PRODUCTION SYSTEM — NEXT GENERATION

An AI Nervous System
For Your Business.

An agent that gets smarter while it sleeps. Cache-aware context with infinite memory and zero context loss. Research-gated execution that thinks before it acts and captures what it learns. State separated from execution. Deploy one Core, scale Engines to match load.

3
Sleep Cycle Phases
4
Memory Tiers
R → E → C
Research · Execute · Capture
3-signal
Hybrid Search

The gap isn't intelligence.
It's architecture.

Language models are commoditizing. The bottleneck has shifted from reasoning to everything around it — state management, memory, tool orchestration, alignment, and the ability to execute complex work without losing context. Most agent failures are context failures, not reasoning failures.

THE CHATBOT PROBLEM

Every conversation starts from zero. No persistent memory. No understanding of past decisions. No continuity across sessions.

THE MONOLITH PROBLEM

State and execution fused together. If the LLM crashes, everything is lost. Can't scale. Can't recover. Can't run tasks in parallel.

THE FRAMEWORK PROBLEM

Toolkits that ship primitives, not systems. No alignment model. No memory architecture. No gating. Assembly required — and most assemblies fail.

SYSTEM ARCHITECTURE

State separated from execution.

Core owns all persistent state — memory, tasks, credentials, conversations. Engines are stateless LLM executors that connect via RPC. Services are thin channel adapters. Each component scales, crashes, and restarts independently.

COREState EngineScheduler & OrchestrationMemory & Knowledge GraphTool Gating & CredentialsResearch-Gated ExecutionMessagingEmailSocial MediaCalendar & TasksEngine 1LLM + ShellEngine 2LLM + ShellEngine NLLM + ShellRPCPERSISTENT MEMORYWorking BlocksLong-Term ArchiveKnowledge GraphCONSTITUTIONValues · Governance · Process · Policies
CONSTITUTIONAL ALIGNMENT

Values, not guardrails.

Most AI systems use guardrails — lists of things the model can't do. Optakt uses a constitution: values, governance, and process that guide every decision in ambiguous situations. The constitution is compiled into the system prompt alongside tool policies and domain-specific skills.

The result is an agent that knows when to act autonomously, when to draft for review, and when to ask — not because of rules, but because it understands the principles behind them.

Truth.Admit uncertainty. Never fabricate.
Courage.Act confidently within agreements.
Devotion.Care deeply about the principal's goals.
Humility.Know your limits. Check assumptions.
Compassion.Understand context. Match energy.
SLEEP CYCLES

Gets smarter while it sleeps.

Like human sleep, the agent cycles through three phases of background maintenance during idle time. Conversations are mined for unrealized insights. The archive is cross-referenced for contradictions. Knowledge base are verified against primary sources. The system gets more coherent every day without operator effort.

SLEEP CYCLES — BACKGROUND KNOWLEDGE MAINTENANCEDREAMINGPhase 1 · Most frequentINPUTConversation historyPROCESSMine recent conversationsfor decisions and insightsOUTPUTDurable knowledgeentrieshistory → archive → memoryREFLECTIONPhase 2 · DailyINPUTHistorical recordsPROCESSFind contradictions,verify against sourcesOUTPUTCorrections +updated knowledgearchive → memoryCONSOLIDATIONPhase 3 · WeeklyINPUTKnowledge basePROCESSCross-reference, merge,verify against realityOUTPUTCleaner, morecoherent knowledgememory → memory
NAP · 30 MIN IDLE

Dreaming only. Mines recent conversations for insights, decisions, and reasoning that wasn't captured during live work.

LIGHT SLEEP · 2–4 HR IDLE

Phases 1 and 2. After dreaming, reflects on the archive — finds contradictions, promotes knowledge to memory, amends stale entries.

DEEP SLEEP · 8+ HR IDLE

All three phases. Overnight, the agent consolidates memory — merges overlapping blocks, verifies claims against live systems, prunes stale knowledge.

TASK EXECUTION

Thinks before it acts.
Captures what it learns.

Every task passes through two programmatic gates. Before execution, the agent automatically searches six knowledge sources — archive, memory, history, web, codebase, and documents. After execution, decisions and outcomes are committed to long-term memory and searchable archive. Nothing is learned and then forgotten.

RESEARCH-GATED EXECUTIONRESEARCHProgrammatic GateLong-Term MemoryHistorical RecordsPast ConversationsWebCodebaseDocumentsEXECUTEFull AutonomyShell AccessTool GatingMulti-Engine RPCSuccess CriteriaVerification LoopOperator InterruptCAPTUREProgrammatic GateArchive DecisionsUpdate MemoryRecord LessonsAmend HistoryFlag Follow-upsVerify Completion
MEMORY ARCHITECTURE

Four layers. One coherent picture.

Knowledge is organized into four layers, from task-specific to universal. As information proves valuable across conversations, it automatically migrates upward — becoming more persistent, more available, and more efficiently cached. Three-signal hybrid search (full-text, semantic, and knowledge graph) makes everything instantly retrievable regardless of where it lives.

FOUR-LAYER KNOWLEDGE ARCHITECTUREPERMANENTAlways available. Core identity and universal knowledge.ELEVATEDProven knowledge elevated from active use. Widely available.PERSISTENTDurable knowledge extracted from conversations over time.CONTEXTUALTask-specific context. Loaded on demand, released when done.Curation← Fold promotes← Compact anchors← On-demand loadingKnowledge migrates upward automatically as it proves valuable. Each layer has distinct availability and efficiency characteristics.
CONTEXT MANAGEMENT

Infinite horizon. Bounded cost.

LLM context windows are expensive — every token is billed on every request. Optakt structures its context to optimally map onto each provider’s caching mechanism. Stable knowledge reads from cache at a fraction of the cost. Only changed segments are rewritten. The result: infinite conversation horizon at bounded, predictable cost.

Four Reduction Events

Context grows as conversations progress. Four distinct mechanisms reduce it back, each operating at a different frequency and depth.

CollapseMinutes

Deterministic cleanup of intermediate output. Dramatic savings. No LLM call needed.

CompactPeriodically

Summarizes older conversation into dense anchors while preserving knowledge verbatim.

FoldHours

Deep compression of historical anchors. Promotes proven knowledge to more persistent layers.

ReconcileOn demand

Consolidates accumulated changes and cleans up stale references. Runs alongside other events.

Provider-Optimized Caching

The context is structured into ordered segments based on how frequently each type of content changes. Optakt maps these segments onto each LLM provider’s specific caching mechanism — ensuring that stable knowledge is read from cache at a fraction of the input cost, while only actively changing segments are rewritten.

Identity & PoliciesRarely changes
Permanent KnowledgeCurated, stable
Elevated KnowledgeProven, durable
Conversation HistoryGrows, compresses
Active WorkChanges every turn

The more stable a segment, the more efficiently it caches. In practice, 60–80% of every request reads from cache — dramatically reducing the per-request cost of maintaining rich, persistent context.

CAPABILITIES

Built for production.

🧠

Three-Phase Sleep Cycles

Like human sleep, the agent cycles through dreaming, reflection, and consolidation during idle time. It mines conversations for insights, resolves contradictions in its records, and verifies knowledge against reality. It gets smarter while it sleeps.

📐

Provider-Optimized Caching

Context is structured to optimally map onto each LLM provider's caching mechanism. Stable knowledge reads from cache at a fraction of the cost. Only changed segments are rewritten.

🔍

Research-Gated Execution

Before acting, the agent automatically searches the relevant knowledge sources for each task. After acting, decisions and outcomes are committed to permanent storage. Nothing learned is forgotten.

🏗️

Four-Layer Knowledge

Knowledge is organized from task-specific to universal. As information proves valuable, it migrates upward automatically —€” becoming more persistent, more available, and more efficiently cached.

🔗

Hybrid Search

Three-signal retrieval combining full-text keyword search, semantic similarity, and knowledge graph expansion. Results merged by relevance across all three signals. Every piece of knowledge is instantly retrievable.

⚖️

Constitutional Alignment

Values, governance, and process compiled into the system prompt. The agent knows when to act autonomously, when to draft for review, and when to ask first.

🔌

Modular Deployment

Core owns state. Engines execute. Services connect channels. Each component scales, crashes, and restarts independently. Cap'n Proto RPC between all components.

🛡️

Programmatic Tool Gating

Scope enforcement, rate limiting, approval queues, schema validation. Deterministic Go code — no LLM cost, no circumvention. Phase-specific tool grants with least privilege.

🔐

Credential Security

Secrets are encrypted at rest and never exposed to the LLM. The operator decrypts on startup. Credentials are injected directly into tool execution environments by name —€” the agent never sees the values.

COMPARISON

What makes Optakt different.

CAPABILITY
TYPICAL AGENTS
OPTAKT
Background learning
None — only works when prompted
Three-phase sleep cycles —€” dreaming, reflection, consolidation —€” continuously improve the knowledge base
Memory
Flat context or simple RAG
Four-layer architecture where knowledge migrates upward as it proves valuable
Context cost
Every token billed at full price every request
Provider-optimized caching — stable knowledge reads from cache at a fraction of the cost
Knowledge capture
Conversation vanishes after session
Programmatic gates: research before action, knowledge capture after. Nothing learned is forgotten
Search
Keyword or single-embedding vector
Three-signal fusion: full-text, semantic, and knowledge graph search merged by relevance
State / execution
Monolith — crash loses everything
Core owns state, Engines execute. Crash-only peripherals — auto-restart, zero state loss
Context horizon
Fixed window, starts from scratch
Four reduction events maintain infinite horizon at bounded token cost
Alignment
System prompt with guardrails
Constitutional values + governance + programmatic tool gating chain
Credential security
Secrets in environment variables or plaintext config
Encrypted at rest, operator-gated decryption, injected by name —€” LLM never sees secret values

See it in action.

We deploy tailored AI agents for service businesses. Your workflows. Your data. Your agent.

Copied!
@maxintechnology