Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items tagged electronics

Rss Feed Group items tagged

ajinkyak

Printed Electronics Market - 0 views

  •  
    The global printed electronics market is primarily driven by the demand for printed electronics in from the industry for various electronic products like mobile phones, LED's among others. The need for energy efficient products with high performance and price effective manufacturing is fostering the expansion for global printed electronics market.
hootoo2011

How to Find a Good Electronic Website? - 0 views

  •  
    There are multiple gadget websites and electronic forums talking about this topic, how to find a reliable electronic websites from umnipresent scammers, or should i say "Bag Companies". Though smalll status they are, some of them are armed with complete facilities like webshops, office and even registered company. However, with the facilitation of registering company (only cost 1,000 USD or less) and renting some rooms (even one single room to place one table for working) and operating a website (which can transfer some many blog websites like weblog.com ). Therefore, it's more important and harder for us to find a reliable and good webshop via virtual internet. There are at least four tips concluded by my daily working for your referrence.
hootoo2011

Buy Electronic Cigarettes From Hootoo.com,Say Goodbye to Lung Cancer - 0 views

  •  
    This article provides you the best reason why so many customers to choose electronic cigarettes from hootoo.com to quit smoking.
gadgeon

Home Automation in cochin | Kerala | automation companines | Lighting - 0 views

  •  
    Gadgeon Lifestyle a 100% subsidiary of Gadgeon Systems , are specialists in the custom design, supply and installation of audio visual, home automation and integrated electronic systems for the home. Home Automation services provides you access to control electronic devices in your home or office or any other buildings from a mobile or any internet accessible device from anywhere in the world.
Florence Dujardin

The (im)possibility of ethics in the information age - 0 views

  •  
    This paper is concerned with the possibility that the ethical claim of the other, that sense of being bound to the other, may becoming more and more difficult to experience as information technology increasingly mediates our social being. The paper will support the supposition of Don Caputo that obligation does not emanate from codes, imperatives or moral arguments. Rather it will argue that obligation takes hold of us from within disaster. Obligation, our being bound-to, finds us when we come face to a face in disaster. The paper will argue that electronic mediation is inducing a sense of hyperreality into our world (Baudrillard). It will argue that this hyperreality is making our ethical sensibility nebulous to the point that we are not coming face to face with our obligations. An analysis of the Baring bank disaster will be used to demonstrate the point. The paper will show that Nick Leeson was in a hyperreal world in which he was not able to come face to face with the victims of the disaster. The electronic hyperreal world of financial markets, where traders deal in abstract numbers, movements on the screen, made it possible for him to look over and past the faces and proper names of the victims; their claim became diffused in the numbers on the screen, not real cash only numbers, not real people with faces and proper names, just numbers. If this supposition seems tenable what are we to do? The paper argues that we do not need more codes, imperatives or moral arguments, as such. Rather we need to keep our lives at the resolution, of faces and proper names-if obligation happens this is where it is likely to be.
Mike Wesch

Anshe Chung - Wikipedia, the free encyclopedia - 0 views

  • In December 2006, while conducting an interview for CNET with Daniel Terdiman on her economic assets, the virtual studio in which the interview took place was bombarded by flying animated penises and copies of a photo of Graef modified to show her holding a giant penis in her arms. The griefers managed to disrupt the interview sufficiently that Chung was forced to move to another location and ultimately crashed the simulator entirely.[18] Video and images of the incident were posted to the "Second Life Safari" section of Something Awful, and the incident received international notice via blogs including Boing Boing and the online edition of the Sydney Morning Herald. Two weeks later, Anshe's husband, Guntram Graef, issued takedown notices under the DMCA, demanding that newspapers and websites remove photos and videos of the incident and claiming that they violated Graef's copyright in her avatar and other virtual creations. YouTube pulled the videos of the incident as a DMCA violation and banned the account of Second Life Safari, bringing objections from legal experts who considered the work "fair use".[19] A Linden Labs spokesperson suggested that the taking of videos and photos in Second Life should be governed by the same rules as in real life,[20] and an attorney for the Electronic Frontier Foundation compared it "to Armani attempting to restrict news photos of a car crash where one of the drivers was wearing an Armani suit."[21]
  • After news of these events and the legal objections spread across a number of sites including Slashdot, YouTube changed its rationale for removing copies of the video to terms of use violation, and in an interview Guntram Graef said that issuing the takedown notices had been a mistake. He referred to the images as 'pornographic material' and said The video and pictures are clearly defaming and constitute a sexual assault. He stated that he had originally tried to have the videos removed as a personal attack and infringement on rights, but later changed to a copyright claim when that didn't produce a response. When he realized the issues of censorship, he dropped the copyright claim.[19] In 2008 Russian opposition leader Gary Kasparov was attacked at a real public event with a flying penis helicopter and what appeared as a real life adaption of the flying penis attack on Anshe Chung. The Kasparov attack was ended within seconds by a guard who destroyed the flying penis aparatus. In contrast CNet and the company Millions of Us who were responsible for securing the event in Second Life had failed to remove the virtual objects for an extended period of time
  •  
    In December 2006, while conducting an interview for CNET with Daniel Terdiman on her economic assets, the virtual studio in which the interview took place was bombarded by flying animated penises and copies of a photo of Graef modified to show her holding a giant penis in her arms. The griefers managed to disrupt the interview sufficiently that Chung was forced to move to another location and ultimately crashed the simulator entirely.[18] Video and images of the incident were posted to the "Second Life Safari" section of Something Awful, and the incident received international notice via blogs including Boing Boing and the online edition of the Sydney Morning Herald. Two weeks later, Anshe's husband, Guntram Graef, issued takedown notices under the DMCA, demanding that newspapers and websites remove photos and videos of the incident and claiming that they violated Graef's copyright in her avatar and other virtual creations. YouTube pulled the videos of the incident as a DMCA violation and banned the account of Second Life Safari, bringing objections from legal experts who considered the work "fair use".[19] A Linden Labs spokesperson suggested that the taking of videos and photos in Second Life should be governed by the same rules as in real life,[20] and an attorney for the Electronic Frontier Foundation compared it "to Armani attempting to restrict news photos of a car crash where one of the drivers was wearing an Armani suit."[21] After news of these events and the legal objections spread across a number of sites including Slashdot, YouTube changed its rationale for removing copies of the video to terms of use violation, and in an interview Guntram Graef said that issuing the takedown notices had been a mistake. He referred to the images as 'pornographic material' and said The video and pictures are clearly defaming and constitute a sexual assault. He stated that he had originally tried to have the videos removed as a personal attack and infringement on rights,
Trapper Callender

Man-Computer Symbiosis - 2 views

  • In short, it seems worthwhile to avoid argument with (other) enthusiasts for artificial intelligence by conceding dominance in the distant future of cerebration to machines alone.
  • There will nevertheless be a fairly long interim during which the main intellectual advances will be made by men and computers working together in intimate association. A multidisciplinary study group, examining future research and development problems of the Air Force, estimated that it would be 1980 before developments in artificial intelligence make it possible for machines alone to do much thinking or problem solving of military significance. That would leave, say, five years to develop man-computer symbiosis and 15 years to use it. The 15 may be 10 or 500, but those years should be intellectually the most creative and exciting in the history of mankind.
  • It is often said that programming for a computing machine forces one to think clearly, that it disciplines the thought process. If the user can think his problem through in advance, symbiotic association with a computing machine is not necessary.
  • ...25 more annotations...
  • They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution.
  • Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems.
  • It is to bring computing machines effectively into processes of thinking that must go on in "real time," time that moves too fast to permit using computers in conventional ways.
  • To think in interaction with a computer in the same way that you think with a colleague whose competence supplements your own will require much tighter coupling between man and machine than is suggested by the example and than is possible today.
  • Throughout the period I examined, in short, my "thinking" time was devoted mainly to activities that were essentially clerical or mechanical: searching, calculating, plotting, transforming, determining the logical or dynamic consequences of a set of assumptions or hypotheses, preparing the way for a decision or an insight. Moreover, my choices of what to attempt and what not to attempt were determined to an embarrassingly great extent by considerations of clerical feasibility, not intellectual capability.
  • the operations that fill most of the time allegedly devoted to technical thinking are operations that can be performed more effectively by machines than by men.
  • If those problems can be solved in such a way as to create a symbiotic relation between a man and a fast information-retrieval and data-processing machine, however, it seems evident that the cooperative interaction would greatly improve the thinking process.
  • Computing machines can do readily, well, and rapidly many things that are difficult or impossible for man, and men can do readily and well, though not rapidly, many things that are difficult or impossible for computers. That suggests that a symbiotic cooperation, if successful in integrating the positive characteristics of men and computers, would be of great value. The differences in speed and in language, of course, pose difficulties that must be overcome.
  • Men will fill in the gaps, either in the problem solution or in the computer program, when the computer has no mode or routine that is applicable in a particular circumstance.
  • Clearly, for the sake of efficiency and economy, the computer must divide its time among many users. Timesharing systems are currently under active development. There are even arrangements to keep users from "clobbering" anything but their own personal programs.
  • It seems reasonable to envision, for a time 10 or 15 years hence, a "thinking center" that will incorporate the functions of present-day libraries together with anticipated advances in information storage and retrieval and the symbiotic functions suggested earlier in this paper. The picture readily enlarges itself into a network of such centers, connected to one another by wide-band communication lines and to individual users by leased-wire services. In such a system, the speed of the computers would be balanced, and the cost of the gigantic memories and the sophisticated programs would be divided by the number of users.
  • The first thing to face is that we shall not store all the technical and scientific papers in computer memory. We may store the parts that can be summarized most succinctly-the quantitative parts and the reference citations-but not the whole. Books are among the most beautifully engineered, and human-engineered, components in existence, and they will continue to be functionally important within the context of man-computer symbiosis. (Hopefully, the computer will expedite the finding, delivering, and returning of books.)
  • The second point is that a very important section of memory will be permanent: part indelible memory and part published memory. The computer will be able to write once into indelible memory, and then read back indefinitely, but the computer will not be able to erase indelible memory. (It may also over-write, turning all the 0's into l's, as though marking over what was written earlier.) Published memory will be "read-only" memory. It will be introduced into the computer already structured. The computer will be able to refer to it repeatedly, but not to change it.
  • The basic dissimilarity between human languages and computer languages may be the most serious obstacle to true symbiosis.
  • In short: instructions directed to computers specify courses; instructions-directed to human beings specify goals.
  • We may in due course see a serious effort to develop computer programs that can be connected together like the words and phrases of speech to do whatever computation or control is required at the moment. The consideration that holds back such an effort, apparently, is that the effort would produce nothing that would be of great value in the context of existing computers. It would be unrewarding to develop the language before there are any computing machines capable of responding meaningfully to it.
  • By and large, in generally available computers, however, there is almost no provision for any more effective, immediate man-machine communication than can be achieved with an electric typewriter.
  • Displays seem to be in a somewhat better state than controls. Many computers plot graphs on oscilloscope screens, and a few take advantage of the remarkable capabilities, graphical and symbolic, of the charactron display tube. Nowhere, to my knowledge, however, is there anything approaching the flexibility and convenience of the pencil and doodle pad or the chalk and blackboard used by men in technical discussion.
  • 2) Computer-Posted Wall Display: In some technological systems, several men share responsibility for controlling vehicles whose behaviors interact. Some information must be presented simultaneously to all the men, preferably on a common grid, to coordinate their actions. Other information is of relevance only to one or two operators. There would be only a confusion of uninterpretable clutter if all the information were presented on one display to all of them. The information must be posted by a computer, since manual plotting is too slow to keep it up to date.
  • Laboratory experiments have indicated repeatedly that informal, parallel arrangements of operators, coordinating their activities through reference to a large situation display, have important advantages over the arrangement, more widely used, that locates the operators at individual consoles and attempts to correlate their actions through the agency of a computer. This is one of several operator-team problems in need of careful study.
  • 3) Automatic Speech Production and Recognition: How desirable and how feasible is speech communication between human operators and computing machines?
  • Yet there is continuing interest in the idea of talking with computing machines.
  • In large part, the interest stems from realization that one can hardly take a military commander or a corporation president away from his work to teach him to type. If computing machines are ever to be used directly by top-level decision makers, it may be worthwhile to provide communication via the most natural means, even at considerable cost.
  • It seems reasonable, therefore, for computer specialists to be the ones who interact directly with computers in business offices.
  • Certainly, if the equipment were already developed, reliable, and available, it would be used.
  •  
    Man-computer symbiosis is an expected development in cooperative interaction between men and electronic computers. It will involve very close coupling between the human and the electronic members of the partnership. The main aims are 1) to let computers facilitate formulative thinking as they now facilitate the solution of formulated problems, and 2) to enable men and computers to cooperate in making decisions and controlling complex situations without inflexible dependence on predetermined programs. In the anticipated symbiotic partnership, men will set the goals, formulate the hypotheses, determine the criteria, and perform the evaluations. Computing machines will do the routinizable work that must be done to prepare the way for insights and decisions in technical and scientific thinking. Preliminary analyses indicate that the symbiotic partnership will perform intellectual operations much more effectively than man alone can perform them. Prerequisites for the achievement of the effective, cooperative association include developments in computer time sharing, in memory components, in memory organization, in programming languages, and in input and output equipment.
hootoo2011

Questions Answered in Hootoo.com After Steve Jobs Left Apple - 0 views

  •  
    This article provides 5 possible consequances after Jobs left Apple which were answered by Hootoo.com who is one of the professional supplier of electronics and gadgets.
arunaraayala

Samsung Heir Quizzed As Suspect In Park Geun-Hye Scandal | Locality News - 0 views

  •  
    president of Samsung Electronics and son of Samsung group president Lee Kun-Hee, was due to be questioned on allegations of corruption, prosecutors said on Wednesday.
Strange Fruit

"Ibiza Live Radio" Exclusive Mix by Strange Fruit - 0 views

  •  
    Strange Fruit to create an exclusive mix for Ibiza Live Radio, which is an online radio physically located in Ibiza, Spain, and plays high quality electronic music 24/7.
  •  
    Strange Fruit to create an exclusive mix for Ibiza Live Radio, which is an online radio physically located in Ibiza, Spain, and plays high quality electronic music 24/7.
hootoo2011

Chinese Twitter Gears in on September 15, Focus On Hootoo Electronic | Hootoo Blog - 0 views

  •  
    This article sets the Chinese Twitter as background to make a clear statement for the function of Hootoo US Csr Account in Twitter.com.
mehedi456

Cheap and best TV - 0 views

  •  
    Walton Electronics has brought you a modern model smart TV. These Smart TV enhancements provide consumers with easy access to all their favorite content, all in one place and with a single remote control. The Walton Smart Control remote serves as a single control unit for nearly all devices connected to a Walton Smart TV, eliminating the need for multiple remote controls. For a TV with more than three external devices connected, on average, the Smart Control remote will consolidate multiple remote controls into one, seamless device.
arunaraayala

Google product killed in 2016: Google's graveyard - Locality News - 0 views

  •  
    Google New Nexus Phone could be a line of shopper electronic devices that run the android OS. Google manages the new nexus phone style, development, marketing, and support of those devices
Simon Rodriquez

The Apple TV - the Good and the Bad - 3 views

When buying electronic products, it's best to read reviews first. Reviews help us to evaluate the effectiveness, safety, and price of an electronic device. Today, we'll be looking at apple TV revie...

started by Simon Rodriquez on 01 Aug 12 no follow-up yet
anne brown

optical fiber - 0 views

  •  
    OFweek is a B2B trade marketplace for global importers and exporters, providing products information and business opportunities for global buyers and suppliers who focus their businesses on industrial fields such as LED, Solar, Automation, Communication, Laser, Instrument, Optoelectronics, Machinery, Consumer Electronics, Electrical Equipment, Computer, Security Products, etc.
ankityng

Off Grid Flashlight - 0 views

  •  
    LED's(Light Emitting Diode's) are special diodes that emit light when connected in a circuit. They are frequently used as "pilot" lights in electronic appliances to indicate whether the circuit is closed or not.
michol lasti

VirtualBox 5.0.2.102096 Free Download | librosdigitalescs software - 0 views

  •  
    VirtualBox 5.0.2.102096 Free Download - VirtualBox 5.0.2.102096 is a general-purpose full virtualizer for x86 electronics. Targeted at server, computer's desktop and embedded use, it truly is now the only professional-quality virtualization solution that's also Open Source Software program
Mike Wesch

News 14 | 24 Hour Local News | HEADLINES | Road work sign warns about dinosaur danger - 0 views

  •  
    An electronic traffic sign on the corner of Independence and Randall parkway displayed "Caution: Raptors Ahead" instead of "Road Work Ahead." Mainland Construction workers said someone hacked into the computer and changed the sign.
Jessica Ice

HELEN NISSENBAUM The Meaning of Anonymity in an Information Age - 0 views

  •  
    Should anonymity be protected in electronic interactions and communications? Would this be a good thing for community, responsibility, free expression, political participation, and personal fulfillment? If so, when and why? These key normative questions probe the value of anonymity in our computerized society and political order. In this brief discussion, I will not directly address these important questions but will address questions that undergird them about the meaning of anonymity in a contemporary, computerized society, including: What is anonymity? And, what are we seeking to protect when we propose to protect it? Although answers to these foundational questions will not immediately yield answers to the key normative questions mentioned above, they are essential to understanding what is at stake in the answers to these questions. For, after all is said and done, we would not want to discover that the thing we have fought so hard to protect was not worth protecting after all.
Theron DesRosier

Center for Teaching, Learning, & Technology: Case Studies of Electronic Portfolios for ... - 0 views

  • this Microsoft white paper for EDUCAUSE 2007,
  •  
    This blog documents the day to day investigations of ePortfolios, assessment, and innovation in learning environments by Washington State University's Center for Teaching, Learning, and Technology.
1 - 20 of 41 Next › Last »
Showing 20 items per page