{"id":1869,"date":"2020-09-28T01:38:26","date_gmt":"2020-09-28T01:38:26","guid":{"rendered":"http:\/\/region10.herbzinser64.com\/dir\/science03\/?p=1869"},"modified":"2020-09-28T01:38:26","modified_gmt":"2020-09-28T01:38:26","slug":"the-bio-computer-internet-the-north-pole-magnetic-field-benjamin-netanyahu-net-war-to-control-marinette-wisconsin","status":"publish","type":"post","link":"http:\/\/region10.herbzinser64.com\/dir\/science03\/2020\/09\/28\/the-bio-computer-internet-the-north-pole-magnetic-field-benjamin-netanyahu-net-war-to-control-marinette-wisconsin\/","title":{"rendered":"The bio-computer interNET\u00a0 . . . .the North Pole magNETic field &#8230;. Benjamin\u00a0NETanyahu &#8211; &#8211; &#8211; -> NET WAR to control MariNETte, Wisconsin"},"content":{"rendered":"<p class=\"c5\"><span class=\"c10 c24 c35 c12\">Rd-blog-1518 by Herb Zinser<\/span><\/p>\n<p class=\"c5 c9\">\n<h1 id=\"h.m7wb88z85qj\" class=\"c17\"><span class=\"c14 c35 c37\">The bio-computer inter<\/span><span class=\"c35 c43 c48\">NET<\/span><span class=\"c14 c35 c43\">\u00a0<\/span><span class=\"c37 c14 c35\"><br \/>\n. . . .the North Pole mag<\/span><span class=\"c23\">NET<\/span><span class=\"c37 c14 c35\">ic field &#8230;. Benjamin\u00a0<\/span><span class=\"c23\">NET<\/span><span class=\"c37 c14 c35\">anyahu &#8211;<br \/>\n&#8211; &#8211; -&gt; NET WAR<br \/>\nto control Mari<\/span><span class=\"c23\">NET<\/span><span class=\"c37 c14 c35\">te, Wisconsin<\/p>\n<p>&#8211; &#8211; &gt; Boy Scout messenger<br \/>\nSam Hengel warns world of<br \/>\nthe\u00a0<\/span><span class=\"c14 c35 c43\">NET<\/span><span class=\"c22 c37 c14 c24 c35\">\u00a0wars \u2026 the<\/span><\/h1>\n<h1 id=\"h.8okawv8f24k\" class=\"c17\"><span class=\"c10 c21 c24\">Underground ancient<\/span><\/h1>\n<h1 id=\"h.xq1txa61upx7\" class=\"c17\"><span class=\"c10 c21 c24\">COMPUTER EARTH<br \/>\nsecret<br \/>\natomic computer\u2026&#8230;<\/span><\/h1>\n<h1 id=\"h.ae25bo6jp7ze\" class=\"c17\"><span class=\"c10 c21 c24\">Egyptian<br \/>\nBOOK of the DEAD software<\/span><\/h1>\n<h1 id=\"h.4obwzfs19ibj\" class=\"c17\"><span class=\"c21\">attack that surfaced at<br \/>\nMari<\/span><span class=\"c14 c35 c43\">net<\/span><span class=\"c10 c21 c24\">te<\/span><\/h1>\n<p class=\"c5 c9\">\n<p class=\"c5\"><span class=\"c10 c24 c35 c12\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h2 id=\"h.d72vzz18lnlh\" class=\"c41\"><span class=\"c32 c35 c49\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.zinoproject.com\/blog1\/index.php\/blog23\/&amp;sa=D&amp;ust=1601260444738000&amp;usg=AOvVaw1lur9GfA2dmOKBML7YBOLL\">Social Science War evolution &#8211;&gt;the algebra subset of Biology &#8211;&gt; Blog Wars<\/a><\/span><\/h2>\n<p class=\"c5\"><span class=\"c3\">Science war evolution &#8211;&gt; Neutron Neuroscience wars &#8211;&gt; math integer Internet wars &#8211;&gt; biology Blog wars<\/span><\/p>\n<p class=\"c5 c9\">\n<p class=\"c5\"><span class=\"c12\">Herb Zinser&#8217;s detailed description of the Science wars and now the symbolic brain INTELLECT WARS with Nature&#8217;s atomic English language as a brain DEFENSE military tool.<\/p>\n<p><\/span><span class=\"c32 c14 c35 c49\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/region01.herbzinser13.com\/index.php\/blog41\/&amp;sa=D&amp;ust=1601260444739000&amp;usg=AOvVaw0wNyGRTVM8lciDdZSyiyU4\">Modern BLOG gene wars USING BL = Base Locators and Benjamin Lewin<\/a><\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">BLOG is a 4\/7 algebra subset word of BIOLOGY leaving 3\/7 at 370 degrees Celsius for the system 370 thermodynamics defense bio-computer.<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">RD-blog-1518<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Boy scout Sam Hengel sacrificed his life to help save the world. His obvious SIGNAL is very important &#8230;..and has been deliberately ignored by citizens, governments, and universities.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Even his own group, the BOY SCOUTS of America have betrayed their pledge to the United States of America.<\/p>\n<p><\/span><span class=\"c6 c14\">Sam Hengel and his subliminal mind intercepted various CARL JUNG collective unconsciousness signals and correctly interpreted the signals &#8230;. that there something very wrong<\/span><span class=\"c0\">\u00a0&#8230;&#8230;. that major subconscious wars are going on &#8230;.. the deep down atomic brain &#8230; social psychology SCIENCE WARS.<\/p>\n<p><\/span><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e928b708.jpg\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e930d93e.jpg\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">The brave intellectual spirit of Sam Hengel stepped up and defended Nature and the Central Nervous System 370 abstract brain symbolic computer from attack. His bravery &#8230;..and his tragedy sent an important cryptographic SIGNAL &#8230;&#8230;. that eventually was figured out by a serious thinker. But who else cares? Citizens could care less about anything &#8230;they will not help understand the many facets of the social SCIENCE wars and the neuroscience secret language wars of society.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Sam Hengel, Marinette High School student who held classroom &#8230;Nov 30, 2010 \u2013 Sam Hengel, Marinette High School student who held classroom hostage, &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">A Wisconsin teen<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">who held 23 students\u00a0<\/span><span class=\"c0\">and a teacher hostage at &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e93873bc.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Adult BOY SCOUTS and former Boy Scouts are to intellectually lazy to even try to understand the situation. Instead they diminish<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">the 23 chromosome HERO<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">of the genetic wars &#8211;&gt; Sam Hengel.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9414cce.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c6\">Cryptography<\/span><span class=\"c0\">\u00a0&#8211; Wikipedia, the free encyclopedia<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography &#8211; Dec 16, 2011 \u2013\u00a0<\/span><span class=\"c10 c6\">the study of transforming information in order to make it secure from unintended recipients or use.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">A review of\u00a0<\/span><span class=\"c10 c6 c26\">cryptography protocols, algorithms, and design.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e94f06c5.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography<\/span><span class=\"c15 c12\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601260444748000&amp;usg=AOvVaw1gG3U2cn3iIy5w0BcmNfyh\">\u00a0www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography<\/span><span class=\"c15 c12\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601260444749000&amp;usg=AOvVaw0tDK1SLkdrTaJHfo6pEe5l\">\u00a0www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography<\/span><span class=\"c15 c12\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601260444750000&amp;usg=AOvVaw18pg1HG4sSxg9_0u3Z7Kzq\">\u00a0www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c19 c14\">Cry<\/span><span class=\"c10 c19\">ptography<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601260444750000&amp;usg=AOvVaw18pg1HG4sSxg9_0u3Z7Kzq\">www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">crypto-class.org\/Cached<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">crypto-class.org\/Cached<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">cry + pto + class &#8211;&gt; Cry point circle class<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">cry pto-class &#8211;&gt; point at Steven K. at NIU, Cole Hall<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">cry pto-class &#8211;&gt; point at Mr.CHO, Virginia Tech<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">cry pto-class &#8211;&gt; point at Major NH &#8211; Fort Hood amino acids<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">cry pto-class &#8211;&gt; point at Sam Hengel genetics warrior<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography is an indispensable tool for protecting information in bio-computer chromosome\/ brain systems. This course explains\u00a0<\/span><span class=\"c6\">the inner workings of cryptographic primitives\u00a0<\/span><span class=\"c0\">and<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">23 Chromosomes &#8211;&gt; Base 2 math power 3 = 8 data bits &#8230;.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">secrets of chromosome life ..picture below<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Bio-computer &#8211;&gt;<\/span><span class=\"c10 c6\">cryptography protocols, algorithms, and design.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e959f474.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><span class=\"c12\"><\/p>\n<p><\/span><span class=\"c10 c47 c35\">UPDATE:<br \/>\nLAB Police release new details in disappearance of &#8230;<\/span><\/p>\n<p class=\"c16\"><span class=\"c10 c35 c47\">www.nbc15.com \u203a home \u203a headlines \u203a sheriff-15-year-old-waukesha&#8230;<\/span><\/p>\n<p class=\"c16\"><span class=\"c8\">Nov 14, 2013 &#8211; TOWN OF GENESEE<\/span><span class=\"c20\">\u00a0(WITI) \u2014 The Waukesha County Sheriff&#8217;s &#8230;\u00a0<\/span><span class=\"c8\">Kathryn Stalbaum<\/span><span class=\"c20 c22\">, a freshman at Kettle Moraine High School, was last seen \u2026<\/span><\/p>\n<p class=\"c16 c9\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><span class=\"c14 c12\"><br \/>\n<\/span><\/p>\n<p class=\"c16\"><span class=\"c42 c14 c35\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/www.wisn.com\/article\/15-year-old-girl-missing-from-town-of-genesee\/5908702&amp;sa=D&amp;ust=1601260444755000&amp;usg=AOvVaw2k6T0HqFb_gU-ft_Kal5Cx\">15 Year-old girl missing from<br \/>\nTown of Genesee \u2026 genetics experiment<\/a><\/span><\/p>\n<p class=\"c16\"><span class=\"c22 c35 c42\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/www.wisn.com\/article\/15-year-old-girl-missing-from-town-of-genesee\/5908702&amp;sa=D&amp;ust=1601260444755000&amp;usg=AOvVaw2k6T0HqFb_gU-ft_Kal5Cx\">&#8211; Wisn-Tv<\/a><\/span><\/p>\n<p class=\"c16\"><span class=\"c22 c39 c35\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/www.wisn.com\/article\/15-year-old-girl-missing-from-town-of-genesee\/5908702&amp;sa=D&amp;ust=1601260444756000&amp;usg=AOvVaw3wbe5Kd_AodSu23FSMbprE\">www.wisn.com \u203a article \u203a 15-year-old-girl-missing-from-town-of-gen&#8230;<\/a><\/span><\/p>\n<p class=\"c16\"><span class=\"c8\">Nov 6, 2013 &#8211; Kathryn Stalbaum<\/span><span class=\"c20 c22\">\u00a0disappeared Tuesday morning on her way to school.<\/span><\/p>\n<p class=\"c16 c9\">\n<p class=\"c5 c9\">\n<p class=\"c7\"><span class=\"c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e96e5ff9.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c6\">Cryptography<\/span><span class=\"c0\">\u00a0&#8211; Wikipedia, the free encyclopedia<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Cryptography &#8211; Dec 16, 2011 \u2013\u00a0<\/span><span class=\"c10 c6\">the study of transforming information in order to make it secure from unintended recipients or use.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">A review of\u00a0<\/span><span class=\"c10 c6 c26\">cryptography protocols, algorithms, and design.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e947b35f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus Sam Hengel was protecting his biology system from the Internet BLOG war that is in process. The English language word BIOLOGY describes our mathematical-life &#8230;specifically our high school algebra logarithms &#8230;..the mantissa and characteristic.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">In the modern world, Darwinian evolutions of symbolic life involves our human data processing system. We are symbolic machines. These math components of bio-computer life are very important. The interNET communications systems has many good features and many abused features ..especially the usage of the interNET for excessive nonsense.<br \/>\n<\/span><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e978e379.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c31\">The\u00a0<\/span><span class=\"c31 c40\">copper wire INTERNET systems is an external system<\/span><span class=\"c31\">\u00a0\u2026<br \/>\nand<br \/>\nis a\u00a0<\/span><span class=\"c31 c40\">partial mirror\/ a reflection of our internal bio-computer systems\u00a0<\/span><span class=\"c31\">..<\/span><span class=\"c0\">&#8230;<\/p>\n<p>collective unconsciousness, data stream of consciousness, schools of thought, States of MIND, etc. Dozens of different formats have been described in the last 400 years in literature &#8230;&#8230; and in the last 100 years with social psychology theories and books.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Humans are biological computers&#8230;..have been for thousands of years. Now, we are biological symbolic processors. We receive input data into our eyes and ears &#8230;.. and other sources of data ..touch, smell, etc. The brain computer has to look at this input data &#8230;.. make decisions, etc.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">BIOLOGY &#8211;&gt; Bio + Log y (see math book of life)<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">BIOLOGY algebraic subset letters are<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">B..LOG &#8211;&gt; Base Logarithms &#8230;&#8230;.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus the copper wire\/wireless INTERNET system<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">uses the WEB and BLOG format to allow humans<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">and their subconscious MIND to engage in REAL symbolic battles with other humans and their subconscious MINDS &#8230;&#8230;VIA the system.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Before the Internet, some television talk shows and radio talk shows engaged in Central Nervous System debates at the surface level &#8230;&#8230;. the data received by the listening audience was routed to their subliminal minds &#8230;&#8230; and such a mind could mis-interpret the data.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Today, we have really had a battle of Central Nervous Systems using data streams composed of nouns, verbs, concepts, math equations, some pictures\/graphics, etc. Thus the increase in university and high shootings in the last ten years; because the school systems are on such an ego trip &#8230;they refuse to look at the ERRORS that independent researchers notice.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Northern Illinois University, Virginia Tech, and other universities have reached the epitome of arrogance &#8230;.. ignoring the empirical data of their tragedies. Irresponsible snobs that refuse to communicate properly and in a diplomatic fashion &#8230;. ought not be in charge of knowledge. Those school will not to help understand the deeper CAUSE behind the tragic EFFECT.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Some networks and data signals that exist in the modern world are listed below.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">They are concepts &#8230;..that you have to think about. You have to complete the picture with a more explainable answer. Thus challenged &#8230;.. will you be an intellectual chicken?<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">The situation is more involved, but this is a good starting point.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">All these symbolic components directly or indirectly can be inside the human brain.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">C.P. Snow clearly stated that &#8221; Two Cultures&#8221; existed.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">The book &#8221; Tale of Two Cities&#8221; reflected the same observation.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9856df0.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e98ed7b1.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e997323e.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e99de1f0.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">What are the 23 chromosome&#8230;<\/span><span class=\"c6 c14\">\u00a0biochemistry WAR secrets<\/span><span class=\"c0\">\u00a0of Marinette?<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9abebfa.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">DNA nucleotide ZIP code location\u00a0<\/span><span class=\"c31\">541<\/span><span class=\"c10 c31 c34\">43<\/span><\/p>\n<p class=\"c7\"><span class=\"c31\"><br \/>\n<\/span><span class=\"c6 c34\">zip code with 43\u00a0<\/span><span class=\"c6\">&#8211;&gt; 4 exponent 3 = 64 codons<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9b5f667.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">Nucleic Acids to Amino Acids: DNA Specifies Protein |<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Learn &#8230;www.nature.com\/&#8230;\/<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">by A Smith &#8211; 2008 &#8211; Related articles<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">How can the four bases that make up DNA specify the 20 amino acids that &#8230; It was also known that there are only four nucleotides in mRNA: adenine (A), &#8230; However,<\/span><span class=\"c6\">\u00a0a triplet code produces 64\u00a0<\/span><span class=\"c0\">(43 = 64) possible combinations, or codons. Thus &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">The Information in DNA Determines Cellular Function via<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">The three-letter nature of codons means that the four nucleotides found in mRNA \u2014 A, U, G, and C \u2014 can produce a total of\u00a0<\/span><span class=\"c6\">64 different combinations<\/span><span class=\"c0\">. Of these &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9bcd98d.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9c3d5cc.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9bcd98d.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9cb2f63.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c19\">Piercing the corporate veil Piercing the corporate veil<\/span><\/p>\n<p class=\"c7\"><span class=\"c19 c14\">Piercing\u00a0<\/span><span class=\"c19\">the corporate\u00a0<\/span><span class=\"c19 c26\">NET<\/span><span class=\"c10 c19\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c19\">At<br \/>\n<\/span><span class=\"c19 c14\">Pierce<\/span><span class=\"c19\">\u00a0Avenue in Mari<\/span><span class=\"c19 c26\">net<\/span><span class=\"c19\">te \u00a0<\/span><span class=\"c0\">&#8211; Wikipedia,<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Jump to Criminal law\u00fd: In English criminal law there have been cases in which the courts &#8230; received by a company have been regarded as having been &#8216;obtained&#8217; by &#8230;\u00a0<\/span><span class=\"c6\">A court can\u00a0<\/span><span class=\"c6 c26\">&#8221; pierce&#8221; the carapace<\/span><span class=\"c6 c10\">\u00a0of the corporate entity and look at \u2026<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9dd2f0f.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Basis for limited liability &#8211; Germany &#8211; United Kingdom &#8211; United States<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Piercing the Corporate Veil legal definition of Piercing the Corporate<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">What does Piercing the Corporate Veil mean in law? &#8230; The corporation today remains the most common form of business organization because, theoretically, \u2026<\/span><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9ea5038.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Business Law &#8211; What does it mean to pierce the corporate veil?<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">In doing so, the creditor is asking the court to\u00a0<\/span><span class=\"c6\">pierce the corporate veil\u00a0<\/span><span class=\"c0\">and make the business owners personally liable for the debts, liabilities and obligations of &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Piercing the Corporate Veil<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">QuickMBA \/ Business Law \/ Corporate Veil &#8230; A court may pierce through the veil of liability protection if the corporation does not follow proper corporate &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Piercing the Corporate Veil | Citizen Media Law Project<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Jul 6, 2010 \u2013 Piercing the Corporate Veil. A properly formed and operated corporation or LLC offers its owners limited liability for the debts of the business, &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><span class=\"c10 c19\">Piercing the corporate veil Piercing the corporate veil<\/span><\/p>\n<p class=\"c7\"><span class=\"c19 c14\">Piercing\u00a0<\/span><span class=\"c19\">the corporate\u00a0<\/span><span class=\"c19 c26\">NET<\/span><span class=\"c10 c19\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c19\">At<br \/>\n<\/span><span class=\"c19 c14\">Pierce<\/span><span class=\"c10 c19\">\u00a0Avenue at<br \/>\nColumbine High School<\/span><\/p>\n<p class=\"c7\"><span class=\"c19\">Secret education\u00a0<\/span><span class=\"c10 c19 c26\">NET<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c16\"><span class=\"c42 c22 c35\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Columbine_High_School_massacre&amp;sa=D&amp;ust=1601260444772000&amp;usg=AOvVaw1ALnrojtO6STBxHJ6dgh5l\">Columbine High School piercing \u00a0&#8211; Wikipedia<\/a><\/span><\/p>\n<p class=\"c16\"><span class=\"c22 c35 c39\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Columbine_High_School_massacre&amp;sa=D&amp;ust=1601260444773000&amp;usg=AOvVaw074yk_8T-UZgpuE4YKtfXj\">en.wikipedia.org \u203a wiki \u203a columbine_high_school_massacre<\/a><\/span><\/p>\n<p class=\"c27\"><span class=\"c20\">The\u00a0<\/span><span class=\"c8\">Columbine High School<\/span><span class=\"c20\">\u00a0massacre was a school shooting and attempted bombing that occurred on April 20, 1999, at\u00a0<\/span><span class=\"c8\">Columbine High School<\/span><span class=\"c20 c22\">\u00a0in Columbine, &#8230;<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9fdab48.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Thus we have a biology communications war &#8230;with many facets. It needs to be understood.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Maybe, someday, cities will face REALITY and help understand how EARTH LAB works and affects our daily LIFE or DEATH.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">NATURE decides who will represent the atomic social anthropology component of the Hierarchy Problem of physics. FermiLAB can&#8217;t communicate, University of Chicago and other universities can&#8217;t handle the simple process of communications; thus Darwinian atomic selection will decide whose human brain electron circuits has the electron node &#8230;. capable of working as a communications node.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea09e6a6.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea149937.png\" alt=\"\" \/><\/p>\n<p class=\"c5 c9\">\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea1a9fc7.png\" alt=\"\" \/><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea28cee7.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9cb2f63.png\" alt=\"\" \/><span class=\"c3\"><\/p>\n<p><\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea384495.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea413bd5.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea479e56.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea637634.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">The reader may just glance at the concepts below ..to be aware that they exist.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Please be aware that bio-computer systems have existed&#8230;.. such as the ancient Roman empire &#8230;was really built by bio-computers using the human processor.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Below, we see &#8211;&gt;\u00a0<\/span><span class=\"c10 c6\">keys, one to lock or encrypt the<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus you see that a few events, with incomplete explanation in newspapers.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">&#8211;&gt;<\/span><span class=\"c6\">\u00a0Sam Hengel was involved in bio-computer battle\u00a0<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">&#8211;&gt; The\u00a0<\/span><span class=\"c6\">Penn State<\/span><span class=\"c30\">\u00a0locker room<br \/>\n<\/span><span class=\"c6\">\u00a0<\/span><span class=\"c0\">molestation issue &#8230;.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">is a cover-up by Penn State administration to allow their computer science departments and biology departments to try\u00a0<\/span><span class=\"c6\">to control the human bio-computer system\u00a0<\/span><span class=\"c15 c12\">&#8230;.. a major political power scheme &#8230;.to manipulate the human mind. Thus Penn State uses the decoy strategy of blaming Sandusky &#8230;while the real\u00a0<\/span><span class=\"c6\">lock error issue\u00a0<\/span><span class=\"c0\">is ignored.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><span class=\"c6\">Penn State<\/span><span class=\"c10 c30\">\u00a0locker room<br \/>\n<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><span class=\"c6\">Penn State<\/span><span class=\"c10 c30\">\u00a0locker room<br \/>\n<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><span class=\"c6\">Penn State<\/span><span class=\"c10 c30\">\u00a0lock \u2026..<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7 c28\"><span class=\"c25 c35 c46\">A deadlock is a situation<\/span><span class=\"c25 c35 c12 c51\"><br \/>\n<\/span><span class=\"c25 c35 c44\">\u00a0in which<br \/>\ntwo computer programs \u00a0<\/span><span class=\"c22 c46 c25 c35\">sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. The earliest computer operating systems ran only one program at a time.<\/span><\/p>\n<p class=\"c16 c9\">\n<p class=\"c16\"><span class=\"c42 c35\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/whatis.techtarget.com\/definition\/deadlock&amp;sa=D&amp;ust=1601260444782000&amp;usg=AOvVaw1mhHK8BT6dcaX71How9ryx\">What is deadlock? &#8211; Definition from WhatIs.com<\/a><\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea6eacc0.png\" alt=\"\" \/><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713e9856df0.png\" alt=\"\" \/><\/p>\n<p class=\"c16\"><span class=\"c13 c22 c25\">Introduction of Deadlock<br \/>\nin Operating System &#8211; GeeksforGeeks<\/span><\/p>\n<p class=\"c16\"><span class=\"c13 c22 c25\">www.geeksforgeeks.org \u203a introduction-of-deadlock-in-operating-syst\u2026<\/span><\/p>\n<p class=\"c16 c9\">\n<p class=\"c16\"><span class=\"c13\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/www.geeksforgeeks.org\/introduction-of-deadlock-in-operating-system\/&amp;sa=D&amp;ust=1601260444784000&amp;usg=AOvVaw1nIKIH_kdyCOtBQcQ1WLqK\">Introduction of Deadlock<br \/>\nIntroduction of Deadlock<\/a><\/span><\/p>\n<p class=\"c16\"><span class=\"c13\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=https:\/\/www.geeksforgeeks.org\/introduction-of-deadlock-in-operating-system\/&amp;sa=D&amp;ust=1601260444784000&amp;usg=AOvVaw1nIKIH_kdyCOtBQcQ1WLqK\">Introduction of Dead<\/a><\/span><span class=\"c10 c13\">\u00a0\u2026. Message 2<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c44 c25 c35\">two computer programs<\/span><\/p>\n<p class=\"c16\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea7c775c.png\" alt=\"\" \/><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c2 c28\">\n<p class=\"c2 c28\">\n<p class=\"c7 c28\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea88ed86.png\" alt=\"\" \/><\/p>\n<p class=\"c16 c9\">\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><span class=\"c1\">two computer programs<\/span><\/p>\n<p class=\"c7 c28\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea92a3ae.jpg\" alt=\"\" \/><\/p>\n<p class=\"c16 c9\">\n<p class=\"c16\"><span class=\"c10 c13\">The September 11, 2001 Dialogue on<br \/>\nTWO = 2 = Dos = Double = Dual = two \u00a0<\/span><\/p>\n<p class=\"c16 c9\">\n<p class=\"c16\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ea7c775c.png\" alt=\"\" \/><\/p>\n<p class=\"c16 c9\">\n<p class=\"c16\"><span class=\"c13\">It contains well written, well thought and well explained\u00a0<\/span><span class=\"c13\">computer<\/span><span class=\"c13\">\u00a0science and &#8230;\u00a0<\/span><span class=\"c13\">Deadlock<\/span><span class=\"c10 c13\">\u00a0is a situation where a set of processes are blocked because each &#8230;<\/span><\/p>\n<p class=\"c2 c28\">\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Washington, DC funds this type of project &#8230;on the theory they will end up on top of the society pyramid. Nature has other ideas &#8230;&#8230; and subset humans and their subset institutions are small potatoes compared to Nature&#8217;s vast intellect and social VECTOR forces.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8211;&gt; Virginia TECH secret voodoo tricks failed.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">They tried to attack Nature&#8217;s ENcrypt process &#8230;..hence<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">ENcrypt &#8211;&gt; En + Cry + pt &#8211;&gt;<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">English<\/span><span class=\"c15 c12\">\u00a0shooting +\u00a0<\/span><span class=\"c6\">cry<\/span><span class=\"c15 c12\">\u00a0for dead students +\u00a0<\/span><span class=\"c6\">point\u00a0<\/span><span class=\"c0\">finger at Mr.CHO as solely responsible for the EVENT. The biggest line of BS ever invented in modern society &#8230;.. lies about the deeper CAUSES of the EVENT. Thus the LIES\/schemes of Virginia &#8230;&#8230;. spread to Europe at the BATTLE of LIES at Liege, Belgium.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">.<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eaa424cd.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eaabd2d6.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">.<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eac11b8c.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">From the internet &#8211;&gt;<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Public-key cryptography refers to a cryptographic system requiring two separate keys,\u00a0<\/span><span class=\"c6\">one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext<\/span><span class=\"c15 c12\">. Neither key will do both functions. One of these keys is published or public and the other is kept private.\u00a0<\/span><span class=\"c6\">If the lock\/encryption key\u00a0<\/span><span class=\"c0\">is the one published then the system enables private communication from the public to the unlocking key&#8217;s owner. If the unlock\/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. Although in this latter case, since encrypting the entire message is relatively expensive computationally, in practice just a hash of the message is encrypted for signature verification purposes.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eacbc5f4.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713ead55de3.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eade878a.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">This cryptographic approach uses asymmetric key algorithms such as RSA, hence the more general name of &#8220;asymmetric key cryptography&#8221;. Some of these algorithms have the public key\/private key property; that is, neither key is derivable from knowledge of the other; not all asymmetric key algorithms do. Those with this property are particularly useful and have been widely deployed, and are the source of the commonly used name. The public key is used to transform a message into an unreadable form, decryptable only by using the (different but matching) private key. Participants in such a system must create a mathematically linked key pair (i.e., a public and a private key). By publishing the public key, the key producer empowers anyone who gets a copy of the public key to produce messages only s\/he can read &#8212; because only the key producer has a copy of the private key (required for decryption). When someone wants to send a secure message to the creator of those keys, the sender encrypts it (i.e., transforms it into an unreadable form) using the intended recipient&#8217;s public key; to decrypt the message, the recipient uses the private key. No one else, including the sender, can do so.<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">How it works<\/span><span class=\"c0\">The distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys \u2014 a public encryption key and a private decryption key. The publicly available encrypting-key is widely distributed, while the private decrypting-key is known only to the recipient. Messages are encrypted with the recipient&#8217;s public key and can be decrypted only with the corresponding private key. The keys are related mathematically, but parameters are chosen so that determining the private key from the public key is prohibitively expensive. The discovery of algorithms that could produce public\/private key pairs revolutionized the practice of cryptography beginning in the mid-1970s.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">In contrast, symmetric-key algorithms, variations of which having been used for thousands of years, use a single secret key \u2014 which must be shared and kept private by both sender and receiver \u2014 for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eaf0cea1.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eaf87c27.png\" alt=\"\" \/><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb00ca2f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP and the SSL\/TLS family of schemes do this, for instance, and are thus called hybrid cryptosystems.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Thus we see CLUES to a puzzle regarding the BOY SCOUTS, FFA (Matt Anderson), 4-H Club and many other organizations in the United States AND their failure to understand simple concepts &#8230;regarding Margaret Mead atomic nuclear family laws &#8230;.that is atomic social anthropology and atomic social philosophy. While these organizations are very good ..for the most part; they assume that they are superior to the laws of Nature and the 23 chromosome laws of Nature.<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">Thus we Nature&#8217;s Darwinian selection of special agent Sam Hengel&#8230;.<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">address 2139 Pierce Avenue&#8230;&#8230;.MISSION<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">penetrate&#8211;&gt; Pierce the Corporate Veil &#8230;message<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c14\">for agent&#8211;&gt; Pier director of FermiLAB physics<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">and<\/span><\/p>\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb0ba04b.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">the IRON CURTAIN problem of the<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Fe = Ferrous Oxide atom and iron Hemoglobin protein thought ERRORS<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">at the Department of Energy and<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">the Fe = Federal government intellectual violations of Fe = 26 protons of Ferrous oxide atomic rules for human li.FE &#8211;&gt; Margaret Mead atomic nuclear family LIFE VIA the periodic atomic table elements and their extension to humanoid expression FORMAT.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Sam Hengel, Marinette High School student who held classroom &#8230;Nov 30, 2010 \u2013 Sam Hengel, Marinette High School student who held classroom hostage, &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">A Wisconsin teen<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">who held 23 students\u00a0<\/span><span class=\"c0\">and a teacher hostage at &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6\">who held 23 students<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">who held 23 students\u00a0<\/span><span class=\"c0\">FermilAB physics science Wars<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb1a46a8.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Brain Science WAR signal Na &#8211;&gt; North america &#8211;&gt;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">phonetics SOUND equivalent ( Sodium &#8211;&gt; So dumb )<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus Nature send subset humans a SRP signal &#8230;..for the<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">molecular cell biology SRP = Signal Recognition Particle.<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb28d974.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">molecular cell biology SRP<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">molecular cell biology SRP<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">molecular cell biology SRP \u00a0code<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">molecular cell biology SRP<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">molecular cell biology SRP\u00a0<\/span><span class=\"c6\">\u2026.. Bush\u00a0<\/span><span class=\"c6 c34\">SR, P<\/span><span class=\"c10 c6\">resident<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb364006.png\" alt=\"\" \/><\/p>\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Apparently this brain particle is missing in hundreds of millions of students and parents.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">As Nature says &#8216;If you don&#8217;t use it &#8230;you lose it&#8221; &#8230;.symbolic knowledge is modern food for thought. That is serious knowledge.. basic algebra, genetics, basic biochemsitry, etc.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">We not talking rocket science &#8230;..we are talking some simple concepts ..like number 23 &#8230;..sends a message about the Margaret Mead atomic social science war with the Office of Science and DARPA and<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">the secret\u00a0<\/span><span class=\"c26 c31\">BRAVE NEW WORLD\u00a0<\/span><span class=\"c10 c6\">projects.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb41707f.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c4\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb4b225f.png\" alt=\"\" \/><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus we see the Margaret Mead atomic nuclear family signal &#8230;..<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8230;&#8230;.23 students held hostage &#8211;&gt; 238 decay of human atomic brain.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Special BOY SCOUT undercover agent Sam Hengel &#8230;.<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c26\">grammar emmitter messages of the event &#8230;. agent for<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c26\">gamma information emmitters (Project atomic navigation )<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">SAM Hengel &#8230;age 15 ..\u00a0<\/span><span class=\"c6\">Gama\u00a0<\/span><span class=\"c15 c12\">&#8230;.map of\u00a0<\/span><span class=\"c6 c14\">the elements of atomic society life<\/span><span class=\"c0 c14\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Vasco da Gama &#8211; The<\/span><span class=\"c6\">\u00a0<\/span><span class=\"c6 c14\">Port<\/span><span class=\"c6\">uguese<\/span><span class=\"c15 c12\">\u00a0navigator Vasco da Gama led an expedition at\u00a0<\/span><span class=\"c6 c14\">the end of the 15th<\/span><span class=\"c6\">\u00a0<\/span><span class=\"c15 c12\">century that opened the sea route to India\u00a0<\/span><span class=\"c6\">by way of the Cape of Good Hope\u00a0<\/span><span class=\"c0\">&#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">&#8212;\u00a0<\/span><span class=\"c6 c14\">the \u00a0 \u00a0<\/span><span class=\"c31 c14\">Port<\/span><span class=\"c6 c14\">uguese \u00a0BOY Scout navigator\u00a0<\/span><span class=\"c0\">&#8230;.. \u00a0from &#8230;&#8230;.<\/span><\/p>\n<h3 id=\"h.7ttlxgb7b9bk\" class=\"c36\"><span class=\"c29 c18\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.ehextra.com\/main.asp?SectionID%3D16%26SubSectionID%3D63%26ArticleID%3D9067&amp;sa=D&amp;ust=1601260444808000&amp;usg=AOvVaw0zSCyxGIeeLBcS-toM4cYM\">Sam<\/a><\/span><span class=\"c29\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.ehextra.com\/main.asp?SectionID%3D16%26SubSectionID%3D63%26ArticleID%3D9067&amp;sa=D&amp;ust=1601260444808000&amp;usg=AOvVaw0zSCyxGIeeLBcS-toM4cYM\">\u00a0<\/a><\/span><span class=\"c29 c18\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.ehextra.com\/main.asp?SectionID%3D16%26SubSectionID%3D63%26ArticleID%3D9067&amp;sa=D&amp;ust=1601260444809000&amp;usg=AOvVaw2uyf7IED8PX0KQKU_1RSxW\">Hengel<\/a><\/span><span class=\"c29\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.ehextra.com\/main.asp?SectionID%3D16%26SubSectionID%3D63%26ArticleID%3D9067&amp;sa=D&amp;ust=1601260444809000&amp;usg=AOvVaw2uyf7IED8PX0KQKU_1RSxW\">\u00a0&#8211; EagleHerald Marinette &amp; Menominee online &#8230;<\/a><\/span><\/h3>\n<p class=\"c5\"><span class=\"c12 c32\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.ehextra.com\/main.asp?SectionID%3D16%26SubSectionID%3D63&amp;sa=D&amp;ust=1601260444810000&amp;usg=AOvVaw107OiFsW-AVF-ENO0NpjfT\">www.ehextra.com\/main.asp?SectionID=16&amp;SubSectionID=63<\/a><\/span><span class=\"c3\">&#8230;\u200e<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Dec 3, 2010 &#8211;\u00a0<\/span><span class=\"c6\">He has been raised in\u00a0<\/span><span class=\"c31 c26 c18\">Port<\/span><span class=\"c15 c18 c12\">erfield<\/span><span class=\"c15 c12\">, Wis. and attended Marinette High School as a Sophomore.\u00a0<\/span><span class=\"c15 c18 c12\">Sam<\/span><span class=\"c15 c12\">\u00a0was a proud member of the\u00a0<\/span><span class=\"c15 c12 c18\">Boy Scouts<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c12 c15\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy Scouts<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy Scouts<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy Scouts<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c6 c34\">the\u00a0<\/span><span class=\"c6 c34 c18\">Boy Scouts<\/span><span class=\"c10 c6 c34\">\u00a0(BS) interceptors \u2026<\/p>\n<p><\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy Scouts<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy Sc outs<\/span><span class=\"c15 c12\">\u00a0of\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">the\u00a0<\/span><span class=\"c15 c18 c12\">Boy School BS teacher output data stream\u00a0<\/span><span class=\"c15 c12\">\u00a0<\/span><span class=\"c6\">&#8230;<\/span><span class=\"c0\">.<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb557f2e.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">&#8212;\u00a0<\/span><span class=\"c6\">the end of the 15th\u00a0<\/span><span class=\"c0\">&#8211;&gt; end of life age 15<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8212; that opened the sea route &#8211;&gt; open the see route<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8212; to India &#8211;&gt; to find intellectual america<\/span><\/p>\n<p class=\"c7\"><span class=\"c6\">by way of the Cape of Good Hope\u00a0<\/span><span class=\"c0\">&#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8212; the Maragret Mead atomic nuclear family hostage code 238 \u00a0 VIA \u00a0code 23 HOSTAGES in Marinette<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c5\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f713eb63dfbb.png\" alt=\"\" \/><\/p>\n<p class=\"c7\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c4\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Thus SAM Hengel &#8211;&gt; Message to Uncle SAM &#8230;.. from SAMPLE space &#8230;that is the<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">mathematical-physics dimensions of the United States.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Introduction to M-theory &#8211; Wikipedia, the free<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">In non-technical terms, M-theory presents an idea about the basic substance of &#8230; This was later increased to 11 dimensions based on various interpretations of &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Background &#8211; Status &#8211; See also &#8211; References<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">M-theory &#8211; Wikipedia,<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">In theoretical physics, M-theory is an extension of string theory in which 11 dimensions are identified. Because the dimensionality exceeds that of superstring &#8230;<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">M-theory applications and 11 dimensions<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8211; Marinette theory of SKU 11. Thus a typical city that doen&#8217;t pay attention to knowledge except pizza and sports. Do chromosomes exist? Is a football field part of Einstein&#8217;s data field theory?<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c26\">Why is the English class sentence &#8211;&gt;<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c26\">Twenty &#8211; four hours = 24 hours a day &#8230;..<\/span><\/p>\n<p class=\"c7\"><span class=\"c10 c6 c26\">math says 20 &#8211; 4 hours = 16 hours per day<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">M-theory physics war report ignored by newspapers<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">&#8211; Manhattan theory and 11-dimensions battle of Sept 11, 2001<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">Maybe some people will like to help think about these puzzles.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">Some CLUES are mentioned above&#8230; provide a partial outline.<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c7\"><span class=\"c0\">\u00a0<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">CONTACT: Principle science researcher HERB ZINSER<\/span><\/p>\n<p class=\"c2\">\n<p class=\"c7\"><span class=\"c0\">E-Mail: Herb@Zinoproject.com<\/span><\/p>\n<p class=\"c7\"><span class=\"c15 c12\">Website:\u00a0<\/span><span class=\"c15 c12\"><a class=\"c11\" href=\"https:\/\/www.google.com\/url?q=http:\/\/region01.herbzinser13.com\/&amp;sa=D&amp;ust=1601260444820000&amp;usg=AOvVaw1MPbTu-NEVJDZAkyBE4X6-\">www.zinoproject.com<\/a><\/span><\/p>\n<p class=\"c5 c9\">\n<p class=\"c5 c9\">\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n<p class=\"c5\"><span class=\"c3\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rd-blog-1518 by Herb Zinser The bio-computer interNET\u00a0 . . . .the North Pole magNETic field &#8230;. Benjamin\u00a0NETanyahu &#8211; &#8211; &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1869","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/1869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/comments?post=1869"}],"version-history":[{"count":1,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/1869\/revisions"}],"predecessor-version":[{"id":1920,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/1869\/revisions\/1920"}],"wp:attachment":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/media?parent=1869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/categories?post=1869"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/tags?post=1869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}