The Promotion-Containment Continuum
by Nick Clark | Published March 27, 2026
A promotion-containment subsystem within the cognition architecture confines disruption arising in any one operational domain so that it does not promote into adjacent domains. When a domain enters a disrupted state — sustained displacement toward unchecked promotion of speculation or toward suppressive containment of all speculation — the subsystem locks the affected channels, withholds the disrupted content from cross-domain integration, and engages graceful degradation in the dependent domains so that they continue to operate from their last verified state rather than ingesting corrupted inputs from the disrupted neighbor.
Mechanism
The promotion-containment mechanism operates over a topology of cognitive domains, each with its own promotion-containment balance. A domain occupies a continuum bounded at one extreme by promotion-dominated operation, in which speculative content advances toward verified status without adequate validation, and at the other extreme by containment-dominated operation, in which all speculation is suppressed and the domain becomes unable to generate forward inferences. Healthy operation in any single domain occupies a dynamic equilibrium near the center of this continuum, with the ratio of promotion events to containment events fluctuating within a domain-specific tolerance band.
Disruption is defined as sustained displacement of the ratio outside the tolerance band, persisting beyond a domain-specific dwell threshold. When disruption is detected, the subsystem performs three coordinated actions. First, it marks the domain as disrupted and records the polarity of the disruption — promotion-dominated versus containment-dominated — along with the trajectory leading into it. Second, it locks the cross-domain promotion channels that would otherwise carry inferences, beliefs, or state updates from the disrupted domain into its consumers; these channels are placed into a hold state in which buffered transit is allowed but no new commits propagate. Third, it signals the dependent domains to engage graceful degradation, in which they continue to operate using their last verified state from the disrupted neighbor rather than blocking on fresh inputs that would never arrive in usable form.
Containment is asymmetric with respect to direction. The disrupted domain is not isolated from corrective inputs; supervisory channels that carry validation, recalibration, and recovery instructions remain open and indeed are prioritized while the outbound promotion channels are held. This asymmetry permits the disrupted domain to receive what it needs to return to balance without permitting it to export the disruption into otherwise-healthy regions of the system.
Operating Parameters
Each domain exposes a tolerance band for the promotion-to-containment ratio, a dwell threshold defining the minimum sustained excursion that constitutes disruption rather than transient fluctuation, and a polarity-specific lock policy. The tolerance band is calibrated from the domain's healthy operating envelope observed during commissioning and is updated continuously by drift detectors that distinguish slow shifts in the operating regime from acute disruption. The dwell threshold is set short enough to catch genuine disruption before it propagates and long enough to ignore the brief excursions characteristic of normal operation under load.
Lock policies differ for the two polarities. Promotion-dominated disruption is locked aggressively because its outputs are actively dangerous: hallucinated facts, impulsive commitments, and mania-like over-commitment all produce concrete downstream actions if permitted to propagate. Containment-dominated disruption is locked more gently because its outputs are merely absent rather than corrupted: dependent domains can usually continue from cached verified state without ingesting actively wrong content. The asymmetry matters for system throughput, since aggressive locking of containment-dominated domains would unnecessarily halt large regions of the system in response to a quietly-stuck neighbor.
Recovery parameters govern the return from disrupted to healthy state. A domain re-enters healthy operation when its ratio returns to the tolerance band and remains there for a recovery dwell at least as long as the disruption dwell. Re-entry is staged: the domain first regains the right to commit to its own internal state, then to propose updates to its neighbors under elevated validation, and finally to resume unrestricted promotion. Each stage is gated by an integrity check verifying that the disrupted state did not corrupt persistent structures.
Alternative Embodiments
One embodiment implements promotion-containment at the level of individual channels rather than whole domains, so that a domain partially disrupted along one capability axis remains free to promote along its healthy axes. This finer-grained containment improves throughput at the cost of more complex disruption detection, since the ratio must be tracked per channel and the topology of inter-channel dependencies must be modeled to determine which downstream consumers are affected.
Another embodiment uses predictive containment, in which the trajectory of the promotion-containment ratio is extrapolated and channels are pre-locked when imminent crossing of the tolerance boundary is forecast. This trades occasional spurious locks for reduced propagation latency at the moment of actual disruption. A complementary embodiment uses retrospective containment, in which downstream consumers retain enough provenance to invalidate and roll back state that was promoted from a domain subsequently determined to have been disrupted at the time of promotion.
A federated embodiment distributes the disruption-detection function across the consumer side rather than centralizing it on the producer, so that each consumer maintains its own assessment of each upstream domain's reliability and locks intake accordingly. This embodiment is appropriate where the producing domains are operated by parties not trusted to detect their own disruption.
Composition
Promotion-containment composes with channel-locked promotion to provide the locking primitive on which containment is enacted: when the subsystem signals that a producer is disrupted, the channel-lock subsystem holds the corresponding promotion channels without losing buffered content. It composes with graceful degradation so that locked channels do not stall their consumers; instead consumers fall back to cached verified state, to lower-confidence alternative providers, or to explicit unavailability annotations carried into downstream reasoning.
The subsystem composes with the disruption-modeling layer that supplies the operating-state classifier, with the depth-profile admission policy that controls what content is even eligible for promotion in the first place, and with the confidence governor that gates committing actions on output confidence. Together these compositions produce a system in which local disruption is observed, contained, communicated to dependents, and recovered from without producing system-wide disruption from any single domain's failure.
Prior-Art Distinction
Prior approaches to fault containment in cognitive systems generally treat disruption as a binary failure of an entire model and respond by failing over to a backup, restarting the model, or surfacing an error to the user. None of these approaches model disruption as a continuum, none distinguish the polarity of disruption, and none provide asymmetric channel locking that preserves supervisory pathways while blocking outbound promotion. Software fault-containment patterns from distributed systems contain crashes and exceptions but do not contain the more subtle failure mode in which a component continues to produce outputs that are syntactically valid but semantically corrupted by sustained imbalance in its internal dynamics.
The present mechanism differs by mapping disruption onto a measurable continuum, by locking promotion asymmetrically with respect to direction, and by composing with graceful-degradation primitives that allow dependents to continue operating from verified prior state rather than failing in sympathy with the disrupted producer.
Implementation Considerations
The promotion-to-containment ratio is computed over a sliding window whose length is itself a tunable parameter. Short windows respond quickly to genuine disruption but produce noisy estimates that risk spurious lock-engagements; long windows produce stable estimates but lag in detecting acute onset. Practical deployments use a hierarchy of windows, with short windows feeding a fast-path detector that lock channels conservatively and longer windows feeding a slow-path classifier that confirms or releases the conservative engagement. The hierarchy permits low-latency response to clear disruption without committing to long-duration locks on the basis of noisy short-window observations.
Observability of the promotion-containment state is essential for operations. Each domain emits a continuous telemetry stream of its current ratio, its trend, its dwell within or outside the tolerance band, and its currently engaged lock state. Operators receive alerts when domains approach the tolerance boundary, enabling proactive review before automatic lock-engagement, and receive post-incident summaries when locks engage and release. The telemetry forms the basis for retrospective recalibration of tolerance bands and dwell thresholds as the system's healthy operating envelope drifts under changing workloads.
The interaction with downstream graceful-degradation policies merits explicit design. Each consumer of a producer's promotion channel registers a degradation policy specifying its preferred fallback when the channel is locked: continue from cached state, query an alternative producer, mark the dependent inference as unavailable, or escalate to a human operator. The degradation policy is consulted at lock-engagement time rather than imposed uniformly, allowing the system to respond to disruption with the action most appropriate to each consumer's downstream obligations.
Disclosure Scope
The disclosure encompasses the promotion-containment continuum as an operating-state representation, the dwell-thresholded disruption detector, the polarity-specific asymmetric lock policy, the staged recovery protocol, the channel-grained, predictive, retrospective, and federated alternative embodiments, and the compositional interfaces with channel-locked promotion, graceful degradation, depth-profile admission, and the confidence governor. The scope extends to any cognitive architecture organized as a topology of domains in which local disruption is detected via a promotion-to-containment ratio and contained from cross-domain propagation by direction-asymmetric channel locking with supervised recovery.