Digital Employee - Core

TODO: What is Core?

Your Digital Employee combines the speed and reliability of automation with human-like reasoning and context awareness. It can:

  • Identify itself with a name, email, and job title

  • Take action using integrated tools (email, calendar, documents)

  • Think and adapt by breaking down complex requests, asking for clarification, and learning from memory

  • Delegate to specialists for complex workflows

  • Operate safely under governance controls with human oversight

By understanding these core capabilities, you can confidently collaborate with your DE as a trusted member of your team.


1. Identity: Who Your Digital Employee Is

Every Digital Employee has a professional identity, just like a human colleague:

Name

Your DE has a recognizable name (e.g., "Claudia"), making it easy to refer to naturally in conversations—just say "Ask Claudia" instead of using technical IDs.

Email Address

Each DE has its own corporate email address (e.g., [email protected]). This allows it to:

  • Send and receive official work emails

  • Participate in calendar invitations as an organizer or attendee

  • Integrate with access control systems

Language

Your DE can be configured to communicate in a specific language, ensuring seamless collaboration with global teams. All its messages, reports, and emails will be in the language you set.

Job Title

The DE's job title (e.g., "HR Recruiter Assistant") clearly defines its role and helps colleagues understand its responsibilities and limitations.

Job Description

A summary of what the DE can do helps you know when to involve it. For example: "Assists with recruitment processes, including CV screening, interview scheduling, and candidate communication."

Job Instructions

Behind the scenes, your DE follows explicit operating procedures that define:

  • What actions it can take independently

  • When it should ask for help

  • What information it must never share


2. Tools: How Your Digital Employee Takes Action

DEs use Tools—individual integrations with enterprise systems—to perform specific tasks.

Single Tool Execution

Your DE can execute discrete actions through integrated APIs, such as:

  • Sending an email via Gmail

  • Creating a calendar event via Google Calendar

  • Querying a database

Example: When scheduling an interview, the DE uses the Google Calendar tool to check availability, the Gmail tool to send the invitation, and a database tool to retrieve candidate details.

Key Features:

  • Tools have clear inputs and expected outputs

  • Errors are handled gracefully (e.g., timeouts trigger fallback actions)

  • All tool usage is logged for transparency

Pre-Built Tool Integrations

Your DE comes with ready-to-use integrations for common enterprise systems, including:

  • Google Drive – File storage and retrieval

  • Google Mail – Email management

  • Google Docs – Document creation and editing

  • Google Calendar – Event scheduling

Built-in Tools include specialized utilities like:

  • GitHub search (commits, issues, pull requests)

  • PDF/DOCX readers

  • Web search

  • Python code execution

  • Data validation tools

Benefits:

  • Saves development time—integrations are pre-built and tested

  • Uses secure OAuth 2.0 authentication with minimal permissions

  • Includes documentation and health checks

PDF Generation & Email Distribution

Your DE can generate PDFs from Markdown documents and send them via email.

Example: Creating a report from notes and distributing it to stakeholders.

Capabilities:

  • Convert Markdown to PDF while preserving structure

  • Send emails with PDF attachments

  • Track delivery status (sent/failed) per recipient


3. Agents: Delegation to Specialists

Your DE can delegate tasks to specialized subordinate agents.

Subordinate Agent Delegation

For complex workflows, the main DE delegates to specialists with focused expertise.

Example: When evaluating a CV, the main DE delegates to cv_eval_agent (the specialist), receives the score back, and decides whether to proceed with an interview.

Key Features:

  • Structured task handoff with clear input/output

  • Full audit trail (main DE → specialist → result)

  • Graceful error handling (timeouts trigger escalation)

Configurable Maximum Steps

To prevent infinite loops, the system limits delegation depth (default: 5 levels).

Example: If Agent A delegates to Agent B, which delegates back to Agent A, the system terminates with a clear error.

Minutes of Meeting (MoM) Agent

A specialized agent automatically generates and distributes meeting minutes.

Workflow:

  1. Retrieves meeting summary from Meemo (meeting recordings platform)

  2. Extracts key points, decisions, and action items

  3. Formats into a standardized MoM document (DOCX/PDF)

  4. Distributes via email to all participants

Example:

  • After a weekly team meeting, the MoM agent generates a PDF titled "MoM_Weekly_Team_Sync_2025-01-20.pdf"

  • Email subject: "[MoM] Weekly Team Sync - 2025-01-20"

  • Email includes: Brief summary, action item highlights, and attached PDF

Key Features:

  • Applies company branding (logos, formatting)

  • Handles incomplete data by escalating to supervisor

  • Logs all actions for compliance


4. Memory & Cognition: How Your Digital Employee Thinks

Your DE doesn't just execute commands—it reasons, learns, and adapts.

Request Decomposition

Your DE can break down complex instructions into clear, ordered steps.

Example:

  • You say: "Schedule a 30-minute interview with the candidate next week and send me confirmation."

  • DE breaks it down:

    1. Look up the candidate's calendar

    2. Find a 30-minute slot next week

    3. Create a calendar event

    4. Send calendar invites

    5. Send email confirmation

Tool & Skill Selection

The DE automatically selects the right tools for each step.

Example: For arranging a meeting, it uses:

  • Calendar Lookup tool → Check availability

  • Event Creation tool → Create the meeting

  • Email tool → Send confirmation

Ambiguity Handling

When a request is unclear, your DE asks for clarification instead of guessing.

Example:

  • You say: "Schedule a meeting with Alex next week."

  • DE responds: "I found two people named Alex (Alex Tan and Alex Garcia). Which one should I invite? Also, how long should the meeting last?"

Escalation

When the DE encounters a problem it can't solve (e.g., tool errors, unresponsive users, security constraints), it escalates to a human supervisor.

Example:

  • Situation: Urgent meeting request, but you haven't responded to clarification questions for 4 hours.

  • DE Action: Sends a summary to your supervisor: "I could not complete the urgent meeting request due to ambiguity. The user is unresponsive. Please intervene."

Knowledge Base Access

Your DE retrieves information from configured documents and policies to provide accurate, fact-based answers.

Example:

  • You ask: "What is our paternity leave policy?"

  • DE responds: "According to the Employee Handbook (Section 5.3), eligible employees receive 2 weeks of paid paternity leave."

Key Features:

  • Cites sources (document name, section, page)

  • Indicates when information is unavailable

  • Respects access permissions (you only see what you're authorized to view)

Private User Memory

Your DE remembers your personal preferences privately—no one else can access them.

Example: You tell the DE: "When summarizing my daily emails, always list the ones from the engineering lead first." The DE applies this only to your summaries.

Shared Team Memory

Your DE also stores information meant to be shared across your team.

Example: After a meeting, your manager says: "The Q3 report deadline has moved to October 15th." Later, when another colleague asks, "When is the Q3 report due?", the DE correctly responds with the updated deadline.

Private vs. Shared:

  • Private: Personal preferences, health details, financial matters

  • Shared: Work updates, team logistics, organizational policies


5. Governance: Security & Oversight

Governance Module (Details in separate technical documentation)

Your DE operates under strict controls:

  • Role-Based Access Control (RBAC): Only accesses tools it's authorized to use

  • Guardrails: Prevents harmful actions (e.g., won't share personal contact information)

  • Audit Logs: Every action is recorded for transparency

  • Human-in-the-Loop (HITL): Escalates critical decisions to supervisors

Last updated