Introducing Boutiquechng

Many Thanks for your visit

Please pay me a visit soon and do go to "ABOUT ME" click "View my complete profile" for more of my other blogs at the right side of this blog. Please click (1) The Future World (2) Malaysian Stories of Daily Life (3) The Way How I Feel and See It (4) The Photo Stories (5) The Worldfuturia (6) Home Cook Recipe.

Please do key in "boutiquechng" using Google Search Then click "The Future World" Or my other blogs as mentioned above to visit me next time OR go to the top left of this blog click "Follow" to follow this blog whenever there is new pages added or edits of old page

Thank you, good day or good night.

Monday, August 1, 2011

Zero Crimes Tolerance

An atom has neutron and proton as nucleus with electrons surround it.  The electron completes circling one round of the nucleus without re-generating force interference within one nano second/or 1/million nano second or any other time unit to measure; it is one basic frequency; the data of frequency is so taken by the time required to travelling a circle. One nano second to complete one round, it is named 1bns frequency, 2bns frequency, 4bns frequency, 8bns frequency. Noticing the numerical, it is doubling up. Each and every electron, it carries one N bns frequency. Each and every atom, it carries more than one N bns frequency, it carries a set of N bns frequency and it is its signature or its name as oxygen, hydrogen or whatever. The electrons may be at any number, but the set may has its limitation.

There may the same number of electrons but different set of N bns frequency, set one with 2of 2 N1 bns frequency, 4 of 2 N2 bns frequency and the atom named as oxygen, set 2 with 4of 2 N1 bns frequency, 2 of 2 N2 bns frequency and the atom named as hydrogen.  It is to indicate, the same nature as gas property, there are having the same number of electrons and it is having different signature as they have different set of bns frequency.

Living things brain cell, they are far more complex than a single atom, and they are millions of atoms and trillion of frequencies.  It does not matter the complexity, the countless atoms and the huge frequencies. It is the brain cell when they are born; they are pure and clean like a piece of paper without anything on it. Each and every brain cell may be trillion cells with hundred of trillion frequencies but each and every brain cell having the same frequencies waiting to be change into useful frequencies.

Images of trees, land, houses, living things and others, they are formed by trillions of different frequencies. The frequencies, it is not only indicating the property of the atom, it is also carries color effect and they have range of frequencies, which is range of color from light to darker. It is the range of frequencies; range of color effect creates images of all shapes. It is so because of the shading combine with different color.

When the re-generating force raised the basic frequencies and became eyesight frequencies, they raised all objects evenly and all different frequencies up by a standard factor. These ranges of frequencies, they are the same images when they are in basic frequencies or they are in eyesight frequencies. The eyesight frequencies, they create a phenomenon change to the brain cells and the range of frequencies stay in the brain. The raised frequencies are termed as secondary/working (wkg) frequencies. The brain cell or all activities needs the wkg frequencies to be activated.

Camcorder Battery PacksDigital Camera Battery PacksOne of eye cells and nerve cells are having one or more frequencies, they are the same of the basic frequencies of images (basic range of frequencies). Eyes are open and they are connected but no images are seen and felt. Once the re-generating force raised the basic frequencies and become wkg frequencies.  The wkg frequencies creates chemical change and some atoms released and deposit into the brain cells, the different type of atoms and the number of atoms deposited or released from the brain cells into the blood streams.  It is these atoms changes the brain cells into images/range of frequencies exactly the same as the images/range of frequencies outside the brains. That’s what we called, the memory.

The images/range of frequencies outside the brains, raised to wkg frequencies, the common frequencies inside the brains raised other uncommon frequencies as well and it is these uncommon frequencies activated the phenomenon change.

The power of the re-generating force, determining the raised frequencies up to certain level, the stronger the power the higher the frequencies. The re-generating force raised the basic frequencies to eyesight frequencies or the eyesight wkg frequencies.  There are housekeeping wkg frequencies, which is creating chemical change while living things in sleeping state. There are activity wkg frequencies which are instructing the movement of muscle cells. The housekeeping, activity and others wkg frequencies, they are raised by the living things own re-generating power.


The supercomputer is connected to the human or animals or all living things’ brain cells by econnect. The econnect of the supercomputer, one or more of its frequencies is the same as the eye cell, nerve cell and images frequencies. These are all connected by ways of basic frequencies constantly and there are no activities activated until the wkg frequencies are present. The econnet also has other functions, it is also connected to the heart cells and other internal and external organs cells and  they are connect by way of one or more of its frequencies are the same. These frequencies are served as esense and they formed the specified individual codes for any object/or any living thing, they are also the useful brain cells images frequencies for crimes detection transmitting along within these codes.

Imaging technologies is used to detect illegal activities and store the illegal images into supercomputer.  The acts of stealing, robbing, murdering and etc are converted into images frequencies by the supercomputer the moment parliament passed and later gazette become enforceable.

It is only connected to those areas of the brain activities showing of intending to committing crimes. The moment, it is detected by supercomputer by ways of wkg frequencies; alerts are to crimes buster department.  Alerts are sent automatically as they are connected by the same basic frequencies.  Images of the activities of the “would be” criminals, relaying and online to relevant crimes buster departments for either crimes prevention or arranging a “catch on the act” and put them behind bars for good.

The devices are invented and making possible and they are all in place “Zero Crimes Tolerance’ is achieved.

Next Topic: The Policing

Please do double click the sites, in The Banners for more details and prices of their products and services.

==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================

Sunday, July 17, 2011

Security Systems III

Our human body, the functioning is exactly the same as the functioning of a simple configuration of table top computer or any other computer configuration.  Our brain is tantamount to the CPU and our eyes are the same of the monitor and scanner. Our hands are the keyboard or the mouse.  There are not much of any differences.

The sound frequencies, it is too high or too low, our ears are not able to pick up.  The frequencies must fall within the hearing range.  Likewise, our eyes are not able to accept any basic frequencies of any object.  It must be within the acceptable frequencies range so that our eyes are able to pick up whatever the images it may be. (The basic frequencies are referring to those frequencies of atoms of different materials.  Please refer to my earlier posts).  The light is able to increase the basic frequencies up to the range which is acceptable by our eyes. It is to say, the light is able to alter the images to reach our eyes and not getting the true images.

Instant download A device could be produced and attached to human body or other materials/object and it became invisible.  The device is able to allow the images frequencies, guiding them from the back to the front and of any blocking of the images to reach our eyes.  These devices are good for the data storage hardware of the supercomputer and put them in place at the earth orbiting path. In simple words, invisible of any object is possible by such a device. These devices are needed to protect the supercomputer and its components/peripherals for sabotages.


There is another way that any object could be made into invisible.  The basic frequencies that could be accepted by eyes of living things, the eyesight frequencies, there are able to penetrate through any object except there will in the form of weak signally and may be slightly differ from the original images due to resistance of object that there were passing through.


There is no way hacker could get into supercomputer system; all users are online with the supercomputer.  The only way for hackers to get in, it is by disguise themselves as new born, visitors and tourists and they needed to have a device be able to break the code from the air, they can do anywhere from the earth and the universe. The supercomputer is 100% wireless and their hardware is everywhere, on the ground, in the air and at any one point of the space.

Every transmitting and receiving codes carried out by the supercomputer, it has a group of soldiers to guide and protect them along the way.  One of these soldiers is simply the human/object frequencies and they change just a nano second further more it is more ten (may be hundreds) frequencies. The hacker has to break these codes less than nano second with the exact set of more than ten combinations of different codes. They failed to get in within the time limit.  Another soldier activates and starts to collect the hacker esense place them into the supercomputer hackers file for future use.  No action is taken towards any hacker unless there is danger of crippling the supercomputer systems. Other soldier will get into the hacker’s computer system and became a sleeper and data collectors and it is only restricted to the techniques and codes of hackings. The data will relay to the supercomputer’s teams of systems experts.

Disguising as newborn, it is not possible, the supercomputer is constantly online with the newborn’s parents. Disguising as migrates, visitors and tourists, it is possible but there are many ways could be imposed manually and many methods could be installed inside the supercomputer for the implementation and monitoring.

Embedding into emails, the supercomputer is well verse with all know emails, unknown emails will be subjected to stringent scanning. It is most important; the supercomputer will trace its owner, pick up the esense and create a temp file if it is new entry, there after the supercomputer will online constantly and monitoring.


Next Topic: Zero Crimes Tolerance



Please do double click the sites, in The Banners for more details and prices of their products and services.

==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================

Sunday, July 3, 2011

Security Systems II

Human body is another useful re-generating source of power; it is also a transmitter and receiver.  The transmitting of human body frequencies and the reception of information in the form of various frequencies from the atoms, molecules, elements and higher form of combination of elements, living cells, such function of the human body, it is named as esense

The supercomputer is connected to the econnect, the devices which are installed in the satellite and orbiting.  There may be more than one satellite to be able to connect the esense of their folks of the nation all over the world. The movement of each and every folk of the nation is collected by the econnect from the esense and the supercomputer is keeping the information into their respective files. The collection of data started day one when the mother, one or more days before the child is conceived. The collection of data is continuing until a person is passed away but the files of the deceased may not be deleting and they are kept forever.

It is seen by this way of data collecting, the supercomputer will get busted for over loading.  A technique of data save keeping is needed to introduce. The invention of one binary code be kept by one atom is needed. By this way, the device is able to keep trillions of code by just only one fine shape pencil dot. Secondly, management of data keeping, the data compressing method, it is able to contain data more than the source data. The compressing method, it is keeping only one record for a number of same and identical records. They may have hundreds of same and identical data and the system provide for only one data to be kept.  Whenever it needs the repeating data, it retrieves the one data and put it back the copied hundreds of data to their rightful place.

It may be at our understanding that there are repeating recording same data of any person especially while we are sleeping. It is not the case, we may have standing still of no physical movement but our bodies frequencies keep on changing. We are constantly reacting to our surroundings, the contents of the air, the moisture, the dirt, the chemicals, the noise and you may wonder, there could be phenomenon change, the disposition of elements into atoms and formation of molecules and elements. The reception of frequencies, from other human, animal and even plants, may be rocks and other non life materials as well, it is these frequencies create a change in the brain activities and affect physically. These data are useful for health purposes.

Purchasers are able to buy anything from any establishment, the hypermarket or the roadside store without carrying anything in hand for the buying.  The transactions may be shown on any device with capability of online.  There may not be needed any showing of the transactions, the seller allowed the purchaser to take possession of the commodity and walked away.   The decisions of the seller and buyers are picked up by econnect from their esense and the supercomputer updates all respective transactions.  Such a system once it is in place, hacking is becoming more difficult if not impossible.

There is another device, the eowner, it is installed together with econnect in the satellite.  The function of the eowner is to keep track of commodity ownership.  Anything, a small piece of sand, a product produced from the same mould and a living thing, each of them has its own characteristic.  Each of them has its owner and they are kept track, as for sand and rock, the moment the system started, the products/produce, the moment they are produced and all living things, the moment they are born, the ownership are recorded respectively by the supercomputer. There is not necessary to provide continuing capturing of data except whenever they are changing ownership.

Someone who tries to gain access the supercomputer to get useful information of others, preliminary it is one of two situations, he is a user of the supercomputer, and he is not a user.  The supercomputer is continuing in contact and online with all users.  It leaves no room for the hacker to activate other user files other than his own files unless it is legitimate.  Outsider to gain access the supercomputer, again since all users are online with supercomputer, any access will be denied.  The supercomputer will not accept any new user unless it is a new approved migrate and visitors or tourists and their activities being monitor continuing.

There are more than two backup hardware of the supercomputer system. All the backups and the main supercomputer, they are running concurrently. Any one hardware breakdown, it must be replaced within minutes.  There are procedures to follow by the supercomputer, should replacement is not done in due course.  One of the procedures of the supercomputer may trigger some kind of national curfew on certain aspects.  It is the upmost critical that the supercomputer must be functioning continuingly without any technical glitches.

Next Topic:   Security Systems III


Please do double click the sites, in The Banners for more details and prices of their products and services.


==============================================
Please click the "Blog Archive “at the right side of this blog for more readings. Click the Online Hypermarket,  Discounted Hypermarket and  RingAcall Hypermarket for more products and services.
==============================================