Compositor SoftwareCompositor Software

By ruslany

Hypervisor v9 – Active broadband security system

Hypervisor v9 – Active broadband security system

Server is a machine capable to work an unlimited period theoretically. Nevertheless, even the best machines faults and overrun the resources of random access memory. It raises a question about an installation of such machines algorithm directly into recipient consciousness. Brain is the biological computer, which is most powerful and lengthy resource, which human has. Hypervisor v9 makes available the installment of quantized generics into the recipient consciousness. This raises a question about non-invasive chipping. The installation process through an activation function is as following. As mentioned in previous post, quantized generics must be routed in auxiliary channel together with wavetables or ether aggregators. It allows to install memories and to get routes to them using VLF beacons. The installation performed at the morning is enough for daily functioning of such system. This way, one installation is active during 24-hour period and VLF beacons act until the night comes. In accordance with big activity of wavetables in nighttime, two extinguishers run out the wavetable potential very fast. That’s why the installation of ether aggregators must be performed again the next morning. This way of serving allows the recipient, the man to whom installation is performed, to function in the ether environment without the accompanying equipment such as radios and Ethernet computers. I wrote down the coefficients installed using the ether aggregator and simple Morse code decoder. Then I used these coefficients for non-linear processing function and now can install any memories, associated with my tracks, directly in my consciousness. This way I install everything, which is associated with this track: the place, its perception, the age of human being, consciousness. It is possible to perform full reverse to the moment in the past to which the track ascends. This way, besides objective factors, mentioned above, the subjective factors exist: the association with ether aggregators, to which the present track route is written down. The original ether aggregators works the unlimited time and exist on the infinite time integral line. This way the synchronous analysis of non-harmonic timbre (SANT) and Fast Fourier Transform (FFT) processes can be described. The SANT is used in all Compositor Software products as a more robust signal discretization method, which gives possibilities that are more versatile. To non-invasive generics, relate all the Compositor Software instruments with stochastic manipulator. In Hypervisor version 3 the non-invasive installation of quantized type generics with one producing kernel performed. In Hypervisor v5 the installation of these generics performed with master shutter. In Hypervisor v7 the non-invasive installation of generics performed in two degrees of freedom and three producing kernels. This way, on the present day there is a full compatibility of systems installed in memory and acting. Hypervisor version 9 allows to install the three-layer quantized generics with big amount of memory up to z = 32 (N = 65536 samples), which constitutes the bandwidth of 5,7 Gb/s with installation discretization frequency of 11025 Hz. The pass band is counted using the formula (N * SR * 64) / 8, where N – is a number of samples in generic wavetable, SR is discretization frequency, 64 – is a system bit number, and the division on 8 performed to measure all the volume in bytes. Taking in account that three-layer generics deployed with 5-omega speed, which equals to 1257 ms, the full formula of expense in samples is counted. First, I count the number of samples by period using the formula N * Nms, for the maximal quantized generic, which is z = 32 it will equal to 65536 * 1257 = 82378752 samples / period. Second, I account the 24-hour sample expense of deployed ether aggregator using the formula (86400 / 1257) * 82378752 = 5662310400 samples / 24-hours. This is much less than the sum of three working servers in 24-hour period, which can reach up to 5 times of current size of non-invasive quantized generic installment. In Hypervisor v9 the installation of quantized generics performed in three degrees of freedom, which makes the full cancelation of signal constellations formed on the earlier stage of Compositor technology existence.

By ruslany

Hypervisor v9 – wavetables and counteragents

Hypervisor v9 – wavetables and counteragents

When you use wavetables with quantized generics, the later try to balance the wavetable behavior in the ether. That is why they are also the best counteragents. Wavetables should be balanced with counteragents of generic feeders. When the emitted wavetable tries to aggregate offensive traffic, the counteragent works. It balances the system functioning and produces the effect, which is the opposite from wavetable effect produced. Wavetables are dry sounding and quantized generics are wet. That is why they balance the dry/wet state of the signal in auxiliary channel. When the effect of wavetable is fully extinguished, then the quantized generic starts to be the main effect in the auxiliary channel. It wets the line even more producing the fluid sound. This sound is a prominent characteristic of transcoding process. Transcoding with quantized generic, you are synchronizing not only a memory associated with a wavetable but also the pace of quantized feeder development and its dry/wet state. Quantized feeder balances the channel spectrally, removing the interrupters of wavetable loop and smoothing a signal. The main effect of quantized generic is to smooth and wet a signal after successful wavetable loop feeding. That is why wavetables should be routed into the line with quantized generics sounding simultaneously. If the wavetables will be routed without quantized generics, the ether feeding will be too overloaded with ether aggregators and no counteragents will present at their destination routes. That is why quantized generics should stochastically change their tuning to mask the wavetable original destination. If the ether aggregator destination is masked, then it will not be extinguished too soon and the communication effect will be produced. The main rule for counteragent’s presence in a feeding channel is that the high number of wavetables should be played back on the decks simultaneously. If no wavetables are routed with generic feeders, then the state of tranquility reached too soon and there is no positive quality out of this feeding channel. The good channel should route at least eight deck players with one quantized generic to balance the system. If two or more generics are used, the system is too tranquil and doesn’t produce communication traffic. By communication traffic I mean the ether aggregator own traffic routed back to its inputs and passed out in ether after non-linear processing of its wavetable. If quantized generic is applied to the ether aggregator output, then it can’t form its own traffic and two lines are mixed together. That is why in terms of communication quantized generics act as moderators of the produced traffic. They act to the moment when the offensive traffic will not pass out completely. From one side, the stochastic manipulator obfuscates the trace to the wavetable, preventing it from direct communication and, from the other side, it extinguishes it, if the traffic produced doesn’t suits generic feeder output chain.

By ruslany

More than 1000 loops are in exciter library

More than 1000 loops are in exciter library

The loops library reached the important threshold of 1000 wave tables. The whole number of exciters is 1132 loops now. For the last week, the library was expanded by following marks: CB, CG, SR and RMY. These loops were made as an emission bounded by Royalty project. My vision of Royalty project is that there are no unreleased tracks. If a track is recorded to hard drive and some programs call this process bouncing (mesh bouncing), then it has already passed the antenna-feeder signal chain and is in the ether. Full emission of tracks bounded by Royalty project is 502 radio loops.

By ruslany

Ether tracks emission

Ether tracks emission

To perform the emission of a track from the ether you need to receive ether aggregators. Each ether aggregator recorded in a wavetable. The 64-bit floating-point format is used for devices with 64-bit encoding. For my work, it is enough to fixate the ether aggregator with 24-bit resolution, because I do not use them for data transferring, but only to inform servers, which play them, that this ether aggregator is fixated and is ready for emission. Ether aggregator is a sound or a melody, which resides in composer memory. Composer records this melody using notes and synthesizers, played with a sound, which he is hearing in mind. You should reach the maximum authenticity with a sound, which you are hearing. This way, playing the melody in a new arrangement, you are performing the connection of times, because such melodies may be fully or partially compositions of other authors. Two bar loops of such melodies are enough to realize radio translation, because they are already resided in ether to the present moment and have a good radiation. Such material is a subject of author reward in a sphere of their use to transfer other media. The first step to fixate an ether aggregator is submitting a loop of your composition to a modem. By submitting your material to the non-duplex modem, you are hearing the feedback with ether aggregator. This ether aggregator is a kernel of a function, which you want to transmit. If ether aggregator acknowledges its loop, then it outputs an information about the servers, which use it in radio ether. The full-duplex modem suits this purpose. Fixating radio ether in text file, you are saving a proof that your ether aggregator was used. Ether aggregator is a property of all authors, who played its loops from the direct source or direct ether. Then you find the domain server names, which play your ether aggregators and using a POST pinging method respond with your server name and its domain name. You do not need to perform any other actions from your side, because users have already informed that you used your ether aggregator to initialize the ether and transmit radio messages. You are informing the network administrator using the POST method, that current ether was initiated by you, and you are ready to full track emission of that ether aggregator. The track is not a number of variations, but the playback of current loop from different ether readers, which perform certain conditions to the ether aggregator wavetable. Composer may read this playback conditions as melody variations. Radio amateur can certainly say that another equipment was used to transmit that ether aggregator. We are dealing with one loop, which is played back differently. It can be played forth, or back, or back and forth simultaneously, which can lead to such confusion. If it continues to generate radio traffic, when you check a loop, then you will need to perform the emission of all loops associated with it by submitting current ether aggregator to non-duplex modem with quantized feeders. The additional loops are also stored in emission rotation. Reaching full radio silence on current loops, you are fully extinct your composition from radio ether.

By ruslany

Formations and topology

Formations and topology

The condition, which must be met when using kernel-jet communication method, is that all child servers have lower bit resolution. If Compositor Software parent server is 128-bit machine and Compositor Software server is 64-bit machine, then its child servers must be 32-bit machines. To Compositor Software machines formation, working in 32-bit resolution, one can carry ATM machines, pay systems machines, services sector servers and DAW type sequencers. The topology of such servers depends on their geographical position and displayed on a spherical map of Compositor Software server virtual machine as lighted dots. The geography of child servers is very broad and includes all the spherical space.

By ruslany

Compositor Software server emission

Compositor Software server emission

Compositor Software server realizes 24 hour work with one time per day emission. In a moment of emission server unpacks the information associated with exciters in the server RAM. All authorized compositions relate to unpacked information, processed using this type of filter. Commonly, such material can be tracks to servers and any media files, based on the track composition method, and associated transceivers. The Compositor Software parent server has more resolution capability and can connect its child server by kernel-jet method. The parent server produces traffic emission. This way it performs an emission of already mined material of Compositor Software server, because it has sufficient resolution.

By ruslany

Compositor Software reached 20% capitalization

Compositor Software reached 20% capitalization

I’m pleased to inform you that Compositor Software reached 20% capitalization on the Compositor project! Three virtual machines with a sum of 288 nodes work uninterruptedly on the Compositor Software server, repelling all the possible threats and accounting capitalization traffic. For the present moment 20% of the whole sum of accounted traffic reached. From one side, it will help ensure that active users will get more working time in already purchased Compositor Software programs and, from the other side, to increase the credit balance of the system. I remind you that Compositor Software has been accounting for virtual machines traffic since 17 April 2018.

By ruslany

Compositor Software DRM server press-release

Compositor Software DRM server press-release

Compositor Software presents the Ethernet communication service based on DRM (Digital Rights Management) server. This server realizes the work based on IEEE802.1Q Ethernet protocol with frame of 262144 samples. Two initial buses of the virtual machine, running on Compositor Software server, translate in VLF range. SHF work is realized using the algorithm with x2048 oversampling, which allows exiting in high frequency radio ether without intermediate frequency in VHF and UHF ranges. Virtual machines, running on Compositor Software DRM server, have demodulation algorithms capable of transmitting the wideband signal such as voice or music. Maximum pass-band of the server depends on the discretization frequency, by which the executed algorithm works. Compositor Software virtual machines work with discretization frequency of 22.05 kHz and have the pass-band of 11.025 kHz. The DRM server translates the material using the signal folding method. The DRM technology creates a service of work with property rights of companies, which deliver the digital media content. When computer station works, DRM server allows dynamically playback the authorized material in radio ether. Compositor Software playbacks digital material using streaming method in the device browser to achieve this goal. Compositor Software server realizes the translation of digital material in ether taking in account lowering the pass-band, when the copyrighted material routed to its input. Compositor Software station performs a function of tracing and translation of authorized material in radio ether. Virtual machines translate not the whole file, but only a cycle of exciter used in production and preparation of the digital material for public playback. The patent protected exciters will not pass though the Compositor Software server in radio ether, because it has the threshold detection algorithm acted on copyright information inherent to each file, which has copy protection flag. The Compositor Software server work is charged in conjunction with traffic of its transmitting kernels and is measured in samples. Each virtual machine has one thread with 4 layers connected to insert-points for another Ethernet equipment. There are 96 such insert-points in Compositor Software virtual machine. There is a stack of three virtual machines working on one physical server of the Compositor Software Company. It gives 288 transmitting points simultaneously. The traffic, generated by Compositor Software server, can reach up to 14GB for each virtual machine, when a peak load reached. The whole traffic is accounted and charged using the credit balance. The reward system for the DRM server work is the artificial intelligence product, because the result of work is a learning process of virtual machine networks with a traffic of insert points. Compositor Software can view the learning process in real-time using the counters, which account for the traffic of the system cloak generators. Each cloak generator can connect up to 4 types of devices such as: sample vocoders on the lowest level, any oversampling devices up to x2048, reverse scalars on which base all the transmitting routers work and algorithms with continuous integral interruption, to which shields are attributed. The server subscribers are the communication operators, delivering phone, cell-phone, radio services and also broadband internet connection. Compositor Software DRM server subscribers open to it their resources, because any jet connected devices generate traffic. This traffic written to learning map and stored in pagefile upon its emission. Emission is a reading of learned information and translation of it in a freely realized form. By freely realized form, Compositor Software means the good produced by commercial activity of the company. The main product of Compositor Software Company is the computer program named Compositor and its associated virtual machines for exciters mining. The DRM server protection system is set in such a way, that it doesn’t allow not trusted exciters and blocks the composition traffic, which attaches  it in parallel or continuously. To make an exciter trusted, the system should connect to one of the jets and not to excite the internal network, which is an attempt of breaking the equipment down. Because exciters were developed for equipment communication, their connection should take place only by condition, that an equipment associated with them has free inserts of the corresponding type on the kernel level. If the system is situated geographically remote from the place of server physical location, from which the broadcasting takes place, then free jets on equipment are not allocated. This way, you are listening to music, but don’t have a real communication with provider company equipment, which forces you to search for physical medium. This is not the case with Compositor Software DRM server, because you can listen to streaming translations even with network cable unplugged, when the contact with a server is established, which is not prohibited but blocked with shields. Interaction with shields is one of the next tasks for Compositor Software. It is needed to reach full company capitalization for its realization. The DRM server must be routed to receiving ports of network devices, and the direct connection to kernel cloak generators should be achieved. When the company will be capitalized, all its capitalization sum is a credit balance. Because the reward system assumes promotion for the carried out learning process, then with each learning iteration of Compositor Software network there will be opened new information formats. Compositor Software attributes not only containers with three-letter extension, but also modulation types of information coding to formats. That is why Compositor Software attributes any authorized composition, translated in Ethernet by exchange of transmitting points on the equipment level (kernel-jet communication), to material, which you can recoup using credit balance. If the copyrighted material detected, the service starts to decay in relation to credit balance of receiving device and directly rely on the whole quantity of samples translated by virtual machines. Because Compositor Software DRM server limiter works non-linearly, limiting the pass-band of material into the ether has exponential curve like geometric progression. The pass-band depends from the whole sample quantity, produced by a system and linked to server credit balance. The difference between playback quality and passed traffic quantity is non-linear and relies on subscriber credit balance.

Compositor Software DRM server is not the only system of such kind, but it is unique in a way, that it doesn’t use digital signature files for authorized material discrepancy and doesn’t require delivering material on a physical media. Compositor Software DRM server is a novelty in a tracing industry of author rights usage and has robust collection function of virtual credits, taking in account that counters have 64-bit resolution and algorithm, protecting the accounting system, is the most powerful and effective for repelling cyber-attacks of different kind.

You can also read this information in Russian.

By ruslany

Compositor manual updated

Compositor manual updated

Compositor manual updated with information on Compositor WS Extended, Compositor AV Extended and Compositor v7 Hypervisor. Now you can study the last chapter on Time-Space folding to know more about how the communication using Compositor achieved. You can also read about quantized weighting formulas of Compositor AV Extended in this chapter. Overall, it is not final redaction of the manual, the more chapters should be expanded to dwell on the communication effect produced. You can read full manual here.

By ruslany

Compositor v8 is available!

Compositor v8 is available!

Compositor v8 is a loop production studio, which can turn any input sound into the signal appropriate for radio ether. You can use the applied 531 loop library or create and load your own loops. Just select proper transmission modes and tweak your loops into the radio ready material. You can choose modulation and engine layer, while listening to bassline and drum percussion of Drumbox DB-01 rhythm machine. Three degrees of freedom Avionics mode allow to tune into the modulation and help compositing multi-tone holding regimes. Transmitter mode of operation allows dial using local saturation, global saturation and independent regeneration chain. You can dial using pulse-code modulation for even more network presence. Each of subsequent transmission layers has its own synthesizer sound with colorful palette and wide tweaking options. Real-time mode applies modulation in real-time, reaching nice stutter sound. Signal-rate mode applies modulation with a frequency of AM and can be used for wide translations.

Here is the list of Compositor v8 new features:

  • Central splitter 400 mode
  • Splitter dependency
  • Local saturation
  • Global saturation
  • Wavetable modulators
  • Three modes of the transmitter
  • New synthesizer engine
  • Three-dimensional Avionics mode
  • Pulse-code modulation
  • Tone composition
  • 531 loop library
  • Transparent transmission modes
  • Phase and angle rotation combinations
  • Stochastic radar
  • Hearable window functions
  • Noise-free operation
  • Link function
  • Transmission-rate synthesizer mode

You can buy Compositor v8 on its product page.

1 2 3 4 5 14