You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
🤖
Building Cybernetic Systems
Mr. Rosario
soltrinox
🤖
Building Cybernetic Systems
R&D in Artificial Intelligence & Cybernetic Cryptography
A hierarchical taxonomy and step-by-step architecture for high-precision ChatGPT sessions.
0. Design Philosophy
Teleology first, constraints second.
A prompt is a build script for reasoning. Declare the desired artefact; parameterize the dialectic (Λ); bind constraints; stage the workflow; embed self-checks.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Swift Audio Recording class. Reads buffers of input samples from the microphone using the iOS RemoteIO Audio Unit API
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nginx is a web server, also works as a load balancer, and may help us a lot in security and routing terms, because when deploying our applications to a production environment, we don’t want to put ports on the url, and also the dns has to look like clean to our users, also for security reasons, we don’t want to show the port explicitly where the service is being run.
Also, I decided to make this tutorial, because I was working on a cryptocurrency exchange platform in a freelancing job, and the frontend communicates with the relayer(backend that receives the user order's for exchanging Tokens/Crypto) by HTTPS and WSS. The HTTP it was for the general APIs and for posting new buy/sell orders, and the Websockets was for making a full-duplex communication for near realtime u
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
WKWebView can read a wasm from a localfile with XMLHttpRequest, but returns an error with fetch
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ PSYCHOLOGICAL DEFENSE SERIES ] TITLE: Establishment of CONSCIOUS violation vs. UNCONSCIOUS violation of BOUNDARIES and the protocol for delivery of CONSEQUENCE due to BOUNDARY VIOLATION.
[DANGER DO NOT READ THIS PROTOCOL IF YOU HAVE INSECURITIES AND OR ARE OPERATING WITH PATHOLOGICAL INTENT ]
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! THIS IS A RAW PSYCH SELF-DEFENSE SYSTEM ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
[DANGER DO NOT READ THIS PROTOCOL IF YOU HAVE INSECURITIES AND OR ARE OPERATING WITH PATHOLOGICAL INTENT ]
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ PSYCHOLOGICAL DEFENSE SERIES ] TITLE: Establishment of CONSCIOUS violation vs. UNCONSCIOUS violation of BOUNDARIES and the protocol for delivery of CONSEQUENCE due to BOUNDARY VIOLATION.
[DANGER DO NOT READ THIS PROTOCOL IF YOU HAVE INSECURITIES AND OR ARE OPERATING WITH PATHOLOGICAL INTENT ]
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! THIS IS A RAW PSYCH SELF-DEFENSE SYSTEM ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
[DANGER DO NOT READ THIS PROTOCOL IF YOU HAVE INSECURITIES AND OR ARE OPERATING WITH PATHOLOGICAL INTENT ]