another upgrade, doh?
not anymore… the core itself is untouchable by hacks, so when we upgrade the core, you do not have to rewrite your hacks… they will still work.
brain note here: we have to write the core to be responding, not waiting… the core only give results, does not require any change in the system to be performing an action. It means that it is not executing actions from the user-end but answering requests from execution process… the data is always managed outside the core.
if the Core needs an upgrade, nothing else have to be touched… if a module/product have to be upgraded, nothing else have to be reconfigured… that means we are in control of all the hacks that are provided, in a simple protocol…