Changes for page Requirements

Last modified by Robert Schaub on 2025/12/24 20:34

From version 8.5
edited by Robert Schaub
on 2025/12/16 20:28
Change comment: Renamed back-links.
To version 2.1
edited by Robert Schaub
on 2025/12/12 09:32
Change comment: Imported from XAR

Summary

Details

Page properties
Parent
... ... @@ -1,1 +1,1 @@
1 -FactHarbor.Archive.FactHarbor V0\.9\.18.Specification.WebHome
1 +FactHarbor.Specification.WebHome
Content
... ... @@ -1,682 +1,91 @@
1 1  = Requirements =
2 2  
3 -This page defines **Roles**, **Responsibilities**, and **Rules** for contributors and users of FactHarbor.
3 +This chapter defines the requirements for FactHarbor.
4 4  
5 -== Roles ==
5 +== User Roles ==
6 6  
7 7  === Reader ===
8 +* **Responsibilities**: Browse, search, view scenarios/verdicts, flag issues.
9 +* **Permissions**: Read-only access.
10 +* **Limitations**: Cannot change content.
8 8  
9 -**Who**: Anyone (no login required).
10 -
11 -**Can**:
12 -
13 -* Browse and search claims
14 -* View scenarios, evidence, verdicts, and timelines
15 -* Compare scenarios and explore assumptions
16 -* Flag issues, errors, contradictions, or suspicious patterns
17 -* Use filters, search, and visualization tools
18 -* Create personal views (saved searches, bookmarks - local browser storage)
19 -* **Submit claims automatically** by providing text to analyze - new claims are added automatically unless equal claims already exist in the system
20 -
21 -**Cannot**:
22 -
23 -* Modify existing content
24 -* Access draft content
25 -* Participate in governance decisions
26 -
27 -**Note**: Readers can request human review of AI-generated content by flagging it.
28 -
29 29  === Contributor ===
13 +* **Responsibilities**: Submit claims, draft scenarios, attach evidence.
14 +* **Permissions**: Create/Edit drafts, comment.
15 +* **Limitations**: Cannot publish without review.
30 30  
31 -**Who**: Registered and logged-in users (extends Reader capabilities).
32 -
33 -**Can**:
34 -
35 -* Everything a Reader can do
36 -* Submit claims
37 -* Submit evidence
38 -* Provide feedback
39 -* Suggest scenarios
40 -* Flag content for review
41 -* Request human review of AI-generated content
42 -
43 -**Cannot**:
44 -
45 -* Publish or mark content as "reviewed" or "approved"
46 -* Override expert or maintainer decisions
47 -* Directly modify AKEL or quality gate configurations
48 -
49 49  === Reviewer ===
18 +* **Responsibilities**: Validate contributions, check consistency.
19 +* **Permissions**: Change status to "Published" or "Rejected".
50 50  
51 -**Who**: Trusted community members, appointed by maintainers.
21 +=== Expert ===
22 +* **Responsibilities**: Domain-specific judgment, refine assumptions.
23 +* **Permissions**: Attach expert annotations, propose re-evaluation.
52 52  
53 -**Can**:
54 -
55 -* Review contributions from Contributors and AKEL drafts
56 -* Validate AI-generated content (Mode 2 → Mode 3 transition)
57 -* Edit claims, scenarios, and evidence
58 -* Add clarifications or warnings
59 -* Change content status: `draft` → `in review` → `published` / `rejected`
60 -* Approve or reject **Tier B and C** content for "Human-Reviewed" status
61 -* Flag content for expert review
62 -* Participate in audit sampling
63 -
64 -**Cannot**:
65 -
66 -* Approve Tier A content for "Human-Reviewed" status (requires Expert)
67 -* Change governance rules
68 -* Unilaterally change expert conclusions without process
69 -* Bypass quality gates
70 -
71 -**Note on AI-Drafted Content**:
72 -
73 -* Reviewers can validate AI-generated content (Mode 2) to promote it to "Human-Reviewed" (Mode 3)
74 -* For Tier B and C, Reviewers have approval authority
75 -* For Tier A, only Experts can grant "Human-Reviewed" status
76 -
77 -=== Expert (Domain-Specific) ===
78 -
79 -**Who**: Subject-matter specialists in specific domains (medicine, law, science, etc.).
80 -
81 -**Can**:
82 -
83 -* Everything a Reviewer can do
84 -* **Final authority** on Tier A content "Human-Reviewed" status
85 -* Validate complex or controversial claims in their domain
86 -* Define domain-specific quality standards
87 -* Set reliability thresholds for domain sources
88 -* Participate in risk tier assignment review
89 -* Override AKEL suggestions in their domain (with documentation)
90 -
91 -**Cannot**:
92 -
93 -* Change platform governance policies
94 -* Approve content outside their expertise domain
95 -* Bypass technical quality gates (but can flag for adjustment)
96 -
97 -**Specialization**:
98 -
99 -* Experts are domain-specific (e.g., "Medical Expert", "Legal Expert", "Climate Science Expert")
100 -* Cross-domain claims may require multiple expert reviews
101 -
102 -=== Auditor ===
103 -
104 -**Who**: Reviewers or Experts assigned to sampling audit duties.
105 -
106 -**Can**:
107 -
108 -* Review sampled AI-generated content against quality standards
109 -* Validate quality gate enforcement
110 -* Identify patterns in AI errors or hallucinations
111 -* Provide feedback for system improvement
112 -* Flag content for immediate review if errors found
113 -* Contribute to audit statistics and transparency reports
114 -
115 -**Cannot**:
116 -
117 -* Change audit sampling algorithms (maintainer responsibility)
118 -* Bypass normal review workflows
119 -* Audit content they personally created
120 -
121 -**Selection**:
122 -
123 -* Auditors selected based on domain expertise and review quality
124 -* Rotation to prevent audit fatigue
125 -* Stratified assignment (Tier A auditors need higher expertise)
126 -
127 -**Audit Focus**:
128 -
129 -* Tier A: Recommendation 30-50% sampling rate, expert auditors
130 -* Tier B: Recommendation 10-20% sampling rate, reviewer/expert auditors
131 -* Tier C: Recommendation 5-10% sampling rate, reviewer auditors
132 -
133 133  === Moderator ===
26 +* **Responsibilities**: Handle abuse, spam, and manipulation.
27 +* **Permissions**: Hide content, ban users.
134 134  
135 -**Who**: Maintainers or trusted long-term contributors.
29 +=== Maintainer / Administrator ===
30 +* **Responsibilities**: Node config, security, role assignment.
31 +* **Permissions**: System configuration.
136 136  
137 -**Can**:
33 +=== AKEL (AI) ===
34 +* **Responsibilities**: Propose drafts, normalize, classify.
35 +* **Permissions**: Create machine-generated drafts.
36 +* **Limitations**: Never publishes without human approval.
138 138  
139 -* All Reviewer and Expert capabilities (cross-domain)
140 -* Manage user accounts and permissions
141 -* Handle disputes and conflicts
142 -* Enforce community guidelines
143 -* Suspend or ban abusive users
144 -* Finalize publication status for sensitive content
145 -* Review and adjust risk tier assignments
146 -* Oversee audit system performance
38 +== Functional Requirements ==
147 147  
148 -**Cannot**:
40 +=== Claim Intake & Normalization ===
41 +* **FR1**: Support text, URL, document input.
42 +* **FR2**: Normalize wording while preserving original.
43 +* **FR3**: Classify by domain/type.
44 +* **FR4**: Cluster similar claims.
149 149  
150 -* Change core data model or architecture
151 -* Override technical system constraints
152 -* Make unilateral governance decisions without consensus
46 +=== Scenario System ===
47 +* **FR5**: Create scenarios linked to clusters.
48 +* **FR6**: Require Definitions, Assumptions, Boundaries.
49 +* **FR7**: Full versioning.
50 +* **FR8**: Side-by-side comparison.
153 153  
154 -=== Maintainer ===
52 +=== Evidence Management ===
53 +* **FR9**: Ingest external sources.
54 +* **FR10**: Assess reliability/quality.
55 +* **FR11**: Link evidence to multiple scenarios.
155 155  
156 -**Who**: Core team members responsible for the platform.
57 +=== Verdicts & Truth Landscape ===
58 +* **FR12**: Likelihood-based verdicts **per scenario**.
59 +* **FR13**: Aggregate into Truth Landscape.
60 +* **FR14**: Show evolution over time.
157 157  
158 -**Can**:
62 +=== Workflow & Audit ===
63 +* **FR15**: Draft -> Review -> Publish states.
64 +* **FR16**: Moderation tools.
65 +* **FR17**: Full audit trail.
159 159  
160 -* All Moderator capabilities
161 -* Change data model, architecture, and technical systems
162 -* Configure quality gates and AKEL parameters
163 -* Adjust audit sampling algorithms
164 -* Set and modify risk tier policies
165 -* Make platform-wide governance decisions
166 -* Access and modify backend systems
167 -* Deploy updates and fixes
168 -* Grant and revoke roles
169 -
170 -**Governance**:
171 -
172 -* Maintainers operate under organizational governance rules
173 -* Major policy changes require Governing Team approval
174 -* Technical decisions made collaboratively
175 -
176 -----
177 -
178 -== Content Publication States ==
179 -
180 -=== Mode 1: Draft ===
181 -
182 -* Not visible to public
183 -* Visible to contributor and reviewers
184 -* Can be edited by contributor or reviewers
185 -* Default state for failed quality gates
186 -
187 -=== Mode 2: AI-Generated (Published) ===
188 -
189 -* **Public** and visible to all users
190 -* Clearly labeled as "AI-Generated, Awaiting Human Review"
191 -* Passed all automated quality gates
192 -* Risk tier displayed (A/B/C)
193 -* Users can:
194 -** Read and use content
195 -** Request human review
196 -** Flag for expert attention
197 -* Subject to sampling audits
198 -* Can be promoted to Mode 3 by reviewer/expert validation
199 -
200 -=== Mode 3: Human-Reviewed (Published) ===
201 -
202 -* **Public** and visible to all users
203 -* Labeled as "Human-Reviewed" with reviewer/expert attribution
204 -* Passed quality gates + human validation
205 -* Highest trust level
206 -* For Tier A, requires Expert approval
207 -* For Tier B/C, Reviewer approval sufficient
208 -
209 -=== Rejected ===
210 -
211 -* Not visible to public
212 -* Visible to contributor with rejection reason
213 -* Can be resubmitted after addressing issues
214 -* Rejection logged for transparency
215 -
216 -----
217 -
218 -== Contribution Rules ==
219 -
220 -=== All Contributors Must: ===
221 -
222 -* Provide sources for claims
223 -* Use clear, neutral language
224 -* Avoid personal attacks or insults
225 -* Respect intellectual property (cite sources)
226 -* Accept community feedback gracefully
227 -
228 -=== AKEL (AI) Must: ===
229 -
230 -* Mark all outputs with `AuthorType = AI`
231 -* Pass quality gates before Mode 2 publication
232 -* Perform mandatory contradiction search
233 -* Disclose confidence levels and uncertainty
234 -* Provide traceable reasoning chains
235 -* Flag potential bubbles or echo chambers
236 -* Submit to audit sampling
237 -
238 -=== Reviewers Must: ===
239 -
240 -* Be impartial and evidence-based
241 -* Document reasoning for decisions
242 -* Escalate to experts when appropriate
243 -* Participate in audits when assigned
244 -* Provide constructive feedback
245 -
246 -=== Experts Must: ===
247 -
248 -* Stay within domain expertise
249 -* Disclose conflicts of interest
250 -* Document specialized terminology
251 -* Provide reasoning for domain-specific decisions
252 -* Participate in Tier A audits
253 -
254 -----
255 -
256 -== Quality Standards ==
257 -
258 -=== Source Requirements ===
259 -
260 -* Primary sources preferred over secondary
261 -* Publication date and author must be identifiable
262 -* Sources must be accessible (not paywalled when possible)
263 -* Contradictory sources must be acknowledged
264 -* Echo chamber sources must be flagged
265 -
266 -=== Claim Requirements ===
267 -
268 -* Falsifiable or evaluable
269 -* Clear definitions of key terms
270 -* Boundaries and scope stated
271 -* Assumptions made explicit
272 -* Uncertainty acknowledged
273 -
274 -=== Evidence Requirements ===
275 -
276 -* Relevant to the claim and scenario
277 -* Reliability assessment provided
278 -* Methodology described (for studies)
279 -* Limitations noted
280 -* Conflicting evidence acknowledged
281 -
282 -----
283 -
284 -== Risk Tier Assignment ==
285 -
286 -**Automated (AKEL)**: Initial tier suggested based on domain, keywords, impact
287 -**Human Validation**: Moderators or Experts can override AKEL suggestions
288 -**Review**: Risk tiers periodically reviewed based on audit outcomes
289 -
290 -**Tier A Indicators**:
291 -
292 -* Medical diagnosis or treatment advice
293 -* Legal interpretation or advice
294 -* Election or voting information
295 -* Safety or security sensitive
296 -* Major financial decisions
297 -* Potential for significant harm
298 -
299 -**Tier B Indicators**:
300 -
301 -* Complex scientific causality
302 -* Contested policy domains
303 -* Historical interpretation with political implications
304 -* Significant economic impact claims
305 -
306 -**Tier C Indicators**:
307 -
308 -* Established historical facts
309 -* Simple definitions
310 -* Well-documented scientific consensus
311 -* Basic reference information
312 -
313 -----
314 -
315 -
316 -----
317 -
318 -== User Role Hierarchy Diagram ==
319 -
320 -The following diagram visualizes the complete role hierarchy:
321 -
322 -{{include reference="Test.FactHarborV09.Specification.Diagrams.User Class Diagram.WebHome"/}}
323 -
324 -----
325 -
326 -----
327 -
328 -== Role Hierarchy Diagrams ==
329 -
330 -=== User Class Diagram ===
331 -
332 -The following class diagram visualizes the complete user role hierarchy:
333 -
334 -{{include reference="Test.FactHarborV09.Specification.Diagrams.User Class Diagram.WebHome"/}}
335 -
336 -=== Human User Roles ===
337 -
338 -This diagram shows the two-track progression for human users:
339 -
340 -{{include reference="FactHarbor.Archive.FactHarbor V0\.9\.23 Lost Data.Specification.Diagrams.Human User Roles.WebHome"/}}
341 -
342 -=== Technical and System Users ===
343 -
344 -This diagram shows system processes and their management:
345 -
346 -{{include reference="FactHarbor.Archive.FactHarbor V0\.9\.23 Lost Data.Specification.Diagrams.Technical and System Users.WebHome"/}}
347 -
348 -**Key Design Principles**:
349 -
350 -* **Two tracks from Contributor**: Content Track (Reviewer) and Technical Track (Maintainer)
351 -* **Technical Users**: System processes (AKEL, bots) managed by Maintainers
352 -* **Separation of concerns**: Editorial authority independent from technical authority
353 -
354 -----
355 -
356 -
357 -
358 -----
359 -
360 -= Functional Requirements =
361 -
362 -
363 -
364 -This page defines what the FactHarbor system must **do** to fulfill its mission.
365 -
366 -Requirements are structured as FR (Functional Requirement) items and organized by capability area.
367 -
368 -----
369 -
370 -== Claim Intake & Normalization ==
371 -
372 -=== FR1 – Claim Intake ===
373 -
374 -The system must support Claim creation from:
375 -
376 -* Free-text input (from any Reader)
377 -* URLs (web pages, articles, posts)
378 -* Uploaded documents and transcripts
379 -* Structured feeds (optional, e.g. from partner platforms)
380 -* Automated ingestion (federation input)
381 -* AKEL extraction from multi-claim texts
382 -
383 -**Automatic submission**: Any Reader can submit text, and new claims are added automatically unless identical claims already exist.
384 -
385 -=== FR2 – Claim Normalization ===
386 -
387 -* Convert diverse inputs into short, structured, declarative claims
388 -* Preserve original phrasing for reference
389 -* Avoid hidden reinterpretation; differences between original and normalized phrasing must be visible
390 -
391 -=== FR3 – Claim Classification ===
392 -
393 -* Classify claims by topic, domain, and type (e.g., quantitative, causal, normative)
394 -* Assign risk tier (A/B/C) based on domain and potential impact
395 -* Suggest which node / experts are relevant
396 -
397 -=== FR4 – Claim Clustering ===
398 -
399 -* Group similar claims into Claim Clusters
400 -* Allow manual correction of cluster membership
401 -* Provide explanation why two claims are considered "same cluster"
402 -
403 -----
404 -
405 -== Scenario System ==
406 -
407 -=== FR5 – Scenario Creation ===
408 -
409 -* Contributors, Reviewers, and Experts can create scenarios
410 -* AKEL can propose draft scenarios
411 -* Each scenario is tied to exactly one Claim Cluster
412 -
413 -=== FR6 – Required Scenario Fields ===
414 -
415 -Each scenario includes:
416 -
417 -* Definitions (key terms)
418 -* Assumptions (explicit, testable where possible)
419 -* Boundaries (time, geography, population, conditions)
420 -* Scope of evidence considered
421 -* Intended decision / context (optional)
422 -
423 -=== FR7 – Scenario Versioning ===
424 -
425 -* Every change to a scenario creates a new version
426 -* Previous versions remain accessible with timestamps and rationale
427 -* ParentVersionID links versions
428 -
429 -=== FR8 – Scenario Comparison ===
430 -
431 -* Users can compare scenarios side by side
432 -* Show differences in assumptions, definitions, and evidence sets
433 -
434 -----
435 -
436 -== Evidence Management ==
437 -
438 -=== FR9 – Evidence Ingestion ===
439 -
440 -* Attach external sources (articles, studies, datasets, reports, transcripts) to Scenarios
441 -* Allow multiple pieces of evidence per Scenario
442 -* Support large file uploads (with size limits)
443 -
444 -=== FR10 – Evidence Assessment ===
445 -
446 -For each piece of evidence:
447 -
448 -* Assign reliability / quality ratings
449 -* Capture who rated it and why
450 -* Indicate known limitations, biases, or conflicts of interest
451 -* Track evidence version history
452 -
453 -=== FR11 – Evidence Linking ===
454 -
455 -* Link one piece of evidence to multiple scenarios if relevant
456 -* Make dependencies explicit (e.g., "Scenario A uses subset of evidence used in Scenario B")
457 -* Use ScenarioEvidenceLink table with RelevanceScore
458 -
459 -----
460 -
461 -== Verdicts & Truth Landscape ==
462 -
463 -=== FR12 – Scenario Verdicts ===
464 -
465 -For each Scenario:
466 -
467 -* Provide a **probability- or likelihood-based verdict**
468 -* Capture uncertainty and reasoning
469 -* Distinguish between AKEL draft and human-approved verdict
470 -* Support Mode 1 (draft), Mode 2 (AI-generated), Mode 3 (human-reviewed)
471 -
472 -=== FR13 – Truth Landscape ===
473 -
474 -* Aggregate all scenario-specific verdicts into a "truth landscape" for a claim
475 -* Make disagreements visible rather than collapsing them into a single binary result
476 -* Show parallel scenarios and their respective verdicts
477 -
478 -=== FR14 – Time Evolution ===
479 -
480 -* Show how verdicts and evidence evolve over time
481 -* Allow users to see "as of date X, what did we know?"
482 -* Maintain complete version history for auditing
483 -
484 -----
485 -
486 -== Workflow, Moderation & Audit ==
487 -
488 -=== FR15 – Workflow States ===
489 -
490 -* Draft → In Review → Published / Rejected
491 -* Separate states for Claims, Scenarios, Evidence, and Verdicts
492 -* Support Mode 1/2/3 publication model
493 -
494 -=== FR16 – Moderation & Abuse Handling ===
495 -
496 -* Allow Moderators to hide content or lock edits for abuse or legal reasons
497 -* Keep internal audit trail even if public view is restricted
498 -* Support user reporting and flagging
499 -
500 -=== FR17 – Audit Trail ===
501 -
502 -* Every significant action (create, edit, publish, delete/hide) is logged with:
503 -** Who did it
504 -** When (timestamp)
505 -** What changed (diffs)
506 -** Why (justification text)
507 -
508 -----
509 -
510 -== Quality Gates & AI Review ==
511 -
512 -=== FR18 – Quality Gate Validation ===
513 -
514 -Before AI-generated content (Mode 2) publication, enforce:
515 -
516 -* Gate 1: Source Quality
517 -* Gate 2: Contradiction Search (MANDATORY)
518 -* Gate 3: Uncertainty Quantification
519 -* Gate 4: Structural Integrity
520 -
521 -=== FR19 – Audit Sampling ===
522 -
523 -* Implement stratified sampling by risk tier
524 -* Recommendation: 30-50% Tier A, 10-20% Tier B, 5-10% Tier C
525 -* Support audit workflow and feedback loop
526 -
527 -=== FR20 – Risk Tier Assignment ===
528 -
529 -* AKEL suggests tier based on domain, keywords, impact
530 -* Moderators and Experts can override
531 -* Risk tier affects publication workflow
532 -
533 -----
534 -
535 535  == Federation Requirements ==
536 536  
537 -=== FR21 – Node Autonomy ===
69 +* **FR18**: Node autonomy.
70 +* **FR19**: Configurable data sharing.
71 +* **FR20**: Sync with conflict handling.
72 +* **FR21**: Node discovery.
538 538  
539 -* Each node can run independently (local policies, local users, local moderation)
540 -* Nodes decide which other nodes to federate with
541 -* Trust levels: Trusted / Neutral / Untrusted
542 -
543 -=== FR22 – Data Sharing Modes ===
544 -
545 -Nodes must be able to:
546 -
547 -* Share claims and summaries only
548 -* Share selected claims, scenarios, and verdicts
549 -* Share full underlying evidence metadata where allowed
550 -* Opt-out of sharing sensitive or restricted content
551 -
552 -=== FR23 – Synchronization & Conflict Handling ===
553 -
554 -* Changes from remote nodes must be mergeable or explicitly conflict-marked
555 -* Conflicting verdicts are allowed and visible; not forced into consensus
556 -* Support push/pull/subscription synchronization
557 -
558 -=== FR24 – Federation Discovery ===
559 -
560 -* Discover other nodes and their capabilities (public endpoints, policies)
561 -* Allow whitelisting / blacklisting of nodes
562 -* Global identifier format: `factharbor://node_url/type/local_id`
563 -
564 -=== FR25 – Cross-Node AI Knowledge Exchange ===
565 -
566 -* Share vector embeddings for clustering
567 -* Share canonical claim forms
568 -* Share scenario templates
569 -* Share contradiction alerts
570 -* NEVER share model weights
571 -* NEVER override local governance
572 -
573 -----
574 -
575 575  == Non-Functional Requirements ==
576 576  
577 -=== NFR1 – Transparency ===
76 +* **NFR1 - Transparency**: Visible reasoning and AKEL labeling.
77 +* **NFR2 - Security**: Role-based access, secure storage.
78 +* **NFR3 - Privacy**: Minimal data retention, compliance hooks.
79 +* **NFR4 - Performance**: < 2s response (POC).
80 +* **NFR5 - Scalability**: Support thousands of users (Release 1.0).
81 +* **NFR6 - Interoperability**: Open API.
82 +* **NFR7 - Observability**: Metrics and logs.
83 +* **NFR8 - Maintainability**: Modular architecture.
84 +* **NFR9 - Usability**: Progressive disclosure of complexity.
578 578  
579 -* All assumptions, evidence, and reasoning behind verdicts must be visible
580 -* AKEL involvement must be clearly labeled
581 -* Users must be able to inspect the chain of reasoning and versions
582 -
583 -=== NFR2 – Security ===
584 -
585 -* Role-based access control
586 -* Transport-level security (HTTPS)
587 -* Secure storage of secrets (API keys, credentials)
588 -* Audit trails for sensitive actions
589 -
590 -=== NFR3 – Privacy & Compliance ===
591 -
592 -* Configurable data retention policies
593 -* Ability to redact or pseudonymize personal data when required
594 -* Compliance hooks for jurisdiction-specific rules (e.g. GDPR-like deletion requests)
595 -
596 -=== NFR4 – Performance ===
597 -
598 -* POC: typical interactions < 2 s
599 -* Release 1.0: < 300 ms for common read operations after caching
600 -* Degradation strategies under load
601 -
602 -=== NFR5 – Scalability ===
603 -
604 -* POC: 50 internal testers on one node
605 -* Beta 0: 100 external testers on one node
606 -* Release 1.0: **2000+ concurrent users** on a reasonably provisioned node
607 -
608 -Technical targets for Release 1.0:
609 -
610 -* Scalable monolith or early microservice architecture
611 -* Sharded vector database (for semantic search)
612 -* Optional IPFS or other decentralized storage for large artifacts
613 -* Horizontal scalability for read capacity
614 -
615 -=== NFR6 – Interoperability ===
616 -
617 -* Open, documented API
618 -* Modular AKEL that can be swapped or extended
619 -* Federation protocols that follow open standards where possible
620 -* Standard model for external integrations
621 -
622 -=== NFR7 – Observability & Operations ===
623 -
624 -* Metrics for performance, errors, and queue backlogs
625 -* Logs for key flows (claim intake, scenario changes, verdict updates, federation sync)
626 -* Health endpoints for monitoring
627 -
628 -=== NFR8 – Maintainability ===
629 -
630 -* Clear module boundaries (API, core services, AKEL, storage, federation)
631 -* Backward-compatible schema migration strategy where feasible
632 -* Configuration via files / environment variables, not hard-coded
633 -
634 -=== NFR9 – Usability ===
635 -
636 -* UI optimized for **exploring complexity**, not hiding it
637 -* Support for saved views, filters, and user-level preferences
638 -* Progressive disclosure: casual users see summaries, advanced users can dive deep
639 -
640 -----
641 -
642 642  == Release Levels ==
643 643  
644 -=== Proof of Concept (POC) ===
88 +* **POC (Fully Automated)**: Single node. **"Text to Truth Landscape"** workflow. Automated extraction, scenario generation, and verdict computation.
89 +* **Beta 0**: Few nodes, external testers. Expanded manual workflows and moderation.
90 +* **Release 1.0**: Scalable, Federated, High Automation. Multi-node federation.
645 645  
646 -* Single node
647 -* Limited user set (50 internal testers)
648 -* Basic claim → scenario → evidence → verdict flow
649 -* Minimal federation (optional)
650 -* AI-generated publication (Mode 2) demonstration
651 -* Quality gates active
652 -
653 -=== Beta 0 ===
654 -
655 -* One or few nodes
656 -* External testers (100)
657 -* Expanded workflows and basic moderation
658 -* Initial federation experiments
659 -* Audit sampling implemented
660 -
661 -=== Release 1.0 ===
662 -
663 -* 2000+ concurrent users
664 -* Scalable architecture
665 -* Sharded vector DB
666 -* IPFS optional
667 -* High automation (AKEL assistance)
668 -* Multi-node federation with full sync protocol
669 -* Mature audit system
670 -
671 -----
672 -
673 -
674 -
675 -== Related Pages ==
676 -
677 -
678 -
679 -* [[AKEL (AI Knowledge Extraction Layer)>>FactHarbor.Specification.AI Knowledge Extraction Layer (AKEL).WebHome]]
680 -* [[Automation>>FactHarbor.Specification.Automation.WebHome]]
681 -* [[Workflows>>FactHarbor.Specification.Workflows.WebHome]]
682 -* [[Governance>>FactHarbor.Organisation.Governance]]