tuxtype

Qompass AI on TuxType

https://github.com/qompassai/tuxtype

Science Score: 54.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
    Links to: zenodo.org
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (9.4%) to scientific vocabulary

Keywords

teaching tutoring tuxtype typing
Last synced: 6 months ago · JSON representation ·

Repository

Qompass AI on TuxType

Basic Info
  • Host: GitHub
  • Owner: qompassai
  • License: agpl-3.0
  • Language: C
  • Default Branch: main
  • Size: 12.6 MB
Statistics
  • Stars: 0
  • Watchers: 0
  • Forks: 0
  • Open Issues: 0
  • Releases: 11
Topics
teaching tutoring tuxtype typing
Created 9 months ago · Last pushed 6 months ago
Metadata Files
Readme Funding License Citation Zenodo

README.md

TuxType: For Teaching typing quality typing skills

Qompass AI on TuxType

Repository Views GitHub all releases

TuxType
TuxType Documentation Typing Tutorials Typing Practice
License: AGPL v3 License: Q-CDA

Qompass AI Quick Start
```bash bash <(curl -L https://raw.githubusercontent.com/qompassai/tuxtype/main/scripts/quickstart.sh) ```
📄 We advise you read the script BEFORE running it 😉
#!/usr/bin/env bash

REPO="https://github.com/qompassai/dotfiles"
TARGET_DIR="$HOME/.local/bin/tuxtype"
if [ -d "$TARGET_DIR" ]; then
    echo "Removing existing dotfiles directory..."
    rm -rf "$TARGET_DIR"
fi
echo "Cloning Qompass AI Dotfiles..."
git clone "$REPO" "$TARGET_DIR"
echo "Setting up symlinks..."
mkdir -p "$HOME/.config/nix" "$HOME/.profile.d"
ln -sf "$TARGET_DIR/.config/nix/nix.conf" "$HOME/.config/nix/nix.conf"
ln -sf "$TARGET_DIR/.profile.d/67-nix.sh" "$HOME/.profile.d/67-nix.sh"
mkdir -p "$HOME/.config"
ln -sfn "$TARGET_DIR/home" "$HOME/.config/home" 2>/dev/null || true
ln -sfn "$TARGET_DIR/.local" "$HOME/.local" 2>/dev/null || true
ln -sf "$TARGET_DIR/flake.nix" "$HOME/.config/flake.nix" 2>/dev/null || true
source "$HOME/.profile.d/67-nix.sh" 2>/dev/null || {
    echo "WARNING: Could not source Nix profile configuration. Falling back to manual exporting"
    export NIX_CONF_DIR="$HOME/.config/nix"
    export NIX_STORE_DIR="$HOME/.nix/store"
    export NIX_STATE_DIR="$HOME/.local/state/nix"
    export NIX_LOG_DIR="$HOME/.local/state/nix/log"
    export NIX_PROFILE_DIR="$HOME/.nix-profile"
    export PATH="$NIX_PROFILE_DIR/bin:$PATH"
}
if ! command -v nix >/dev/null; then
    chown -R "$(whoami)" /.nix
    sh <(curl -L https://nixos.org/nix/install) --daemon \
        --nix-extra-conf-file "$NIX_CONF_DIR/nix.conf"
    if [ -f '/.nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then
        . '/.nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh'
    fi
fi
echo "Setting up Nix environment..."
cd "$TARGET_DIR"
nix flake update
detect_shell() {
    case "$(ps -p $$ -o comm=)" in
        *bash*) echo "bash" ;;
        *zsh*)  echo "zsh" ;;
        *fish*) echo "fish" ;;
        *)      echo "bash" ;;
    esac
}
USER_SHELL=$(detect_shell)
echo "Detected shell: $USER_SHELL"
nix develop --command "$USER_SHELL"
      

Or, View the quickstart script.

Matthew A. Porter
Former Intelligence Officer
Educator & Learner
DeepTech Founder & CEO

Publications

ORCID Zenodo

Developer Programs

HackerOne HuggingFace

Personal LinkedIn Startup LinkedIn

Social Media

X/Twitter Qompass AI YouTube

🏛️ Qompass AI Pre-Seed Funding 2023-2025 🏆 Amount 📅 Date RJOS/Zimmer Biomet Research Grant $30,000 March 2024 Pathfinders Intern Program
$2,000 October 2024

🤝 How To Support Our Mission

[![Patreon](https://img.shields.io/badge/Patreon-Support-F96854?style=for-the-badge\&logo=patreon\&logoColor=white)](https://patreon.com/qompassai) [![Liberapay](https://img.shields.io/badge/Liberapay-Donate-F6C915?style=for-the-badge\&logo=liberapay\&logoColor=black)](https://liberapay.com/qompassai)
🔐 Cryptocurrency Donations **Monero (XMR):**
Monero QR Code
42HGspSFJQ4MjM5ZusAiKZj9JZWhfNgVraKb1eGCsHoC6QJqpo2ERCBZDhhKfByVjECernQ6KeZwFcnq8hVwTTnD8v4PzyH
📋 Copy Address

Funding helps us continue our research at the intersection of AI, healthcare, and education

Frequently Asked Questions ### Q: How do you mitigate against bias? **TLDR - we do math to make AI ethically useful** ### AI Math at a glance ## Forward Propagation Algorithm $$ y = w_1x_1 + w_2x_2 + ... + w_nx_n + b $$ Where: - $y$ represents the model output - $(x_1, x_2, ..., x_n)$ are input features - $(w_1, w_2, ..., w_n)$ are feature weights - $b$ is the bias term $$ z = \\sum\_{i=1}^{n} w_ix_i + b Where: ### Attention Mechanism- aka what makes the Transformer (The "T" in ChatGPT) powerful - [Attention High level overview video](https://www.youtube.com/watch?v=fjJOgb-E41w) The Attention mechanism equation is: $$ - $Q$ represents the Query matrix - $K$ represents the Key matrix - $V$ represents the Value matrix - $d_k$ is the dimension of the key vectors - $\\text{softmax}(\\cdot)$ normalizes scores to sum to 1 - Windows users can use Windows Subsystem for Linux [WSL](https://learn.microsoft.com/en-us/windows/wsl/install) - Mac users can use [Homebrew](https://brew.sh/) - The code-base instructions were developed with both beginners and advanced users in mind. - [Huggingface](https://docs.google.com/presentation/d/1IkzESdOwdmwvPxIELYJi8--K3EZ98_cL6c5ZcLKSyVg/edit#slide=id.p)
### Protection for Vulnerable Populations ### Preventing Malicious Use The AGPL-3.0 license ensures that any modifications to the software remain open source, preventing bad actors from creating closed-source variants that could be used for exploitation. This is especially crucial given the rising threats to vulnerable communities, including children in educational settings. The attack on Minneapolis Publi c Schools, which resulted in the leak of 300,000 files and a $1 million ransom demand, highlights the importance of transparency and security[8] . ### Addressing Cybersecurity in Critical Sectors The commercial license option allows for tailored solutions in critical sectors such as healthcare, which has seen significant impacts from cyberattacks. For example, th e recent Change Healthcare attack[4] affected millions of Americans and caused widespread disruption for hospitals and other providers. In January 2025, CISA[2] and FDA[3] jointly warned of critical backdoor vulnerabilities in Contec CMS8000 pat ient monitors, revealing how medical devices could be compromised for unauthorized remote access and patient data manipulation. ### Supporting Cybersecurity Awareness The dual licensing model supports initiatives like the Cybersecurity and Infrastructure Security Agency (CISA) efforts to improve cybersecurity awareness[7] in "target rich" sectors, including K-12 education[5]. By allowing both open-source and commercial use, we aim to facil itate the development of tools that support these critical awareness and protection efforts. ### Bridging the Digital Divide The unfortunate reality is that too many individuals and organizations have gone into a frenzy in every facet of our daily lives[6]. These unfortunate folks identify themselves with their talk of "10X" returns and building towards Artificial General Intelligence aka "AGI" while offering GPT wrappers. Our d ual licensing approach aims to acknowledge this deeply concerning predatory paradigm with clear eyes while still operating to bring the best parts of the open-source com munity with our services and solutions. ### Recent Cybersecurity Attacks Recent attacks underscore the importance of robust cybersecurity measures: - The Change Healthcare cyberattack in February 2024 affected millions of Americans and caused significant disruption to healthcare providers. - The White House and Congress jointly designated October 2024 as Cybersecurity Awareness Month. This designation comes with over 100 actions that align the Federal gove rnment and public/private sector partners are taking to help every man, woman, and child to safely navigate the age of AI. 335,13 92% By offering both open source and commercial licensing options, we strive to create a balance that promotes innovation and accessibility. We address the complex cybersecu rity challenges faced by vulnerable populations and critical infrastructure sectors as the foundation of our solutions, not an afterthought. ### References

Owner

  • Name: Qompass
  • Login: qompassai
  • Kind: organization
  • Email: map@qompass.ai
  • Location: United States of America

Cost-Conscious GenAI Microservices

Citation (CITATION.cff)

cff-version: 1.2.0
title: "tuxtype"
message: "If you use this software, please cite it as below."
authors:
  - family-names: "Porter"
    given-names: "Matthew A."
    orcid: "https://orcid.org/0000-0002-0302-4812"
    affiliation: "Qompass AI"
version: "v2025-08-21"
date-released: "2025-08-21"
repository-code: "https://github.com/qompassai/tuxtype"
license: "Q-CDA-1.0"
keywords:
  - AI
  - Education
  - Healthcare
  - Post-Quantum Cryptography
  - Quantum
  - opensource
  - software
abstract: "Qompass AI on TuxType"

GitHub Events

Total
  • Release event: 5
  • Push event: 38
  • Create event: 5
Last Year
  • Release event: 5
  • Push event: 38
  • Create event: 5

Issues and Pull Requests

Last synced: 6 months ago