The irreducible epistemic atoms underlying the curriculum. 4,828 atoms across 8 types and 2 molecules
Document one alternative method or backup person who can execute your constraint step at 80% quality to serve as capacity buffer during disruptions, rather than pursuing redundancy everywhere.
Rank operational habits into three tiers (minimum viable, performance-improving, optimizations) so you know which to preserve under moderate disruption (tiers 1-2) and severe disruption (tier 1 only).
After disruptions longer than two days, triage accumulated items (actionable + time-sensitive, resolved itself, archive) before chronological processing to eliminate waste from self-resolved issues.
Restart operations sequentially after disruption by adding tier 1 first, confirming stability, then adding tier 2, then tier 3, rather than attempting simultaneous restart of all habits.
Run operational systems at 70-85% of measured capacity to maintain adaptive buffer, because systems at full utilization cannot absorb environmental change without breaking.
When operational maintenance is scheduled at a time with no buffer, no reminder, and no fallback slot, add redundancy through a primary slot, backup slot, and automated reminder rather than increasing willpower.
Pre-load support structures during the phase before a known cyclical trough rather than attempting to maintain behavior through willpower during the trough itself.
When validating redundancy in human systems, test backup paths during normal operations rather than waiting for primary failure, as untested redundancy often fails precisely when needed due to skill atrophy or outdated procedures.
When two systems appear redundant but share a common power source, network segment, authentication service, or human operator, treat them as a single point of failure with cosmetic duplication rather than genuine redundancy.
Design triggers to work at your minimum cognitive state (tired, distracted, depleted) rather than your maximum state, because triggers must function when you need them most.
When building any recurring system (workflow, habit, routine), design an explicit degraded-mode version that preserves core function at reduced scope before the system encounters its first disruption.
For every important recurring process, design three explicit operating modes—full, reduced, and minimal—where each preserves progressively less fidelity but never loses continuity.
Define transition triggers for each operating mode that specify when to shift from full to reduced, reduced to minimal, and—critically—from degraded back to full operation.
Test degraded operating modes during periods of abundant resources to verify they preserve core function, because modes that fail under calm conditions will certainly fail under stress.
Practice running processes in degraded mode occasionally even when not required to rehearse partial failure, making the transition familiar rather than frightening when real constraints force it.
For every important process, document five components of recovery: failure mode specification, detection trigger, ordered recovery steps, recovery time target, and verification check.
Set Recovery Time Objectives (RTO) that define maximum acceptable downtime and Recovery Point Objectives (RPO) that define maximum acceptable data loss before a failure occurs, not during crisis.
For each active goal, define an explicit error budget specifying how many misses, delays, or quality drops per period are acceptable before triggering system review, converting brittle expectations into resilient ones.
Before delegating a cognitive task to a tool, classify whether the delegation is appropriate (tool does it better and verification is easy), convenient (saves time but you could do it), or critical (you cannot perform it without the tool), because critical delegations create capability gaps when tools fail.
For critical tool delegations where failure would compromise your effectiveness, maintain periodic unassisted performance of the delegated capability to prevent atrophy of the biological skill, treating the practice as architectural redundancy rather than inefficiency.
When values-aligned work produces difficulty without depletion, interpret sustained difficulty as confirmation of alignment rather than signal to quit—genuine alignment enables voluntary acceptance of costs.
For recurring commitments with documented histories of failure, install multiple reinforcing commitment layers (pre-commitment + device + public accountability + implementation intention) rather than relying on any single mechanism, because commitment failures typically result from alignment of multiple weaknesses not single-point vulnerabilities.
Select which commitments receive identity-level anchoring based on three criteria: values alignment (expresses core values), long-term directionality (points toward desired future self), and resilience requirement (needs to survive serious adversity), limiting identity-anchored commitments to 5-10 total.
Define identity at the level of values or principles ('someone who values physical challenge') rather than specific behaviors ('a runner') to enable commitment evolution without identity rupture when circumstances force behavioral change.