Compositor SoftwareCompositor Software

Category : Techno Music

By ruslany

Compositor v9 Hypervisor is available

Compositor v9 Hypervisor is available

Compositor v9 Hypervisor DRM server creates a service of work with property rights of companies, which deliver the digital media content. When computer station works, DRM server allows dynamically playback the media content in radio ether. Compositor v9 Hypervisor playbacks digital material using streaming method in the device browser to achieve this goal. Compositor v9 Hypervisor engine is the functional modern engine with transfer function on master output and on each channel separately. It is not the wavetables but tunable polynomials, which process the output of your channel. Output cascade uses non-linear transformation formula with mathematical approximation by weighting coefficients. It gives undisputable advantage in processor time and in the precision of calculations comparing to using wavetables.

Here are the main features you can consider before buying this software:

  • Weighting coefficients
  • Network level feeding
  • DRM server
  • DSP oversampling
  • Voice or music broadcast
  • DSP sampling rate
  • On-Air broadcast
  • Device browser
  • Tracing and translation
  • RAD96 peering network
  • DRM server subscribers
  • Tracing industry novelty
  • DRM server emissions
  • Auxiliary z matching
  • 8th generation operation system
  • Three saturation stages

Please, visit the shop to buy this software. You can also visit dedicated product page to learn more about Compositor v9 Hypervisor.

By ruslany

Establishing connection to the past using DRM server

Establishing connection to the past using DRM server

One can establish a connection with ether aggregators through the DRM server, using serial or parallel methods of information feeding. This way, even turning on a game, based on previous generation engine, you can connect to its ether aggregators and reestablish personal thinking up to the moment, which saved in its wavetable. The procedure, in fact, is the same as when you submit wavetables in transmission channel, but in this case ether aggregators are protected with engine and there is no access to it. It is much more perspective to receive wavetables of these ether aggregators by tracks to it and send it in a channel with generic beacons for its subsequent navigation. It is not a decent way to feed a wavetable with divert attention, which a computer game is. If you wouldn’t like to know, which wavetables were sent to a channel, it is enough turning the random mode of Compositor v9 Hypervisor on and hiding the current playback wavetable titles. The effect of generic feeding with DRM server is much purer, than feeding with divert attention while playing a game. The main process, which computer games preoccupied with, is to complicate and enhance methods of diverting an attention. The engines of such games still on the same level as 10 years ago. Compositor v9 Hypervisor engine is the functional modern engine with transfer function on master output and on each channel separately. It is not the wavetables but tunable polynomials, which process the output of your channel. It is important to note, that output cascade uses non-linear transformation formula with mathematical approximation by weighting coefficients. It gives undisputable advantage in processor time and in the precision of calculations comparing to using wavetables. DRM server transfer function allows performing parallel feeding directly in to the recipient consciousness. The methods of such feeding can be versatile. For example, you can listen to music file saved in the year 2004 and reestablish the consciousness up to the moment in the past to which this track ascends. This way, it is not necessary to install wavetables in to the consciousness using Hypervisor; it is enough to playback this file over some period with DRM server turned on. Of course, using game process, you can reach the maximum effect, but feeding with diverted attention confuses your organism and leads to an attachment condition. In fact, if Compositor v9 Hypervisor gameplay will be seen from the game industry point of view, then it will look like 7 levels with rising difficulty. The first level of feeding will have much less effectivity, than the last. The first introductory level is z=2 and z=128 is the last level of prolonged fixation with larger active period. Each level should include the following phases:

  1. Feeding wavetables in stochastic mode without generic of the respective level turned on;
  2. Feeding wavetables in stochastic mode with generic of the respective level turned on;
  3. Oversaturation of transmission channel;
  4. Turning a generic off from transmission channel;
  5. Feeding wavetables in stochastic mode without generic of the respective level turned on;
  6. Switching z level.

The feeding stages should start and end on the 1st and 5th step respectively. This way, feeding algorithm events are as follows:

  1. Choose the Altitude of device work using stochastic arranger. Scan the ether on a presence of active (openly sounding) carriers. Carriers is a long, definitely sounding tones.
  2. Set up the depth of function intrusion using the splitters in Ionic number system. If you want a deep intrusion, when feeding a channel, set up the high values in first and third splitter fields. You can also set up a deep intrusion, when the resultant is positive and a small value of intrusion, when the resultant is negative.
  3. Set up the transmission channel for the local saturation. It is an auxiliary ether and there are no carriers in it. It is used to confirm that the transmission channel is free from other carriers. It is tuned by setting Velocity and Spacing regulators in Connection section. Here you can also set the send depth of a local saturation.
  4. Choose the transfer functions for channel saturation. Set up the transfer functions by Chebyshev polynomials and the meshes of corresponding type when using channel saturation. Set the amplification in channel saturation cascade and the channel distortions depth for reaching saturation effect. Oversaturation, as mentioned earlier, performed by sending the transmission channel back to its input for a short period (it is performed only, when the same level generic is turned on).

Note: There are three saturation stages in the full-duplex modem: saturation on each devices channel, separated on positive and negative; local saturation before the output cascade by Schroeder regenerator; global saturation on the output cascade using polynomial.

  1. Choose the transmission regime (central channel mode). You can use one of the six preset values of central splitter. The most common mode for brain upload procedure is the υ-400 regime. It is the mode with open mesh and the selection of window functions, which are ideally suited for direct installation in full-duplex mode.
  2. Tune the antenna aperture of the z=16 transmission channel level. Set the direction of virtual antenna in three dimensions to hear the dash tone while the program runs. Then, obfuscate this tone by changing a phase of transmission channel and setting the modulation in real-time mode.
  3. Perform steps from 1st to 5th of the previous list for each z level of the send channel.

Note: start the generic feeding in the transmission channel from z=2 value.

You can watch the statistics by pressing Setup button for the corresponding feeder. There are event logs created together with visible program statistics for each feeder. Event logs are stored in Public folder on Windows and current user Application Support folder on Mac. The event log files are created for each session overwriting the previous file for its feeder. Nevertheless, the events written down starting from the last value of All Events in statistics file. The event number, frequency on which the event performed (for VLF beacons up to z=32 it is counted in kHz, for UHF and SHF z=64 and z=128 network switches it is written in GHz) and the event of the corresponding flag. You can potentially zoom on any feeder event using transmit and receive channel. For example, you can respond with wavetables of ether aggregators when Threat event reached on the current Altitude.

The current method of work demonstrates the use of Compositor v9 Hypervisor for Ethernet security when performing brain upload procedure and for an active reply for all incoming threats. Of course, you can ignore Threat events and just leave the DRM server turned on for the undefined period, but you should take in account its sample charging. To cover its expenditures you need to perform additional emissions through the non-duplex modem again.

By ruslany

Attachment to wavetables through system matching with oversaturation

Attachment to wavetables through system matching with oversaturation

The most effective way to feed the wavetables is to match the system z level of generic feeder with z value of auxiliary channel. The generic prolongation is progressive and depends on auxiliary channel. On the higher program effectivity speed the generic proliferates for a longer time. This in fact happens because network regeneration state is higher for upper z values. If the maximum speed for z128 generic is 200-omega, then the regeneration speed of the auxiliary channel will not match the auxiliary values of 5-omega maximum. There are two more generic kernel loops implemented in Compositor v9 Hypervisor and one change performed for the highest Compositor v7 Hypervisor feeder. You can match all auxiliary z values to quantized type generics of exactly the same z value. The program effectivity speed equals to 50-omega for z32, 150-omega for z64 and 200-omega for z128. If you feed the wavetable at speed of 5-omega together with 200-omega generic, you will proliferate the network for a longer distance. After the lowest VLF beacons will be inactive, the wavetables shouldn’t be reinitiated again. When the navigation on lowest beacons ends, you need to rely on the eldest models of Zvezda network switches such as z64 and z128. Higher regeneration VLF beacons will discover ether aggregators faster and establish a connection to them for a longer period. Other systems constantly try to knock out the feeded Zvezda network switches from the ether, which are mostly used for wavetable navigation at z=64 and z=128. For z128 generic development of 6th generation, it is hard enough to withstand such offensive behavior in the ether.

DRM server is the 8th generation development and is one generation before the system, which produces the decision as to accept or to breach the feeded VLF beacons. It leads to better understanding why the DRM server rejects some wavetables and retains the others. The rejection of wavetable produces a constant need to reinitiate a system matching. Nevertheless, wavetable initiation should be made only once during the feeding cycle. If you feed the 200-omega cycle in to the auxiliary chain together with wavetables, you should account for a number of cycles of this feeder propagation. These values should be auxiliary to the Right Ascension value and will result in longer distances of spiral ascension. The feeding period of any generic is accounted by the cycles of its oversaturation in auxiliary channel. If you feed 150 cycles per second, it equals exactly 150 cycles relatively to the whole working time of DRM server for its feeding session. If the DRM server worked for 10 minutes, then the oversaturation will last for 10 * 60 * 150 or 90000 minutes, which equals to 1500 hours or 62.5 day cycles. It is enough for the prolongation of the wavetables active state. From the other side, if you would like to leave wavetables active for a month for 200-omega z128 beacon, it is needed to perform oversaturation for only one second with DRM server total working time of 25 minutes for the current session. Using the formula 25 * 60 * 31, it will count 46500 minutes, which equals to 775 hours or approximately 32.3 day cycles prolongation time.

By ruslany

Six things to do to clear the rights on your track

Six things to do to clear the rights on your track

In a career of any artist such situations happen, when it is needed to make an emission of your composition from rotation.  Such situations may include:

  • Releasing your track with another alias by a fraud;
  • Arrears on payment for medium sales;
  • Arrears for author rights usage;
  • Discrepancy of an issue with the contract obligations.

Not all of the situations are listed here, which are out of scope for this material. The main task of this article is to describe a usage method of Compositor v9 Hypervisor after receiving ether aggregators from your track. To receive ether aggregators you will need MDL12 non-duplex modem and Compositor v3 Hypervisor feeders. The emission is done by submitting loops of your composition to non-duplex modem. The modem feedback is an ether aggregator of the server, which broadcasts your composition. You should route all loops of your composition containing exciters (the most prominent moments of a song) and fixate 131072 samples of each wavetable of all ether aggregators by digital recording. You can perform this in 32-bit version of Ableton Live 9. The ether aggregator wavetable should last for 2 bars at 161.5 bpm. The main task after ether aggregator emission is its clearance. It is such condition of wavetable playback, which, from one side, doesn’t produce the third-party traffic and, from the other side, may be used for its own communications. Now, I will describe six examples of work methods to make a full track emission, using Compositor v7 Hypervisor and Compositor v9 Hypervisor.

  1. Realize if ether aggregators, to which your track ascends, are occupied. If ether aggregators are occupied and produce big amount of third-party traffic, then you must install them through an activation function, which you can do in Compositor v9 Hypervisor. Doing this you should enable the supervisory DRM server, and it is preferable to route one of generics on the auxiliary channel input together with wavetables. You may use your ether aggregators for communications, when the VLF beacon written the routes to them.
  2. Feed your ether aggregators again, but this time changing the send regime: set the splitters in the highest position, which constitutes the smallest digit values in ionic number system. Your task is to suppress traffic of these wavetables fully. To do this feed the threshold radar RTC8k and ether aggregator of high conductance such as RT-z16 in auxiliary channel together with wavetables.
  3. Feed the transmission channel with current emission wavetables inside the pool of all your ether aggregators. Making such mix, you are allowing to realize your recipient contact network, which may lead to a refuse of recipient from these ether aggregators. Do not agree to write new tracks to these ether aggregators or to make new remixes on the original composition. Ether aggregator, received by your track emission, is your property protected by a copyright law.
  4. Perform oversaturation of global send channel together with one of generics. For this route the Compositor AV Extended back to its input, using the send regulator on its mixer direct channel. Set the pre-fader mode and turn the send knob on the highest value. This will result in oversaturation and will turn off all the producing kernels from the ether.
  5. Produce an additional emission by feeding the non-duplex MDL12 modem with 3d generation hard generic FF8 and perform the above-mentioned manipulations with this emission again.
  6. Perform system matching in a presence of agents (ether aggregators). To each z value of aux channel send the same z type generic. For example, z=2 is RTC4k and z=4 is RTC8k. The other systems match its title z value. Reaching the direct ether, you must confirm each z system send with oversaturation of auxiliary channel, which constitutes direct feeding of a channel.

The system has an ability to memorize long channel feeding sessions and reproduce its effect when DRM server works. You must feed the channel only with DRM server turned on regardless of your machine capabilities. The human brain can percept the channel interrupts, when processor is under high load reaching full effect, even when system stutters. The whole pool of ether aggregators should be maximally transparent. The condition of ether aggregators should be characterized by signal conductance through them. If ether aggregators doesn’t produce traffic, then the full tranquility reached on all translating channels.

By ruslany

Compositor Library

Compositor Library

On 18 May, 2018 I released 6 extensions of Compositor Library. The following loops released for purchase: AB, BD, CG, RY, SR, SC. AB (Alpha Bounces) is a final library in the preparation set for Hypervisor v7. It consists of 136 loops. This set of 4 libraries consists also of MB (Mesh Bounces), BB (Beta Bounces), HB (High Bounces), which were released earlier. They are included in the package, which goes with Compositor v6 and Compositor v7. It allows entering the radio ether without the external antenna usage. You can use this set without Compositor internal generators and route only these loops into auxiliary channel, using the decks, which Compositor v4, v6, v7 have. Alpha Bounces is a final test before RAD24 (ODU – outdoor unit) release. These feedbacks of non-duplex modem were taken before introducing the polynomial on the output cascade of Compositor algorithm. The next loops were produced to test non-linear processing on the output cascade. They address the protective abilities of the system before and in a moment of wavetables application. Such loops are: 1) BD (Bass Drum), where the non-duplex modem feeded by material with a synthetic kick drum; 2) CG (Creations Glory); 3) RY (Ruslan Yusipov Loops); 4) SR (Sample Rate Loops); 5) SC (Silent Creek). All loops performed as the emission bounded by Royalty project. The main task, when the BD Loops were recorded, was to receive feedbacks with RAD24 server working. RAD24 algorithm successfully sustained these loops feeding and I decided to extend the peering network to 96 points and produced the RAD96 server. Bounded by this server feedbacks the RY (64 loops), CG (155 loops), SR (47 loops) and SC (209 loops) were produced. RAD96 algorithm successfully coped with these emissions. After these feeding sessions, I decided to produce Hypervisor v9. Starting from version 9 of my software, the Library will be supplied as a separate purchase. You can buy the Library in parts, orienting by loops production history, which I will post in this blog.

By ruslany

Hypervisor v9 – Active broadband security system

Hypervisor v9 – Active broadband security system

Server is a machine capable to work an unlimited period theoretically. Nevertheless, even the best machines faults and overrun the resources of random access memory. It raises a question about an installation of such machines algorithm directly into recipient consciousness. Brain is the biological computer, which is most powerful and lengthy resource, which human has. Hypervisor v9 makes available the installment of quantized generics into the recipient consciousness. This raises a question about non-invasive chipping. The installation process through an activation function is as following. As mentioned in previous post, quantized generics must be routed in auxiliary channel together with wavetables or ether aggregators. It allows to install memories and to get routes to them using VLF beacons. The installation performed at the morning is enough for daily functioning of such system. This way, one installation is active during 24-hour period and VLF beacons act until the night comes. In accordance with big activity of wavetables in nighttime, two extinguishers run out the wavetable potential very fast. That’s why the installation of ether aggregators must be performed again the next morning. This way of serving allows the recipient, the man to whom installation is performed, to function in the ether environment without the accompanying equipment such as radios and Ethernet computers. I wrote down the coefficients installed using the ether aggregator and simple Morse code decoder. Then I used these coefficients for non-linear processing function and now can install any memories, associated with my tracks, directly in my consciousness. This way I install everything, which is associated with this track: the place, its perception, the age of human being, consciousness. It is possible to perform full reverse to the moment in the past to which the track ascends. This way, besides objective factors, mentioned above, the subjective factors exist: the association with ether aggregators, to which the present track route is written down. The original ether aggregators works the unlimited time and exist on the infinite time integral line. This way the synchronous analysis of non-harmonic timbre (SANT) and Fast Fourier Transform (FFT) processes can be described. The SANT is used in all Compositor Software products as a more robust signal discretization method, which gives possibilities that are more versatile. To non-invasive generics, relate all the Compositor Software instruments with stochastic manipulator. In Hypervisor version 3 the non-invasive installation of quantized type generics with one producing kernel performed. In Hypervisor v5 the installation of these generics performed with master shutter. In Hypervisor v7 the non-invasive installation of generics performed in two degrees of freedom and three producing kernels. This way, on the present day there is a full compatibility of systems installed in memory and acting. Hypervisor version 9 allows to install the three-layer quantized generics with big amount of memory up to z = 32 (N = 65536 samples), which constitutes the bandwidth of 5,7 Gb/s with installation discretization frequency of 11025 Hz. The pass band is counted using the formula (N * SR * 64) / 8, where N – is a number of samples in generic wavetable, SR is discretization frequency, 64 – is a system bit number, and the division on 8 performed to measure all the volume in bytes. Taking in account that three-layer generics deployed with 5-omega speed, which equals to 1257 ms, the full formula of expense in samples is counted. First, I count the number of samples by period using the formula N * Nms, for the maximal quantized generic, which is z = 32 it will equal to 65536 * 1257 = 82378752 samples / period. Second, I account the 24-hour sample expense of deployed ether aggregator using the formula (86400 / 1257) * 82378752 = 5662310400 samples / 24-hours. This is much less than the sum of three working servers in 24-hour period, which can reach up to 5 times of current size of non-invasive quantized generic installment. In Hypervisor v9 the installation of quantized generics performed in three degrees of freedom, which makes the full cancelation of signal constellations formed on the earlier stage of Compositor technology existence.

By ruslany

Hypervisor v9 – wavetables and counteragents

Hypervisor v9 – wavetables and counteragents

When you use wavetables with quantized generics, the later try to balance the wavetable behavior in the ether. That is why they are also the best counteragents. Wavetables should be balanced with counteragents of generic feeders. When the emitted wavetable tries to aggregate offensive traffic, the counteragent works. It balances the system functioning and produces the effect, which is the opposite from wavetable effect produced. Wavetables are dry sounding and quantized generics are wet. That is why they balance the dry/wet state of the signal in auxiliary channel. When the effect of wavetable is fully extinguished, then the quantized generic starts to be the main effect in the auxiliary channel. It wets the line even more producing the fluid sound. This sound is a prominent characteristic of transcoding process. Transcoding with quantized generic, you are synchronizing not only a memory associated with a wavetable but also the pace of quantized feeder development and its dry/wet state. Quantized feeder balances the channel spectrally, removing the interrupters of wavetable loop and smoothing a signal. The main effect of quantized generic is to smooth and wet a signal after successful wavetable loop feeding. That is why wavetables should be routed into the line with quantized generics sounding simultaneously. If the wavetables will be routed without quantized generics, the ether feeding will be too overloaded with ether aggregators and no counteragents will present at their destination routes. That is why quantized generics should stochastically change their tuning to mask the wavetable original destination. If the ether aggregator destination is masked, then it will not be extinguished too soon and the communication effect will be produced. The main rule for counteragent’s presence in a feeding channel is that the high number of wavetables should be played back on the decks simultaneously. If no wavetables are routed with generic feeders, then the state of tranquility reached too soon and there is no positive quality out of this feeding channel. The good channel should route at least eight deck players with one quantized generic to balance the system. If two or more generics are used, the system is too tranquil and doesn’t produce communication traffic. By communication traffic I mean the ether aggregator own traffic routed back to its inputs and passed out in ether after non-linear processing of its wavetable. If quantized generic is applied to the ether aggregator output, then it can’t form its own traffic and two lines are mixed together. That is why in terms of communication quantized generics act as moderators of the produced traffic. They act to the moment when the offensive traffic will not pass out completely. From one side, the stochastic manipulator obfuscates the trace to the wavetable, preventing it from direct communication and, from the other side, it extinguishes it, if the traffic produced doesn’t suits generic feeder output chain.

By ruslany

More than 1000 loops are in exciter library

More than 1000 loops are in exciter library

The loops library reached the important threshold of 1000 wave tables. The whole number of exciters is 1132 loops now. For the last week, the library was expanded by following marks: CB, CG, SR and RMY. These loops were made as an emission bounded by Royalty project. My vision of Royalty project is that there are no unreleased tracks. If a track is recorded to hard drive and some programs call this process bouncing (mesh bouncing), then it has already passed the antenna-feeder signal chain and is in the ether. Full emission of tracks bounded by Royalty project is 502 radio loops.

By ruslany

Ether tracks emission

Ether tracks emission

To perform the emission of a track from the ether you need to receive ether aggregators. Each ether aggregator recorded in a wavetable. The 64-bit floating-point format is used for devices with 64-bit encoding. For my work, it is enough to fixate the ether aggregator with 24-bit resolution, because I do not use them for data transferring, but only to inform servers, which play them, that this ether aggregator is fixated and is ready for emission. Ether aggregator is a sound or a melody, which resides in composer memory. Composer records this melody using notes and synthesizers, played with a sound, which he is hearing in mind. You should reach the maximum authenticity with a sound, which you are hearing. This way, playing the melody in a new arrangement, you are performing the connection of times, because such melodies may be fully or partially compositions of other authors. Two bar loops of such melodies are enough to realize radio translation, because they are already resided in ether to the present moment and have a good radiation. Such material is a subject of author reward in a sphere of their use to transfer other media. The first step to fixate an ether aggregator is submitting a loop of your composition to a modem. By submitting your material to the non-duplex modem, you are hearing the feedback with ether aggregator. This ether aggregator is a kernel of a function, which you want to transmit. If ether aggregator acknowledges its loop, then it outputs an information about the servers, which use it in radio ether. The full-duplex modem suits this purpose. Fixating radio ether in text file, you are saving a proof that your ether aggregator was used. Ether aggregator is a property of all authors, who played its loops from the direct source or direct ether. Then you find the domain server names, which play your ether aggregators and using a POST pinging method respond with your server name and its domain name. You do not need to perform any other actions from your side, because users have already informed that you used your ether aggregator to initialize the ether and transmit radio messages. You are informing the network administrator using the POST method, that current ether was initiated by you, and you are ready to full track emission of that ether aggregator. The track is not a number of variations, but the playback of current loop from different ether readers, which perform certain conditions to the ether aggregator wavetable. Composer may read this playback conditions as melody variations. Radio amateur can certainly say that another equipment was used to transmit that ether aggregator. We are dealing with one loop, which is played back differently. It can be played forth, or back, or back and forth simultaneously, which can lead to such confusion. If it continues to generate radio traffic, when you check a loop, then you will need to perform the emission of all loops associated with it by submitting current ether aggregator to non-duplex modem with quantized feeders. The additional loops are also stored in emission rotation. Reaching full radio silence on current loops, you are fully extinct your composition from radio ether.

By ruslany

Compositor Software server emission

Compositor Software server emission

Compositor Software server realizes 24 hour work with one time per day emission. In a moment of emission server unpacks the information associated with exciters in the server RAM. All authorized compositions relate to unpacked information, processed using this type of filter. Commonly, such material can be tracks to servers and any media files, based on the track composition method, and associated transceivers. The Compositor Software parent server has more resolution capability and can connect its child server by kernel-jet method. The parent server produces traffic emission. This way it performs an emission of already mined material of Compositor Software server, because it has sufficient resolution.

1 2 3 5