You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Contributor License Agreement for the agentic project
Individual Contributor License Agreement
DRAFT — This document is pending legal review. Do not rely on it as a
binding agreement until it has been reviewed and finalized by qualified
legal counsel.
Thank you for your interest in contributing to the agentic project
("Project"), maintained by Morten Olsen ("Maintainer"). This Contributor
License Agreement ("Agreement") defines the terms under which You submit
Contributions to the Project.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
So lately I have been sucked more and more into the Apple eco-system, and one of the major reasons that keeps happening (despite my best attempts not to) is the seamless connection between devices. They are definatly doing some magic to make low powered devices (ex. AirPods, AirTags) interconnect with high powered devices (ex. iPhones, MacBooks, Apple TVs) (mostly) reliable. It feels as if all their devices is able to create and maintain a stable two way connection regardless of the technology they use, and all with close to zero configuration.
So how do they do it? I decided to give this a go myself and create a "hyper connectivity framework" for allowing devices to seamlesly connect and maintain that connection reardless of the underlaying technology with a minimum of network overhead and without making writing applications any more complecated.
So first of is the list of requirements I came up with to validate my framework against to see if it is successful. T
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters