New Directplug Dvi D Digital Video Cat5e Extender Self Powered Source Dvi Port Practical Durable

New Directplug Dvi D Digital Video Cat5e Extender Self Powered Source Dvi Port Practical Durable

  • Manufactured to the Highest Quality Available.
  • Extends video signal up to 130″ using CAT5e cable.
  • The design of this product is very exquisite and beautiful.
  • This item has high quality with reasonable price.
  • 100% safe & secure shopping; Superior customer service.

Our most popular model. 100% genuine brand names.

List Price: $ 96.56

Price: {price-updating}

KATV Channel 7 – The Spirit of Arkansas: From Digital Trends

KATV Channel 7 – The Spirit of Arkansas: From Digital Trends
Customer names and email address from some of America’s largest companies, like JPMorgan Chase and Kroger, have been compromised by a data security breach at email marketing vendor Epsilon.
Read more on KATV Little Rock

BilltoMobile(TM) Deployed With Multiple New Merchants
SAN JOSE, CA–(Marketwire – 04/05/11) – BilltoMobile, the leading provider of mobile payments completed directly to the carrier’s bill, today announced several new agreements with an array of new merchants involved in a broad spectrum of the online digital goods and services market. The newly announced partnerships include Aeria Games, one of the fastest growing publishers of free-to-play online …
Read more on Marketwire via Yahoo! Finance

Web hosts play April Fools’ Day pranks
The online world got an April Fools’ Day makeover as YouTube rolled out 1911-era viral videos and the Huffington Post put up a mock pay wall.
Read more on Pioneer Press

Timex Men’s T44642 Metal Analog and Digital Combo Watch

Timex Men’s T44642 Metal Analog and Digital Combo Watch

  • Quartz movement
  • Timer; 3 time zones
  • Indiglo night-light; brushed case
  • Luminescent hands
  • Water-resistant to 165 feet (50 M)

This Timex Watch (but not any battery, crystal, band, or strap) is warranted to the owner for a period of ONE YEAR from the date of purchase against defects in manufacture by Timex Corporation. Timex will not repair defects relating to servicing not performed by Timex Corporation. This limited warranty applies to US Customers.Designed for active, outdoor lifestyles–as well as the rigors of harsh urban landscapes–the full-sized Timex T44642 Expedition analog/digital watch adds a stylish yet rugged complement to your everyday wear. It features a 24-hour chronograph with lap and split timing options, 24-hour countdown timer, alarm, and three time zones. The silver stainless steel case is toped with a silver bezel with black engraved accents that frames a white dial background with silver Arabic numerals and large luminous hands (with seconds hand). It also offers water resistance to 50 meters (165 feet) and a genuine leather strap in brown.

The Indiglo night-light uniformly lights the surface of the watch dial using patented blue electroluminescent lighting technology. It uses less battery power than most other watch illumination systems, enabling your watch battery to last longer. The Night Mode feature allows you to illuminate the Indiglo night-light for 3 seconds with any button press, regardless of the mode or function.

List Price: $ 59.95

Price: {price-updating}

Membership Site Development – Digital Markteing

Membership Site Development – Digital Markteing
marriage counseling
Image by Maria Reyes-McDavis
Our team is working in the trenches for marriage counseling duo, Jesse and Melva Johnson to bring their vision of a digital resource for couples, churches, and counselors. Website development includes membership, community, and social integration development including social media strategy, blogging, and SEO.

Business cards thrive in a digital age

Business cards thrive in a digital age
Paper is in peril. Hardcover book sales, down; e-book sales, soaring. Magazine and newspaper circulation are in decline. When was the last time you let your fingers do the walking in the Yellow Pages?
Read more on Washington Post

10 things men should never ask women
An author has come up with a list of 10 top dating tips to guide men on what they should never say to women.

The young and the breastless
Erika Wheeler grimaces a little when she shakes hands. The one she offers is mummy-wrapped in Ace bandages and gauze. Later, she’ll describe her lymphedema, swelling that pushes down on her nerves and causes a radiating pain similar to hitting the funny bone.
Read more on Las Vegas CityLife

Digital doppelgangers

Digital doppelgangers
double your dating book
Image by bootload
Black Saturday +day193

Digital doppelgängers

I wrote this up last night as a reply to an article on digital identity: "Truth or dare or warts or spin". [-1] This morning I read "Why" has pulled the plug on his digital self. For Why.

I’m an analogue person who lives on the Internet. [0] Online you see a copy of my analogue self, a "digital Doppelgänger" [1] if you like. It’s a data shadow cast by myself. Similar, but not quite the same and at a much lower resolution. My double is a subset of my analogue self, devoid of many of the subtle cues of a person. So what happens when you view a double online? To give you an idea, choose a sunny afternoon and go outside. Then look to see how the sun casts a shadow of yourself. See how your shadow is distorted? You get taller and you can only see your outline. The hairstyle is gone. Nobody can see the crumpled shirt and daggy runners you happen to be wearing. Your shadow gives only a hint of the real you.

Your digital double is a bit like that distorted shadow you cast on sunny days. Viewed online the information available means you have to squint your eyes to see the person leaving your mind to fill in the gaps. Of course you can enhance the resolution of your double with photographs, video and audio but you are only replacing the shadow with something akin to a two dimensional cut-out. [2] A bit more realistic, but not that convincing that a two year old couldn’t tell the difference. One place to observe this first hand, is the three dimensional version of the Internet, Second Life.

A famous cartoon published in the New Yorker, pre-Web that showed 2 dogs around a computer with the caption, "Nobody on the Internet knows you are a dog" [5] illustrates why a digital persona might be enhanced. You really can project who or what you want to be online. I got my first hint of this visiting Second Life [6] when I tried to retrace Wagner James Au "Great Expedition" journey across Second Life on foot. [7] The place was pretty deserted, much like a shopping mall late on Monday nights. The people I did bump into where certainly not the type you’d bump into in a real shopping centre.

Despite the fact the software used to create your digital self encouraged you to upgrade yourself I bet most people would choose a better self over their existing one anyway. [8] You can really see this by comparing the passport photograph of Wagner James Au in Second Life shots against the reality. [9] The double always seems to get the better deal.


There is a line in "The Matrix" [3], where Neo is in the Dojo being instructed by Morpheus on the finer arts of "Kung Fu" when he makes a point about the illusionary nature of the Matrix with the line, "Do you think that’s air you’re breathing?".[4] That one line really gets to the heart of your digital online double.

Your digital representation is really just data. Bits of information represented as numbers. You can fundamentally re-arrange your double self, any way you like. Once you understand this you should realise that you can make improvements to your analogue self without the scars. And so people do. If only it was that easy.

In the days before the Internet, television and radio when communication consisted of dots and dashes Morse code [10] operators used the Telegraph key [11] to send messages. Operators would tap out messages long hand representing the alphabet in a series of dots and dashes. Experienced operators receiving messages could even identify individual operators sending messages by recognising subtle changes in the timing and rhythm of characters being received and decoded into messages. The word used to describe this is an operators "fist".

I suspect people who know you could recognise your by your digital fist. No matter how much you try to improve your double, you are probably going to have a hard time fooling those you know you. But what about those who don’t know you? Good luck. I don’t think you can game your double to improve your real world image that easily and I can think of a simple test. Try posting a fake double to a dating site and see how you go. The illusion will probably be broken the first time you make contact.

Humans look more carefully at your digital fist for the subtle cues of authenticity for reasons of compatibility than in real life probably because there is less distraction. What parts of a "digital self" do people like? What is the minimum amount of information needed to accept someone online as a real person? For the answer to that we have to look at the world of Hackers. [12]

Hackers have inhabited the digital landscape a lot longer than the rest of us. So if you want to see how you can define your digital presence, this is the place to start looking. In a time just after punch cards ruled, Hackers lived in the land of ASCII [13] (text) writing software to run their creations on personal computers. Computers with less computation power than some mobile phones.

Hackers communicated to each other via cutting edge technology like email and updated their micro-blog equivalent, "dot plan" files. [14] You didn’t need a real name to participate and be accepted. Sure everyone has a name but you didn’t need one for a digital presence. You probably don’t need one now. A handle or nick name would suffice. What about a photo of yourself? Nope. Don’t need that either. In the days before images on the Internet, you couldn’t show a picture of yourself easily. It was possible, but way beyond mortal users. [15] So I’d say the minimalist version of a digital presence is probably a handle, some text your have written and maybe, just maybe an email address. That’s it. An email address is the computer equivalent of a phone number. What’s the use of having a presence if you can’t talk to someone? [16]

I reckon that’s enough to be recognised online. But probably not enough to be really accepted. To be recognised online, you probably have to create something useful. It doesn’t have to be a compiler or an operating system. [17] For some, a simple story or a photograph will do. All it requires is some trace of human like interaction in a digital system that other people value.

The more useful or meaningful the interaction, the more you are recognised. In fact as I write these very sentences a rather well known but unidentified Hacker [18] unplugged himself from the Internet. Deleted all his accounts, software, writing, images. Most wouldn’t know his real name or identity. Recognisable only by the software, artwork and writing. Enforced by photographs and appearances at software conferences. The simple fact of unplugging has prompted a sort of digital eulogy. A expression of loss of an anonymous online presence. [19]

The whole sum of your digital self is just ones and zeros. Should you use the opportunity to do something radical and improve yourself? Edit out the bad bits? Model yourself as you do in real life? Or use it as an extension of your real self? I loathe to make suggestions and my perspective on this is somewhat slanted by the fact my double pre-dates the Web. My double began as text and is still evolving.

So just be yourself. You don’t have to identify yourself, but it helps others to accept your presence. Remember your digital double is low resolution and no match to your real self. But it has a measurable effect. And if you pick an avatar take some time to think about "atemporality". [20]

[-1] Meatmeatmikes, Pip Lincolne, "Truth or dare or warts or spin"
[Accessed Wednesday 19th, 2009]…

[0] With no desire to be "a LIVE node on the network" as discussed by Linda Stone when describing "Continuous Partial Attention".
Linda Stone, "Continuous Partial Attention"
[Accessed Wednesday 19th, 2009]

[1] Wikipedia, Doppelgänger , "A double or ‘any double or look-alike of a person’"
[Accessed Wednesday 19th, 2009]

[2] It’s hard to fool a four year old that a sock puppet is not real person. So it’s probalby just as hard to convince someone that your double is a real representation of yourself.

[3] Wikipedia, The Matrix, "A Wachowski brothers film about simulated reality"
[Accessed Wednesday 19th, 2009]

[4] Youtube, "The Matrix: Morpheus and Neo in The matrix training in the simulated reality Dojo"
[Accessed Wednesday 19th, 2009]

[5] Wikipedia, Peter Steiner, "’On the Internet, nobody knows you’re a dog.’ A cartoon in ‘The New Yorker’, July 5, 1993"
[Accessed Wednesday 19th, 2009],_nobody_knows_you’r…

[6] Some screencaps I took of travels through SL (SecondLife) in 2006 after reading about Wagner James Au’s expedition across SecondLife.
[Accessed Wednesday 19th, 2009]
_why is no more

[7] New World Notes, Wagner, James Au, "NEXT THURSDAY, HIGH NOON: THE GREAT EXPEDITION, REDUX!: Embedded reporter in SecondLife"
[Accessed Wednesday 19th, 2009]

[8] New World Notes, Wagner James Au, All about my Avatar, "A Second Life Odyssey: refers to the ‘Molotov’s Dispatches in Search of the Creator’ film about avatars which can be found here: "
[Accessed Wednesday 19th, 2009]

[9] New World Notes, Wagner, James Au, "Man in the Mirror"
[Accessed Wednesday 19th, 2009]



[12] Hackers is a much misused term. When I use the word Hacker I mean a user of a computer that is benevolent, not malevolent.

[13] Wikipedia, ASCII, "’American Standard Code for Information Interchange’ is a way to store the roman alphabet and other characters commonly used in printing, digitally"
[Accessed Thursday 20th, 2009]

[14] HackerNews, "Secret blog published in robots.txt file", "Back when linux was new and lots of servers started popping up, .plan (dot plan) files ~ became the blogs of that era. Easy to read, quick to load you get a heads up of what was going on via text – a lot like HackerNews. And the best .plan files to read had to be iD & John Carmack."
[Accessed Thursday 20th, 2009]

[15] Wikipedia, "Uuencoding (Unix-to-Unix encoding): is a way to encode binary information as text. This is the technique is used to send images via email or view images via IRC and usenet."
[Accessed Thursday 20th, 2009]

[16] This sort of reminds me of authors. You can write a book have it published and all you really know about the author is their name and the contents of what they have written. The name the author published under could in fact be a pseudonym.

[17] The most well known being RMS who wrote the GNU C compiler, GNU toolchain and GPL license. And of course Torvolds who wrote the original Linux operating system.

[18] HackerNews, "_why is no more"
[Accessed Thursday 20th, 2009]

[19] John Resig, "Eulogy to _why"
[Accessed Thursday 20th, 2009]

[20 Twitter, William Gibson (author of Neuromancer, 1984), "Your bleeding-edge Now is always someone elses past, Someone else’s 70’s bellbottoms. Grasp that and start to attain atemporality"
[Accessed Wednesday 19th, 2009]

next >>>