Next Generation Super Computer Systems – Optical (CPU) Central Processing Unit

How much can we get out of the computer?

With an optical 128 bit CPU that runs on 500 Ghz, (compared to today’s electric CPU that runs on 4Ghz) we could have a lot more to say than today.

It could have as much as 10 000 cores @ 500 Ghz each giving us a total of 5 million Ghz at 128 bit. It is by far the best solution than what we have today with 64 bit CPU/systems. Compared to Intel 8 core, that run 80-200 computer programs and threads at 200-400. With a 10 000 core we can have real time processing of 10 000 program at same time at one thread. If we divid it by half you will have 5 000 programs and 5000 threads that can run on each core with uniq arichtecture

Also Quantum computers could maybe be optical too. Look here:

https://www.dwavesys.com/

https://en.wikipedia.org/wiki/Quantum_computing

https://www.ibm.com/quantum-computing/

It could be 1 Terrabit connection to an optical router on the motherboard that gives optical routing and connection to other computer parts like, Ethernet, GPU (Graphic Processing Unit), memory Blue ray, RAID/Hard drives, monitors, video rendering cards. The power consumption does not need to be high because of optical has less power and less heat than copper circuits.

Operating system would boot up in less than a second if we had this properties on the hardware(and software muse be written for the new system (128 bit)

Why computers sometimes die without any obvious reason!

There is some things that are dangerous for computers:

1. Water or other liquids.

2. To cold temperature.

3. To high temperature.

4. High or too low voltage.

4. Lightning that strikes directly into the machine, from electricity outlet, from network cable, DSL, Modem/cable TV(not fiber optical since it does not lead electricity), and/or other connected devices.

6. Vibration/shock.

7. Dust that gathers inside the computer, overheating and short circuit the circuits.

8. Viruses the causes damage to computer(example changing frequency of CPU/motherboard or voltage) can kill computer circuits.

9. Solar storms.

Solar storm is the most interesting trend that leads to broken computers and corrupt software.

A solar storm can lead to failure of computers over a long distance. Example in computers in Norway in both Oslo to Tromsø that is 1625 km away of each other and other locations like Haugesund, Bodø have at same time and day down to the minute during a solar storm a disk failure, plus other components died.

The solar storm can send magnetic waves, electrons, Proton/neutron, x ray and radio flux that kill the computer. IT can hit the computer directly, or thru Ethernet/broadband like DSL and to your computer. Or I can damage wireless access points, mobile modems, 3G,4G and 5G networks, DSL modem, Ethernet cards.

A solar storm can cause wrong data to be written to disk or erasing disk, it can also damage circuits inside computer so it will not start.

Another example I experienced on SHDSL 2Mbit internet connection was that a solar storm that happened while streaming video. Video stopped and I checked: https://www.swpc.noaa.gov/ as saw that a solar storm had just happened at that time video stopped. The SHDSL modem stopped functioning properly and was exchanged.

IT can knock out phone lines lika Analog, ISDN or DSL. It can harm central systems for mobilephones, amatuer radio, satelite, TV analog and TV digital by ground signal or by satelite, Ethernet cabeled networks. Gigabit fiber optical should be the only broadband solution businesses and private households should get, fiber optical cost to establish, but price is low for a month for Gigabit internet connection,, it is stable and it is not affected by lightning , solarstorm, or water on the copper wires to the phone company. It cost but it is reliable.

https://www.swpc.noaa.gov/impacts/hf-radio-communications

Also check: https://spaceweather.com/

Røyk fra sigaretter dreper din Personlige Computer – Personlig Komputer. Kort sagt PC’en!

Sigaretter gir fra seg røyk som blir dratt inn i PC’en, kombinert med vanlig støv som også blir dratt inn så blir det da ekstra tett belegg med støv som får PC’en til å overopphetes.

2 Like PC’er en står i røykfritt rom og en står hos røyker.

PC’en til røykeren lever ca bare halve tiden før den ryker i forhold til ikke røker PC.

Røyk blir til et sånt smuss lag inne i PC’en som binder seg til støvet og jeg antar det «fuktige laget»kortslutter kretsene.

Radioaktivt problem for både menneske(forskning viser til at radioaktivitet i sigaretten er årsaken til lungekreft) og maskin: Det sies at tobakksplanten under fotosyntesen absorberer radioaktive isotoper som binder seg til planten. Når den tennes opp frigis de radioaktive elementene som blir dratt inn og så skader lunger(nikotin og tjære skader også) og radioaktiviteten går også inn i PC’en og slår ut elektronikk med sine bitte små magnetiske impulser som treffer kretser og gir gale dataverdier.

Det sies at en omstart av PC’en om dagen holder PC Doktoren borte, det betyr hel avslutning, helt av med strømmen og starte den på nytt. Frisker opp programmer som har bug i seg som t o m kan påvirke operativ systemet. En annen ting man kan gjøre for å få stabil PC der det trengs er å sette den på strømforsyningen til en online UPS.

En annen ting som bør gjøres med en hver PC hvert år er å støvsuge den for støv innvendig, og luftehull på utsiden og innvendig. Husk ta ut alle datakabler og strømkabler før du åpner PC’en og støvsuger den, så lever den lengre.

The wrong knowledge and Wrong/missuse of words

Doctors today do several things wrong.

Doctors today do several things wrong.

1. First they make diagnosis that says the body ill, and give medicine that temporarily works

2. In Norway the name for Hospital is “sykehus” this means directly translated to “SickHouse”

We not want to go to Hospital to be sick and be mistreated with wrong knowledge, we want to go to a healthy house that can cure/fix us. We want not doctor that mark us a sick, but as healthy after treatment.

We don’t want to get diagnosis of illness on us, but we want diagnosis that says the body is cure/healthy.

We don’t want medicine, but we want a cure that fixes the problem in short time permently.

They should not do surgery or give medicine to body/patient to begin with. They should three christian people who pray together that illness go away, and see that it go away in short time; if not you have to try medication or surgery.

First the write out diagnosis and give medicine that temporarly works

The cure for any/all disease cost a lot!

Published Monday 21/2-2020

Do you know how many atoms there are in the human body?

Answer:

There are approximately 7 x 1027 atoms in the average human body. This is the estimate for a 70 kg adult human male. Generally, a smaller person would contain fewer atoms; a larger person would contain more atoms.

Source: https://www.thoughtco.com/how-many-atoms-are-in-human-body-603872

7 x 1027 atoms =

Number or atoms in human body
7 000 000 000 000 000 000 000 000 000,00
1 Yottabyte =
1 208 925 819 614 620 000 000 000,00

This number of atoms are 5790,264288 times larger than one yottabyte. (https://en.wikipedia.org/wiki/Yottabyte)

700 000 000 000 000 000,00 We need a table that uniquely identify and counts each atom and total the number of atoms, another table that sets placement off an atom in X, Y, Z axis on nanometer scale, and atom direction on a quark scale, another table giving linkage of atoms to other atoms and molecule structure a third table that tells you what each type of atoms it is.

number of atoms 4 Terrabyte units of 4 terrabyte eaach
7 000 000 000 000 000 000 000 000 000,00 4 000 000 000 000,00 1 750 000 000 000 000,00
total cost of last number of 4 terrabyte SSD drives / units at $ 400
00 000 000 000 000 000,00

$ 700 000 000 000 000 000,00

That is just for the list of atoms, then comes all the tables about atom position, atom type, atom binding etc.

Lets say $ 700 trillion dollars: Look here at Currency and credit derivative: https://usdebtclock.org/

Now let’s say you need 2 million world economies at 88 trillion dollar a year at total cost of $176 000 000 000 000 000 000,00 to analyze the whole body.

Now you would need additional $ 176 000 000 000 000 000 000,00 to cure all diseases and all damages a body has after analysis.

That why you should not damage your body or do drugs/narcotics. It cost a lot to fix it.

Now every 10th year we can reduce the cost with 20 % and soon it will be affordable for everyone to use.

We need a machine that can scan all atoms and quarks in body and a machine that can rewrite the quarks and atoms structure to healed body state. It can seem easier to pray to God to cure you.

Possible ways a computer can be hacked and used as bot, emptied for information or uploaded information to it.

Sunday 15th of February 2020 @ clock 22:33

Hardware ways computers can be hack:

1. Thru the electric cable into the PSU -Power Supply unit.

This can have direct access to CPU, Memory and hard drive and files can be example transferred out of or into computer thru the power grid and outside the house, without any visible processes in task manger or netsat( Ethernet packet sniffer program) that is not showing any network activity. A online UPS – Uninterruptible Power Supply and / or petrol Engine-generator can stop this traffic in the UPS because it filters out noise and produce a pure sine wave and because the PSU get its electricity input not connected to the grid but to the petrol power generator.

2. Thru a USB wireless dongle(WIFI adapter or black box) or cabled network card connected inside the machine or on the backside of computer, giving internet or other network access to the computer. Driver can be installed so it is not possible to see the adapter in network manger, and no network traffic on the adapter (DOS command line: netstat) is visible. It can also be visible as a network adapter but with a backdoor in it. You can have somebody on inside organization telling the WIFI password to others, or you might have password that is weak that can be hacked with brute force, or you have other security exploits in router, firewall or WIFI Access point, or weak encryption. You might also have fake WIFI Access points and routers, that collects all traffic and send it to another destination outside your organization.

The adapter might have a Trojan in it and sends and receive data from /to computer, without any traces on network. (netstat) Only a relay a machine with two networks cards, one network card from computer to the “Ethernet Packet sniffing program” that analyses all network traffic and send it out to the LAN /WAN on network card 2 can detect this communication.

3. Thru a cellular network EDGE, LTE, 3G, 4G and 5G mobile networks dongle. It can give computer network access to internet or private networks, thru Vlan or thru example VPN and it can give access to the computer from the outside too. IT can also be situation where they hacked security in mobile network, or using fakebase stations, with packet sniffers, relaying the call/data to another base station. If somebody plant a Trojan inside mobile (or data packet capture (like the https://en.wikipedia.org/wiki/Data_Retention_Directive ) network they can undetected capture all voice and data traffic in mobile networks. People working in Data Retention Directive can be criminals

4. A man in the middle machine between you and internet captures your connection when downloading software, drivers and OS updates. You download example use “Calculator plus” from Microsoft and the man in the middle(machine gives you are virus file instead of the original file where the virus Trojan gets executed) This can be done if ISP is hacked or have unfaithful employees. Even useof SSL/HTTPS/ AES, VPN or DES this can be hacked. Your router might be hacked giving possibility to send from your IP address and receive your data before you see, alter what comes in and out of the router. (example fake internet)

5. A cellular wireless transmitter can be embedded in hard drive, memory, keyboard, mouse, web camera, CD/DVD/Blue ray player, Ethernet Thru HDMI(connection to SMART HD TV), motherboard, graphic adapter, network card, raid cards, sound cards and CPU. This circuit can transmit to a nearby receiver and sender on it own frequency or on Bluetooth, wlan or mobile network. It can also be a flying nanorobot in the room you not see, but thats recording you keystrokes on keyboard for entering user name and password, then it send username and password wireless to a3rd person.

Machine needs to be put into a room that is shielded with:

a layer of Aluminum foil

https://en.wikipedia.org/wiki/Aluminium_foil

One layer with Antistatic bag material.

https://en.wikipedia.org/wiki/Antistatic_bag

A layer of Lead

https://en.wikipedia.org/wiki/Lead

on top, front side, backside, sides, bottom, and /or placed in water proof box that is lowered into a water tank/room where there is water in all directions.

Shielding must be all walls, ceiling and ground.

Put the server into a Faraday cage:

https://en.wikipedia.org/wiki/Faraday_cage

Walls, ground, ceiling should be of concrete as firs layer or inside a mountain.

This is perfect protections from:

Radio Jamming

https://en.wikipedia.org/wiki/Radio_jamming

Electromagnetic pulse (EMP)

https://en.wikipedia.org/wiki/Electromagnetic_pulse

https://en.wikipedia.org/wiki/Solar_storm

Solar storms

Nuclear explosion can damage both hard drive and computer parts if it is not shielded.

https://en.wikipedia.org/wiki/Nuclear_explosion

Power from grid must go thru a transformer where the voltage is stable and produce a perfect sine wave. Then it must go thru a Online UPS that thru one transformer converts 220 volt down to batteries 19 volt and then a new transformer convert example 19 volts battery up to 220 volt

If not power from grid a gasoline generator can be the source but it should send the electricity to an UPS before it reaches the computer and network parts.

6.Quantum technology:

https://www.picoquant.com/applications/category/quantum-optics/quantum-communication

https://en.wikipedia.org/wiki/Quantum_information_science

https://en.wikipedia.org/wiki/Communication_complexity

https://en.wikipedia.org/wiki/Quantum_entanglement

https://en.wikipedia.org/wiki/Quantum_teleportation

https://en.wikipedia.org/wiki/Quantum_network

Quantum Technology can be installed in computer hardware produced by different computer manufactures.

They can be fully hidden for virus scan, no files installed on hard drive, no firewall can detect it, they can communicated with its node on the other side of the world instantely, with no wireless antennas(radio) no network cable, not even thru the power supply and out on the electricity grid and with very little power consumption and can reach both mbit, gigabit and terrabit communication speeds.

There is no element traces of it in task manger as a program or driver, there is no program installed, no firewall/router log traces of it and /or no netsat in your OS.

Only you could see it reading and writing to disk because you see the hard drive lamp blinking. It does not communicate as an Ethernet adapter, it is loaded before OS is loaded and can have full access to computers hardware. It is worse than a root kit.

It can also be in your router or smartphone / mobile phone giving internet access thru quantum communication and monitor all network traffic.

The device is really small on a nano scale. You can’t see it with your eyes without a scanning electron microscope https://en.wikipedia.org/wiki/Scanning_electron_microscope

It is nanotechnology https://en.wikipedia.org/wiki/Nanotechnology

7. The masters of the universe.

People that know how the universe really works (example like in the movie “The Matrix” can make the universe send signals to your hard drive, CPU and read or write a file to it, or send a signal to the CPU setting it to do a task to work with without your knowledge and to GPU showing you an image/video that you not opened or that is a fake video stream of an example war actions.

Who are they? Technical Simulated reality operators, God for sure, maybe some smart people and maybe the devil too.

Also computer screens, smart phone screens, TV and tablet can work with their pixels to show image and reversed from sending to receiving images as a digital camera taking a picture of the room without you know it.

8. The screen can be built in a way that the pixels can work two ways:

one to show an image on the screen, second the pixels works opposite like a camera that takes photo of you and your room.

Same counts for mobile phones(smartphones) screens and cameras and microphone on the smart phone can be a security risk.

Software ways a computer can be hacked:

1. Computers operating system might have built in backdoor from the software manufacture that can do nearly anything with your computer. And it is invisible built then. Only a computer that acts as a packet sniffer for Ethernet box outside the computer can log all the traffic and see the traffic from computer to another source outside the network over on the internet.

2. Bug reports

Operating systems and some software companies send statistical and bug reports with memory dump over the internet when computer crashes, private information can be used at software company or fetch up during it travels over the internet by other packet sniffers and be used if it is not correctly encrypted.

3. Security exploits in operating systemor in software,

where you download one thing that you think you know is the right source, bt it is a look alike webiste and inside the file you are downloading it is Trojan, viruses, malware, spyware, or specific signal like DDOS, Buffer overflow or in an pattern that the OS and programs responds to by executing the virus on computer or install spy software.

4. The user clicks to install a program in e-mail as an example and the virus hijack sall your files and encrypt them and they want ransom money by bitcoin or other crypto currencies to get your files back again.

5. Nanotechnology – Nanorobots can integrate with a specific computer part example router, switch, network card and sniff on send and received what is going on in the network card and transmit it to another source outside the building. They are so small that you can not see them with the naked eye, the only way it can be detected is to put all computer parts under scanning electron microscope( that will take maybe months to scan all parts) or that you see that your data appear somewhere else in the world.

6. Drivers and system files and 3rd party drivers or programs can contain viruses/trojans, regardless if they are from original manufacture or from a 3rd website source.

All drivers, ISO, OS, and software should be downloaded with a md5 checksum and the download file should be encrypted.

7. Nanotechnology working as spy hardware and spy software.

Nanotechnology can be build with a photo/video camera and microphone and a radio transmitter so small that you can not see it in the room. This can be with quantum communication or send it out on the internet in the house, mobile network or other wireless spy base stations. They can spy on you and your equipment, like seeing what is on your screen and keyboards strikes you use for username and password for any service like MS Windows Login, or website or other and transmit to an unknown 3rd party.

8. Nanotechnology Spy and central intelligence.

Nanotechnology are so small they can climb inside your ear, and record your voice, then sent the voice to a spy base station with a computer and then make synthetic audio file of your voice. This can be used to make you hear in your ear with your own voice, example: What is the code to the safe, go open it to check if everything is ok! You come to the safe and you say out inside you quietly the number for the safe(or password for windows, or other online services) and the nanospy technology recognize the voice hears turns it into letters and numbers and it sends the password to another unknown party.

9. Nanotechnology as a weapon

This is not for computers, but it is important to take it into consideration.

Nanotechnology robots are so small they can penetrate you skin and go into your body, thru the bloodstream or go directly to you nervous system: Spine or brain.

There it make example pain in right or left foot, side, arm or chest, belly or your head. Pain that is not real, what people would call psychiatric disease. It can also be in the flesh and generate burning itchy felling on backside or arm as if you have eczema https://en.wikipedia.org/wiki/Dermatitis

Nanobots can also make damage body, skin or organs and cause real pain to the body and since they are so small it is hard to detect where the sources of them are.

IT can also climb inside your ear or vocal cord and make you say things you did not mean to say or inside ear where it has recorded other peoples voices, and then it synthesis the words to sounds of people you know and not know. It can make you think that you are mentally ill because you don’t know the source of it and you did not plan to say the things that come out of your mouth or what you hear other peoples voices inside you did not come from you.

Now if there is matrix in this world it can make you feel pain or become sick, or feel healthy and happy and pleasure, or sex desire or not. If you been good person, devil can hurt you, and God can reward you are good, If you been bad God can punish you while devil will try to make you do more evil.

The cure to kill nanobots in your house is a powerful magnet like in MRI (if you feel good during a MRI scan it can be because the nanobots during a MRI magnet scan can’t operate in this magnetic field or MRI (maybe a Tesla coil put them out of action)

If your back or arms are itchy badely like electric, take a warm shower and itchying and ticklis increases, then turn water to cold water fast and then itchying and ticklising ends fast next second. This temperatur differense seems to knock out the nanorobots.

Spray whole house with a water spray so (small particle spray) all particles in air get wet, making difficult for nanobots to fly away, use then a small gardener weed burner(flamethrower) and burn all parts of the empty air in every room of your house.

You should not do it without a bucket of water and fire extinguisher ready and only if you feel or know that house is under surveillance and/or weird things happening.

Error! Insuffient data in human DNA to build a human beeing. feil! ikke nok data i Menneskets sitt DNA til å skape et menneske.

DNA Apokalypse! https://no.wikipedia.org/wiki/Apokalypse

https://en.wikipedia.org/wiki/Apocalyptic_literature

Vi mangler mer enn 99,9999% av koden til å skape et menneske.

Det er ca 1,5 gb i menneske DNA hvor 750 MegaBytes kommer fra far og 750 MegaBytes kommer fra mor.

Det er ikke nok data i mors eller far sine celler i kroppen, cellen “egget”, spermen, blodet, kromosoner eller vev til for å bli et menneskebarn. Hvordan kan det bli til? Det betyr at noen/noe med langt over 7000 Yottabyte lagring har en mal i det skjulte for hvordan de bygger mennesket opp i mors mage og etter fødselen i nanometer skala til man er blitt ca 150 cm -180 cm høy – Se https://scaleofuniverse.com/

Dette regnestykket er bare for hjernen! Ikke for resten av organer og nervetråder, muskler, blodårer, blod, hjerte, lunger, tarm, kjønnsorganer, milt, lever, skjelletet, nyrer kommer i tilegg som krever enda mer data

Jeg antar at et Scanning electron microscope https://en.wikipedia.org/wiki/Scanning_electron_microscope kan avlsløre noen hemmligheter, men ikke alle.

Se under – mattestykket går ikke opp når man legger kunnskap og logikk til.

Høyreklikk på bildet og velg vis bilde, eller bilde i nytt vindu så blir tallene og teksten større.

1 073 741 824,00gigabyte


1 573 741 824,001,5 gigabytei menneskets DNA






1 152 921 504 606 850 000,001 exabyte


10 152 921 504 606 800 000,0010 exabyteMennesket totale lagringsplass i hjernen.

6 451 453 059,05antall ganger større enn 1,5 GB


https://en.wikipedia.org/wiki/Yottabyte

https://en.wikipedia.org/wiki/Exabyte

https://en.wikipedia.org/wiki/Gigabyte

https://en.wikipedia.org/wiki/Megabyte

https://en.wikipedia.org/wiki/Kilobyte