each scenario includes: 416 + 417 +* Definitions (key terms) 418 +* Assumptions (explicit, testable where possible) 419 +* Boundaries (time, geography, population, conditions) 420 +* Scope of evidence considered 421 +* Intended decision / context (optional) 422 + 423 +=== FR7 – Scenario Versioning === 424 + 425 +* Every change to a scenario creates a new version 426 +* Previous versions remain accessible with timestamps and rationale 427 +* ParentVersionID links versions 428 + 429 +=== FR8 – Scenario Comparison === 430 + 431 +* Users can compare scenarios side by side 432 +* Show differences in assumptions, definitions, and evidence sets 433 + 434 +---- 435 + 436 +== Evidence Management == 437 + 438 +=== FR9 – Evidence Ingestion === 439 + 440 +* Attach external sources (articles, studies, datasets, reports, transcripts) to Scenarios 441 +* Allow multiple pieces of evidence per Scenario 442 +* Support large file uploads (with size limits) 443 + 444 +=== FR10 – Evidence Assessment === 445 + 446 +For each piece of evidence: 447 + 448 +* Assign reliability / quality ratings 449 +* Capture who rated it and why 450 +* Indicate known limitations, biases, or conflicts of interest 451 +* Track evidence version history 452 + 453 +=== FR11 – Evidence Linking === 454 + 455 +* Link one piece of evidence to multiple scenarios if relevant 456 +* Make dependencies explicit (e.g., "Scenario A uses subset of evidence used in Scenario B") 457 +* Use ScenarioEvidenceLink table with RelevanceScore 458 + 459 +---- 460 + 461 +== Verdicts & Truth Landscape == 462 + 463 +=== FR12 – Scenario Verdicts === 464 + 465 +For each Scenario: 466 + 467 +* Provide a **probability- or likelihood-based verdict** 468 +* Capture uncertainty and reasoning 469 +* Distinguish between AKEL draft and human-approved verdict 470 +* Support Mode 1 (draft), Mode 2 (AI-generated), Mode 3 (human-reviewed) 471 + 472 +=== FR13 – Truth Landscape === 473 + 474 +* Aggregate all scenario-specific verdicts into a "truth landscape" for a claim 475 +* Make disagreements visible rather than collapsing them into a single binary result 476 +* Show parallel scenarios and their respective verdicts 477 + 478 +=== FR14 – Time Evolution === 479 + 480 +* Show how verdicts and evidence evolve over time 481 +* Allow users to see "as of date X, what did we know?" 482 +* Maintain complete version history for auditing 483 + 484 +---- 485 + 486 +== Workflow, Moderation & Audit == 487 + 488 +=== FR15 – Workflow States === 489 + 490 +* Draft → In Review → Published / Rejected 491 +* Separate states for Claims, Scenarios, Evidence, and Verdicts 492 +* Support Mode 1/2/3 publication model 493 + 494 +=== FR16 – Moderation & Abuse Handling === 495 + 496 +* Allow Moderators to hide content or lock edits for abuse or legal reasons 497 +* Keep internal audit trail even if public view is restricted 498 +* Support user reporting and flagging 499 + 500 +=== FR17 – Audit Trail === 501 + 502 +* Every significant action (create, edit, publish, delete/hide) is logged with: 503 +** Who did it 504 +** When (timestamp) 505 +** What changed (diffs) 506 +** Why (justification text) 507 + 508 +---- 509 + 510 +== Quality Gates & AI Review == 511 + 512 +=== FR18 – Quality Gate Validation === 513 + 514 +Before AI-generated content (Mode 2) publication, enforce: 515 + 516 +* Gate 1: Source Quality 517 +* Gate 2: Contradiction Search (MANDATORY) 518 +* Gate 3: Uncertainty Quantification 519 +* Gate 4: Structural Integrity 520 + 521 +=== FR19 – Audit Sampling === 522 + 523 +* Implement stratified sampling by risk tier 524 +* Recommendation: 30-50% Tier A, 10-20% Tier B, 5-10% Tier C 525 +* Support audit workflow and feedback loop 526 + 527 +=== FR20 – Risk Tier Assignment === 528 + 529 +* AKEL suggests tier based on domain, keywords, impact 530 +* Moderators and Experts can override 531 +* Risk tier affects publication workflow 532 + 533 +---- 534 + 67 67 == Federation Requirements == 68 68 69 -* **FR18**: Node autonomy. 70 -* **FR19**: Configurable data sharing. 71 -* **FR20**: Sync with conflict handling. 72 -* **FR21**: Node discovery. 537 +=== FR21 – Node Autonomy === 73 73 539 +* Each node can run independently (local policies, local users, local moderation) 540 +* Nodes decide which other nodes to federate with 541 +* Trust levels: Trusted / Neutral / Untrusted 542 + 543 +=== FR22 – Data Sharing Modes === 544 + 545 +Nodes must be able to: 546 + 547 +* Share claims and summaries only 548 +* Share selected claims, scenarios, and verdicts 549 +* Share full underlying evidence metadata where allowed 550 +* Opt-out of sharing sensitive or restricted content 551 + 552 +=== FR23 – Synchronization & Conflict Handling === 553 + 554 +* Changes from remote nodes must be mergeable or explicitly conflict-marked 555 +* Conflicting verdicts are allowed and visible; not forced into consensus 556 +* Support push/pull/subscription synchronization 557 + 558 +=== FR24 – Federation Discovery === 559 + 560 +* Discover other nodes and their capabilities (public endpoints, policies) 561 +* Allow whitelisting / blacklisting of nodes 562 +* Global identifier format: `factharbor://node_url/type/local_id` 563 + 564 +=== FR25 – Cross-Node AI Knowledge Exchange === 565 + 566 +* Share vector embeddings for clustering 567 +* Share canonical claim forms 568 +* Share scenario templates 569 +* Share contradiction alerts 570 +* NEVER share model weights 571 +* NEVER override local governance 572 + 573 +---- 574 + 74 74 == Non-Functional Requirements == 75 75 76 -* **NFR1 - Transparency**: Visible reasoning and AKEL labeling. 77 -* **NFR2 - Security**: Role-based access, secure storage. 78 -* **NFR3 - Privacy**: Minimal data retention, compliance hooks. 79 -* **NFR4 - Performance**: < 2s response (POC). 80 -* **NFR5 - Scalability**: Support thousands of users (Release 1.0). 81 -* **NFR6 - Interoperability**: Open API. 82 -* **NFR7 - Observability**: Metrics and logs. 83 -* **NFR8 - Maintainability**: Modular architecture. 84 -* **NFR9 - Usability**: Progressive disclosure of complexity. 577 +=== NFR1 – Transparency === 85 85 579 +* All assumptions, evidence, and reasoning behind verdicts must be visible 580 +* AKEL involvement must be clearly labeled 581 +* Users must be able to inspect the chain of reasoning and versions 582 + 583 +=== NFR2 – Security === 584 + 585 +* Role-based access control 586 +* Transport-level security (HTTPS) 587 +* Secure storage of secrets (API keys, credentials) 588 +* Audit trails for sensitive actions 589 + 590 +=== NFR3 – Privacy & Compliance === 591 + 592 +* Configurable data retention policies 593 +* Ability to redact or pseudonymize personal data when required 594 +* Compliance hooks for jurisdiction-specific rules (e.g. GDPR-like deletion requests) 595 + 596 +=== NFR4 – Performance === 597 + 598 +* POC: typical interactions < 2 s 599 +* Release 1.0: < 300 ms for common read operations after caching 600 +* Degradation strategies under load 601 + 602 +=== NFR5 – Scalability === 603 + 604 +* POC: 50 internal testers on one node 605 +* Beta 0: 100 external testers on one node 606 +* Release 1.0: **2000+ concurrent users** on a reasonably provisioned node 607 + 608 +Technical targets for Release 1.0: 609 + 610 +* Scalable monolith or early microservice architecture 611 +* Sharded vector database (for semantic search) 612 +* Optional IPFS or other decentralized storage for large artifacts 613 +* Horizontal scalability for read capacity 614 + 615 +=== NFR6 – Interoperability === 616 + 617 +* Open, documented API 618 +* Modular AKEL that can be swapped or extended 619 +* Federation protocols that follow open standards where possible 620 +* Standard model for external integrations 621 + 622 +=== NFR7 – Observability & Operations === 623 + 624 +* Metrics for performance, errors, and queue backlogs 625 +* Logs for key flows (claim intake, scenario changes, verdict updates, federation sync) 626 +* Health endpoints for monitoring 627 + 628 +=== NFR8 – Maintainability === 629 + 630 +* Clear module boundaries (API, core services, AKEL, storage, federation) 631 +* Backward-compatible schema migration strategy where feasible 632 +* Configuration via files / environment variables, not hard-coded 633 + 634 +=== NFR9 – Usability === 635 + 636 +* UI optimized for **exploring complexity**, not hiding it 637 +* Support for saved views, filters, and user-level preferences 638 +* Progressive disclosure: casual users see summaries, advanced users can dive deep 639 + 640 +---- 641 + 86 86 == Release Levels == 87 87 88 -* **POC (Fully Automated)**: Single node. **"Text to Truth Landscape"** workflow. Automated extraction, scenario generation, and verdict computation. 89 -* **Beta 0**: Few nodes, external testers. Expanded manual workflows and moderation. 90 -* **Release 1.0**: Scalable, Federated, High Automation. Multi-node federation. 644 +=== Proof of Concept (POC) === 91 91 646 +* Single node 647 +* Limited user set (50 internal testers) 648 +* Basic claim → scenario → evidence → verdict flow 649 +* Minimal federation (optional) 650 +* AI-generated publication (Mode 2) demonstration 651 +* Quality gates active 652 + 653 +=== Beta 0 === 654 + 655 +* One or few nodes 656 +* External testers (100) 657 +* Expanded workflows and basic moderation 658 +* Initial federation experiments 659 +* Audit sampling implemented 660 + 661 +=== Release 1.0 === 662 + 663 +* 2000+ concurrent users 664 +* Scalable architecture 665 +* Sharded vector DB 666 +* IPFS optional 667 +* High automation (AKEL assistance) 668 +* Multi-node federation with full sync protocol 669 +* Mature audit system 670 + 671 +---- 672 + 673 + 674 + 675 +== Related Pages == 676 + 677 + 678 + 679 +* [[AKEL (AI Knowledge Extraction Layer)>>FactHarbor.Specification.AI Knowledge Extraction Layer (AKEL).WebHome]] 680 +* [[Automation>>FactHarbor.Specification.Automation.WebHome]] 681 +* [[Workflows>>FactHarbor.Specification.Workflows.WebHome]] 682 +* [[Governance>>FactHarbor.Organisation.Governance]]