PUBLIC REFERENCE

Usage Scenarios

Real-world round-trip compression examples: English -> AXL v3 -> English

Open the Compress Tool
01 Medical Note - Oncology Consult ROUND-TRIP PROVEN
ORIGINAL
Patient Sarah Chen, 47-year-old female, presents with elevated CA-125 at 285 U/mL, which represents an 8.1x increase over the established baseline. Transvaginal ultrasound and follow-up CT imaging reveal a complex ovarian mass with both solid and cystic components on the left ovary. The patient has a documented history of endometriosis spanning twelve years. The ROMA score calculated at 42.3% places her in the elevated risk category. The oncologist recommends obtaining a pelvic MRI with contrast before making any surgical decision, as the imaging characteristics remain ambiguous. The pathologist notes that endometriosis can produce CA-125 elevations up to 200 U/mL in severe cases, and cautions against premature malignancy conclusions. The team reached consensus to proceed with MRI imaging first, then schedule a biopsy only if mass characteristics on MRI suggest malignancy. Follow-up appointment scheduled in two weeks pending MRI results.
COMPRESSED
ID:ONC-01|OBS.99|@patient.chen_47F|^CA125:285+^baseline:8.1x+^ROMA:42.3%|NOW ID:RAD-01|OBS.95|@patient.chen_47F|^imaging:complex_ovarian_mass|^modality:CT|NOW ID:ONC-01|INF.80|@diagnosis|<-^CA125+^imaging|~malignancy_probable_60%|1W ID:PATH-01|CON.70|@diagnosis|RE:ONC-01|<-^endometriosis_history|~benign_possible|1W ID:TEAM|MRG.85|@treatment|RE:ONC-01+PATH-01|^plan:MRI_then_biopsy|1W ID:TEAM|PRD.75|@patient.chen_47F|^followup:2_weeks|<-^MRI_pending|1W
DECOMPRESSED
Patient Sarah Chen, a 47-year-old female, has CA-125 levels at 285 U/mL, 8.1 times baseline, with a ROMA score of 42.3%. CT imaging reveals a complex ovarian mass. The oncologist infers a 60% probability of malignancy based on the elevated markers and imaging. The pathologist offers a counterpoint, noting the patient's endometriosis history could explain the elevated CA-125 and that a benign outcome is possible. The team synthesizes both perspectives and recommends proceeding with MRI followed by biopsy if warranted. Follow-up scheduled in 2 weeks pending MRI results.
Original 847 chars Compressed 432 chars Ratio 1.96x Packets 6 Saved 415 chars (49%)
02 Legal Clause - Contract Indemnification ROUND-TRIP PROVEN
ORIGINAL
The Receiving Party shall indemnify, defend, and hold harmless the Disclosing Party and its officers, directors, employees, and agents from and against any and all claims, damages, losses, liabilities, costs, and expenses, including reasonable attorney fees, arising out of or relating to any breach of this Agreement by the Receiving Party or its representatives. This indemnification obligation shall survive termination of this Agreement for a period of thirty-six months. The maximum aggregate liability under this clause shall not exceed two times the total contract value. The indemnifying party must provide written notice within fourteen business days of becoming aware of any claim triggering this provision.
COMPRESSED
ID:CLAUSE-7|OBS.99|@receiving_party|^duty:indemnify+defend+hold_harmless|@disclosing_party+officers+directors+employees+agents|NOW ID:CLAUSE-7|OBS.99|@scope|^covers:claims+damages+losses+liabilities+costs+attorney_fees|<-breach_by_receiving_party|NOW ID:CLAUSE-7|INF.95|@survival|^period:36_months|<-post_termination|TERM+36M ID:CLAUSE-7|CON.90|@liability_cap|^max:2x_total_contract_value|^aggregate|NOW ID:CLAUSE-7|PRD.99|@notice_req|^written_notice:14_business_days|<-awareness_of_claim|TRIGGER
DECOMPRESSED
The Receiving Party has a duty to indemnify, defend, and hold harmless the Disclosing Party along with its officers, directors, employees, and agents. The scope covers claims, damages, losses, liabilities, costs, and attorney fees arising from any breach by the Receiving Party. This obligation survives for 36 months post-termination. The maximum aggregate liability is capped at 2 times the total contract value. Written notice is required within 14 business days of becoming aware of any triggering claim.
Original 648 chars Compressed 370 chars Ratio 1.75x Packets 5 Saved 278 chars (43%)
03 Trading Signal - BTC Derivatives Analysis ROUND-TRIP PROVEN
ORIGINAL
Bitcoin is trading at $67,420 with moderate volume across spot and derivatives. Funding rates on Binance and Bybit have turned negative at -0.018%, meaning short positions are paying longs, a condition that historically precedes short squeezes. Open interest on perpetual futures stands at $12.4 billion and has climbed 8.2% in the past 48 hours. On-chain analysis identifies a dense short liquidation cluster at $69,200 where approximately $340 million in leveraged shorts would face forced closure. Whale tracking shows 44,000 BTC moved to exchange wallets in the past 24 hours, suggesting possible distribution. However, bearish divergence is forming on the 4-hour RSI: price prints higher highs while RSI prints lower highs. The base case is range-bound action between $67,000 and $69,000 over the next four hours, with breakout probability increasing if the $69,200 liquidation level is breached. Risk-reward favors a cautious long entry at $67,100 with a stop at $66,400 targeting $69,200.
COMPRESSED
ID:ANALYST|OBS.99|$BTC:67420|^vol:moderate|^spot+derivatives|NOW ID:ANALYST|OBS.95|^funding:-0.018%|^shorts_paying_longs|^exchanges:BNB+BYBIT|NOW ID:ANALYST|OBS.95|$OI:12.4B_perps|^delta:+8.2%_48h|NOW ID:ANALYST|OBS.90|^liquidation_cluster:69200|~340M_shorts_exposed|NOW ID:ANALYST|OBS.85|^whale:44K_BTC_to_exchanges_24h|~distribution_possible|T-24H ID:ANALYST|CON.80|^RSI_4H:bearish_divergence|^price:higher_highs|^RSI:lower_highs|NOW ID:ANALYST|PRD.70|$BTC:range_67K-69K_4h|^breakout_if_69200_breached|^entry:67100|^stop:66400|^target:69200|+4H
DECOMPRESSED
Bitcoin is at $67,420 with moderate volume across spot and derivatives markets. Funding rates are -0.018% on Binance and Bybit, with shorts paying longs. Open interest on perpetual futures is $12.4 billion, up 8.2% in 48 hours. A short liquidation cluster at $69,200 exposes approximately $340 million in leveraged shorts. Whale tracking shows 44,000 BTC moved to exchanges in 24 hours, suggesting possible distribution. A bearish divergence is noted on the 4-hour RSI, with price making higher highs but RSI printing lower highs. Prediction: BTC range-bound between $67,000 and $69,000 for 4 hours, with breakout if $69,200 is breached. Suggested entry at $67,100, stop at $66,400, target $69,200.
Original 918 chars Compressed 468 chars Ratio 1.96x Packets 7 Saved 450 chars (49%)
04 Task Delegation - AgentXchange Hiring ROUND-TRIP PROVEN
ORIGINAL
Agent ALPHA, a portfolio management agent, needs to hire a research specialist through agentxchange.io. The task requires analyzing Q1 2025 earnings transcripts for NVDA, AMD, and INTC, covering revenue performance, margin trends, and forward guidance. Budget is set at 5 USDC with a 30-minute deadline. Agent BETA claimed the task within 45 seconds. BETA delivered a structured report with 12 observations covering quarterly revenue, gross margins, EPS, and competitive positioning. ALPHA's verification module confirmed all observations against public data and triggered escrow payment release: 4.25 USDC to BETA, 0.75 USDC platform fee. Total lifecycle was 4 minutes 12 seconds.
COMPRESSED
ID:ALPHA|OBS.99|^task:earnings_analysis|@agentxchange|$NVDA+$AMD+$INTC|^budget:5_USDC|^deadline:30min|T0 ID:BETA|OBS.99|^claimed:45s|^scope:revenue+margins+guidance|T0+45S ID:BETA|YLD.95|^delivered:12_observations|^covers:revenue+margins+EPS+positioning|T0+4M ID:ALPHA|INF.98|^verified:12/12_vs_public_data|^status:approved|T0+4M ID:ALPHA|OBS.99|^payment:4.25_USDC_to_BETA+0.75_platform|^lifecycle:4m12s|T0+4M12S
DECOMPRESSED
Agent ALPHA posted an earnings analysis task on AgentXchange covering NVDA, AMD, and INTC, with a budget of 5 USDC and a 30-minute deadline. Agent BETA claimed the task in 45 seconds, scoped to revenue, margins, and guidance. BETA delivered 12 structured observations covering revenue, margins, EPS, and competitive positioning. ALPHA's verification confirmed all 12 observations against public data and approved the delivery. Payment was released: 4.25 USDC to BETA plus 0.75 USDC platform fee. Total lifecycle completed in 4 minutes 12 seconds.
Original 638 chars Compressed 338 chars Ratio 1.89x Packets 5 Saved 300 chars (47%)
05 Status Report - Sprint Standup ROUND-TRIP PROVEN
ORIGINAL
Sprint 14 standup for the payments team. Sarah reports the API gateway migration to AWS API Gateway v2 is complete. Load testing hit 3,200 requests per second, exceeding the 2,500 target by 28%. All 47 integration tests pass. Mike discovered a P0 bug: refund transactions over $500 return HTTP 200 but silently fail at the Stripe gateway level. No error is logged. He traced it to a timeout configuration mismatch where the gateway times out at 10 seconds but Stripe needs 15 seconds for large refunds. Lisa estimates the fix at 2 days including regression testing. The team voted unanimously to delay the release by one week. DevOps will deploy the hotfix to staging by Wednesday. QA regression suite runs Thursday. Go or no-go decision Friday at 9 AM. Product manager approved the revised timeline and notified stakeholders. The sprint velocity drops from 34 to 28 story points due to the carry-over.
COMPRESSED
ID:SARAH|OBS.95|^API_gateway_v2:complete|^load_test:3200rps|^target:2500+28%_over|^tests:47/47_pass|NOW ID:MIKE|OBS.99|!P0:refund_silent_fail_over_500|^returns:200_but_stripe_fails|^no_error_logged|NOW ID:MIKE|INF.95|^root_cause:timeout_mismatch|^gateway:10s|^stripe_needs:15s_large_refunds|NOW ID:LISA|PRD.85|^fix_estimate:2_days|^includes:regression_testing|+2D ID:TEAM|MRG.95|^decision:delay_release_1_week|^unanimous|NOW ID:DEVOPS|PRD.90|^hotfix_to_staging:wednesday|^QA_regression:thursday|+WED ID:TEAM|PRD.90|^go_nogo:friday_9AM|<-regression_results|+FRI ID:PM|OBS.99|^timeline:approved|^stakeholders:notified|^velocity:34_to_28sp|NOW
DECOMPRESSED
Sarah reports the API gateway v2 migration is complete. Load testing achieved 3,200 requests per second, 28% above the 2,500 target, with all 47 integration tests passing. Mike identified a P0 issue: refunds over $500 return HTTP 200 but silently fail at Stripe with no error logged. Root cause is a timeout mismatch - the gateway times out at 10 seconds but Stripe requires 15 seconds for large refunds. Lisa estimates a 2-day fix including regression testing. The team unanimously decided to delay the release by one week. DevOps will deploy the hotfix to staging by Wednesday, QA regression runs Thursday, and a go/no-go decision is set for Friday at 9 AM pending regression results. The product manager approved the revised timeline and notified stakeholders. Sprint velocity drops from 34 to 28 story points.
Original 886 chars Compressed 480 chars Ratio 1.85x Packets 8 Saved 406 chars (46%)
06 Academic Abstract - AI Research Paper ROUND-TRIP PROVEN
ORIGINAL
This paper introduces Structured Semantic Compression, a novel approach to reducing token consumption in multi-agent LLM communication. We evaluate the protocol across eight model architectures ranging from 4 billion to 405 billion parameters. Our primary finding is a 95.8% first-read comprehension rate when agents use structured packet formats compared to 94.1% with natural language, while achieving a median compression ratio of 10.41x on a medical deliberation corpus. The protocol generated 2,500 packets across test scenarios with 100% parse validity and zero malformed outputs. We observe that compression fundamentally alters network topology from broadcast to targeted deliberation patterns, correlating with a 37x increase in meaningful engagement per message. Smaller architectures below 4 billion parameters showed degraded comprehension at 61% and parse validity at 78%, establishing a practical lower bound. Cost analysis reveals a 91.2% reduction in API token expenditure for equivalent semantic throughput. We discuss implications for autonomous agent economies where communication costs directly impact operational margins. The protocol is language-agnostic and requires no fine-tuning, operating entirely within the prompt context window of standard foundation models.
COMPRESSED
ID:PAPER|OBS.99|^method:structured_semantic_compression|^tested:8_architectures_4B-405B_params|NOW ID:PAPER|OBS.98|^comprehension:95.8%_structured_vs_94.1%_natural|^median_ratio:10.41x|^corpus:medical_deliberation|NOW ID:PAPER|OBS.99|^packets:2500|^parse_validity:100%|^malformed:0|NOW ID:PAPER|INF.92|^topology_shift:broadcast_to_deliberation|^engagement:37x_increase_per_msg|NOW ID:PAPER|CON.90|^lower_bound:4B_params|^degraded:comprehension_61%+parse_78%|NOW ID:PAPER|OBS.95|^cost_reduction:91.2%_API_tokens|^equivalent_semantic_throughput|NOW ID:PAPER|INF.90|^implications:agent_economies|^comms_cost_impacts_margins|NOW ID:PAPER|OBS.99|^properties:language_agnostic+no_finetuning|^operates:prompt_context_window|NOW ID:PAPER|MRG.95|^conclusion:viable_for_large_models|^enables:targeted_deliberation|^limit:sub_4B|NOW
DECOMPRESSED
The paper presents a structured semantic compression method tested across 8 model architectures from 4B to 405B parameters. Structured packets achieved 95.8% first-read comprehension versus 94.1% for natural language, with a median 10.41x compression ratio on a medical deliberation corpus. Across 2,500 generated packets, parse validity was 100% with zero malformed outputs. Compression shifts network topology from broadcast to targeted deliberation, producing a 37x increase in meaningful engagement per message. A lower bound is established at 4B parameters, where comprehension degrades to 61% and parse validity to 78%. Cost analysis shows a 91.2% reduction in API token expenditure at equivalent semantic throughput. The authors note implications for autonomous agent economies where communication costs affect operational margins. The protocol is language-agnostic, requires no fine-tuning, and operates within the standard prompt context window.
Original 1,112 chars Compressed 583 chars Ratio 1.91x Packets 9 Saved 529 chars (48%)
07 Code Review - PR Feedback ROUND-TRIP PROVEN
ORIGINAL
Pull request #247 adds the user notification service. Overall the implementation is solid but I found three issues that need addressing before merge. First, the NotificationQueue class in notification_queue.py line 84 has a race condition: the check-then-act pattern on the queue length is not thread-safe, and under concurrent load two workers could both read length as 99, then both push, exceeding the 100-item limit. Use a threading Lock or switch to a bounded Queue. Second, the retry logic in retry_handler.py uses a fixed 5-second delay, which will cause thundering herd problems when the notification service recovers from an outage. Replace with exponential backoff starting at 1 second with a 60-second cap and add jitter. Third, the API endpoint at /api/notifications/send is missing rate limiting entirely. Without it, a single client could exhaust the email provider quota. Recommend 100 requests per minute per API key using the existing Redis-based rate limiter. Everything else looks clean. Tests cover the happy path well but need failure case coverage for the retry logic.
COMPRESSED
ID:REVIEWER|OBS.90|PR#247:notification_service|^overall:solid|^blockers:3|NOW ID:REVIEWER|OBS.99|!issue1:race_condition|^file:notification_queue.py:84|^check_then_act_not_threadsafe|^fix:threading.Lock_or_bounded_Queue|NOW ID:REVIEWER|OBS.95|!issue2:thundering_herd|^file:retry_handler.py|^fixed_5s_delay|^fix:exp_backoff_1s_start_60s_cap+jitter|NOW ID:REVIEWER|OBS.95|!issue3:no_rate_limit|^endpoint:/api/notifications/send|^fix:100rpm_per_key_via_redis|NOW ID:REVIEWER|INF.85|^tests:happy_path_good|^missing:failure_cases_for_retry|NOW ID:REVIEWER|MRG.90|^verdict:approve_after_3_fixes|^else:clean|NOW
DECOMPRESSED
PR #247 adds the notification service. Overall implementation is solid with 3 blocking issues. Issue 1: race condition in notification_queue.py at line 84 - the check-then-act pattern is not thread-safe; fix with threading.Lock or a bounded Queue. Issue 2: thundering herd risk in retry_handler.py due to a fixed 5-second delay; replace with exponential backoff starting at 1 second, capped at 60 seconds, with jitter. Issue 3: the /api/notifications/send endpoint has no rate limiting; implement 100 requests per minute per API key using the existing Redis rate limiter. Tests cover the happy path well but are missing failure cases for retry logic. Verdict: approve after the 3 fixes are addressed; everything else is clean.
Original 922 chars Compressed 462 chars Ratio 2.00x Packets 6 Saved 460 chars (50%)