Compositor SoftwareCompositor Software

by ruslany

Establishing connection to the past using DRM server

One can establish a connection with ether aggregators through the DRM server, using serial or parallel methods of information feeding. This way, even turning on a game, based on previous generation engine, you can connect to its ether aggregators and reestablish personal thinking up to the moment, which saved in its wavetable. The procedure, in fact, is the same as when you submit wavetables in transmission channel, but in this case ether aggregators are protected with engine and there is no access to it. It is much more perspective to receive wavetables of these ether aggregators by tracks to it and send it in a channel with generic beacons for its subsequent navigation. It is not a decent way to feed a wavetable with divert attention, which a computer game is. If you wouldn’t like to know, which wavetables were sent to a channel, it is enough turning the random mode of Compositor v9 Hypervisor on and hiding the current playback wavetable titles. The effect of generic feeding with DRM server is much purer, than feeding with divert attention while playing a game. The main process, which computer games preoccupied with, is to complicate and enhance methods of diverting an attention. The engines of such games still on the same level as 10 years ago. Compositor v9 Hypervisor engine is the functional modern engine with transfer function on master output and on each channel separately. It is not the wavetables but tunable polynomials, which process the output of your channel. It is important to note, that output cascade uses non-linear transformation formula with mathematical approximation by weighting coefficients. It gives undisputable advantage in processor time and in the precision of calculations comparing to using wavetables. DRM server transfer function allows performing parallel feeding directly in to the recipient consciousness. The methods of such feeding can be versatile. For example, you can listen to music file saved in the year 2004 and reestablish the consciousness up to the moment in the past to which this track ascends. This way, it is not necessary to install wavetables in to the consciousness using Hypervisor; it is enough to playback this file over some period with DRM server turned on. Of course, using game process, you can reach the maximum effect, but feeding with diverted attention confuses your organism and leads to an attachment condition. In fact, if Compositor v9 Hypervisor gameplay will be seen from the game industry point of view, then it will look like 7 levels with rising difficulty. The first level of feeding will have much less effectivity, than the last. The first introductory level is z=2 and z=128 is the last level of prolonged fixation with larger active period. Each level should include the following phases:

  1. Feeding wavetables in stochastic mode without generic of the respective level turned on;
  2. Feeding wavetables in stochastic mode with generic of the respective level turned on;
  3. Oversaturation of transmission channel;
  4. Turning a generic off from transmission channel;
  5. Feeding wavetables in stochastic mode without generic of the respective level turned on;
  6. Switching z level.

The feeding stages should start and end on the 1st and 5th step respectively. This way, feeding algorithm events are as follows:

  1. Choose the Altitude of device work using stochastic arranger. Scan the ether on a presence of active (openly sounding) carriers. Carriers is a long, definitely sounding tones.
  2. Set up the depth of function intrusion using the splitters in Ionic number system. If you want a deep intrusion, when feeding a channel, set up the high values in first and third splitter fields. You can also set up a deep intrusion, when the resultant is positive and a small value of intrusion, when the resultant is negative.
  3. Set up the transmission channel for the local saturation. It is an auxiliary ether and there are no carriers in it. It is used to confirm that the transmission channel is free from other carriers. It is tuned by setting Velocity and Spacing regulators in Connection section. Here you can also set the send depth of a local saturation.
  4. Choose the transfer functions for channel saturation. Set up the transfer functions by Chebyshev polynomials and the meshes of corresponding type when using channel saturation. Set the amplification in channel saturation cascade and the channel distortions depth for reaching saturation effect. Oversaturation, as mentioned earlier, performed by sending the transmission channel back to its input for a short period (it is performed only, when the same level generic is turned on).

Note: There are three saturation stages in the full-duplex modem: saturation on each devices channel, separated on positive and negative; local saturation before the output cascade by Schroeder regenerator; global saturation on the output cascade using polynomial.

  1. Choose the transmission regime (central channel mode). You can use one of the six preset values of central splitter. The most common mode for brain upload procedure is the υ-400 regime. It is the mode with open mesh and the selection of window functions, which are ideally suited for direct installation in full-duplex mode.
  2. Tune the antenna aperture of the z=16 transmission channel level. Set the direction of virtual antenna in three dimensions to hear the dash tone while the program runs. Then, obfuscate this tone by changing a phase of transmission channel and setting the modulation in real-time mode.
  3. Perform steps from 1st to 5th of the previous list for each z level of the send channel.

Note: start the generic feeding in the transmission channel from z=2 value.

You can watch the statistics by pressing Setup button for the corresponding feeder. There are event logs created together with visible program statistics for each feeder. Event logs are stored in Public folder on Windows and current user Application Support folder on Mac. The event log files are created for each session overwriting the previous file for its feeder. Nevertheless, the events written down starting from the last value of All Events in statistics file. The event number, frequency on which the event performed (for VLF beacons up to z=32 it is counted in kHz, for UHF and SHF z=64 and z=128 network switches it is written in GHz) and the event of the corresponding flag. You can potentially zoom on any feeder event using transmit and receive channel. For example, you can respond with wavetables of ether aggregators when Threat event reached on the current Altitude.

The current method of work demonstrates the use of Compositor v9 Hypervisor for Ethernet security when performing brain upload procedure and for an active reply for all incoming threats. Of course, you can ignore Threat events and just leave the DRM server turned on for the undefined period, but you should take in account its sample charging. To cover its expenditures you need to perform additional emissions through the non-duplex modem again.

About ruslany
Ruslan Yusipov is the artist and entrepreneur with his own vision of music software industry. Ruslan’s passion to new explorations in sound gives plethora of results in MaxMSP programming. He brings the home to Compositor Software Data Solutions, implementing the software for controlling any PC or Mac system. This software not only tunes your computer, it evolves sounds out of it, actively scanning the ether, which your system is connected to. One of the achievements of Ruslan Yusipov as software developer is MDL12 brain convolution technology, which stands behind mostly all Compositor products. It helps to emanate sounds literary out of your head, bringing your ideas into music immediately.