Ha Gotcha! Your knowledge of computers is wanting. Magnetic harddisks can be scanned with laser for surface patterns arrangements, I think your attacks on me are least professional.
Nyagudi Musandu[EMAIL PROTECTED] wrote:
On Thu, 02 Oct 2003 22:40:46 PDT, NM Research <[EMAIL PROTECTED]&g
Ha Gotcha! Your knowledge of computers is wanting. Magnetic harddisks can be scanned with laser for surface patterns arrangements, I think your attacks on me are least professional.
Nyagudi Musandu[EMAIL PROTECTED] wrote:
On Thu, 02 Oct 2003 22:40:46 PDT, NM Research <[EMAIL PROTECTED]&g
Have the old hard disks read with use of laser and copied into new larger capacity hard disks. Laser will read everything on the magnetic surface of the old hard disks including passwords, apps, OS, data and configurations.
CAUTION: New hard disks must have the same hardware characteristics as
EMAIL PROTECTED] wrote:
On Wed, 24 Sep 2003 22:47:54 PDT, NM Research <[EMAIL PROTECTED]>said:> These growth functions are not catered for in network operating systemsNetwork operating systems never catered for the old RAS/CAS refreshstrobe used on some dynamic RAM parts that required ex
I have been shifting through all manner of nano ( molecular ) computing info. One of the greatest paradoxes is how to remove the degenerated datalinks and memory locations and replenish the same, without altering system / network configurations and memory contents. Though I must admit some biz an
the USA/ that city. Do you get the picture??
Nyagudi MusanduIljitsch van Beijnum <[EMAIL PROTECTED]> wrote:
On dinsdag, aug 26, 2003, at 10:09 Europe/Amsterdam, NM Research wrote:> A scenario where all the ecommerce code and routing> code ( paid traffic ) would fail is if the Financ
A scenario where all the ecommerce code and routing
code ( paid traffic ) would fail is if the Financial
Capital City of the World is Struck in a light nuke
attack. Are you, or is the code capable of handle
this ?
If so I am very comfortable.
Nyagudi Musandu
How do you propose we test these pro
microwave EMP disruptors to get to town. Ok RAND Corp and others would also help.
NyagudiJohn Stracke <[EMAIL PROTECTED]> wrote:
NM Research wrote:> My answer to your question is that I want IETF, ISO and ITU to set > nuclear warfare standards,It might be useful for someone to produce su
beenanswered.gja> ATTACHMENT part 2 message/rfc822 Date: Fri, 15 Aug 2003 04:00:24 -0700 (PDT)From: NM Research <[EMAIL PROTECTED]>Subject: Re: Emerging Network Usage and Engineering IssuesTo: grenville armitage <[EMAIL PROTECTED]>
At times feel free to insult me privately not on the list. T
I feel that legislation should be enacted to make flash mobbing illegal. As one could invite a mob to a confined area like a shopping mall, close / block entries then Let Rip or Do a Bang, and cut many people down. As the sizes of the mobs are growing close to 500.
Websites should also be certi
get a patent.
Nyagudi"Mr. James W. Laferriere" <[EMAIL PROTECTED]> wrote:
Hello Nyagudi , Would you please post any referances to validateyour statements ? This is not meant to disparage those statementsjust to shed a bit more light ;-) . Tia, JimLOn Sun, 20 Jul 2003, NM Research
get a patent.
Nyagudi"Mr. James W. Laferriere" <[EMAIL PROTECTED]> wrote:
Hello Nyagudi , Would you please post any referances to validateyour statements ? This is not meant to disparage those statementsjust to shed a bit more light ;-) . Tia, JimLOn Sun, 20 Jul 2003, NM Research
CLARIFICATION:
In solid state physics light can be amplified quasi-symmetrically by sandwiching gen1,2, or 3 light amplifiers between the relevant polarity filters. Though this process involves photon-electron-photon conversion and well choosen light types and a well calibrated arrangement. Furth
About the feasibility of 4g systems. I feel that they have a bright future, if and only if the human understanding of the particulate nature of electromagnetic radiation is not enhanced to the level of manipulation and usage, and remains primitive as it current exists.
If organizations like CER
to be discouraged from this IETF list. I do think the occasional challenge to conventional thinking is very healthy and desirable.#g--[1] http://www1.ietf.org/mail-archive/ietf/Current/msg21526.htmlAt 21:31 09/07/03 -0700, NM Research wrote:>Sorry for the posting. Much regretted to have caused a s
Sorry for the posting. Much regretted to have caused a storm, and I have received your complaints both public and private in good faith.
I was just trying to emphasize that the current solid state physics and protocols that IETF discusses cannot be sustained in the future if quantum internet syst
P(t) - photons transmitted
P(r) - photons received
Symmetric Amplification of Light : P(t)
The importance of such a system is to sustain results obtained from quantum computing or routing from filters in a system in optical format, allowing for their redirecting to different system memory addre
P(t) - photons transmitted
P(l) - photons lost ( by absorption in space or by transparency / inefficiency of optical fibre )
P(r) - photons received
The future of secure quantum cryptography is dependent upon the following :
Condition ( a) : Development of a super efficient optical fibre such t
efore the encryption sequence - Can you???
Furthermore we can tap computer key board radiation from close range and relay it to get keys anyway! Are they keyboard or automatically generated?
Nyagudi
[EMAIL PROTECTED] wrote:
On Mon, 30 Jun 2003 02:41:37 PDT, NM Research <[EMAIL PROTECTED]>
(1) QC assumes that most of the photons from the transmitter of a "quantum" message, reach the receiver. This assumption is therefore used toerrorneously deduce that the communicating parties will therefore be able to detect interception or interference.Problem(a): This is not true for blue las
20 matches
Mail list logo