Kamis, 27 September 2018

e- the retreat of time in cyberspace and real theory for system clock countdown clock timer and then electronic time series backwards AMNIMARJESLOW GOVERNMENT 91220017 XI XAM PIN PING HUNG CHOP 02096010014 LJBUSAF proof of reverse in electronics against proof of status check ____ Thankyume on Lord Jesus Blessing Predicate ____ PIT Case study and JESS Proof e- The retreat of time ____ Gen. Mac Tech Zone e- DIREW for e- The Retreat of Time on real and cyber





   Hasil gambar untuk usa flag clock cyber Hasil gambar untuk usa flag clock cyber  Gambar terkait




In a process of countdown hours it is necessary to provide data and information that can still be detected to continue the process of the next work and energy concept, especially in the concepts of cyberspace and the real world that move together, especially on proxy walls and fire walls where the data information and communication is lost electronically maybe the initial stage we are still calculating the depth of proxy wells and fire wells in each digital communication information path.
   

            Basic concept Digital filter for clocks work


In signal processing, a digital filter is a system that performs mathematical operations on a sampleddiscrete-time signal to reduce or enhance certain aspects of that signal. This is in contrast to the other major type of electronic filter, the analog filter, which is an electronic circuit operating on continuous-time analog signals.
A digital filter system usually consists of an analog-to-digital converter (ADC) to sample the input signal, followed by a microprocessor and some peripheral components such as memory to store data and filter coefficients etc. Finally a digital-to-analog converter to complete the output stage. Program Instructions (software) running on the microprocessor implement the digital filter by performing the necessary mathematical operations on the numbers received from the ADC. In some high performance applications, an FPGA or ASIC is used instead of a general purpose microprocessor, or a specialized digital signal processor (DSP) with specific paralleled architecture for expediting operations such as filtering.
Digital filters may be more expensive than an equivalent analog filter due to their increased complexity, but they make practical many designs that are impractical or impossible as analog filters. Digital filters can often be made very high order, and are often finite impulse response filters which allows for linear phase response. When used in the context of real-time analog systems, digital filters sometimes have problematic latency (the difference in time between the input and the response) due to the associated analog-to-digital and digital-to-analog conversions and anti-aliasing filters, or due to other delays in their implementation.
Digital filters are commonplace and an essential element of everyday electronics such as radioscellphones, and AV receivers

                                                          


                                                         Countdown Clocks - Clocks and Clock Systems 

                                                       Countdown Clocks Bodet,s system

Large LED digital countdown clocks (days, hours, minutes, seconds)

Display the time or count down / count up time in seconds, minutes, hours and days using Bodet's wide range of LED digital countdown clocks dedicated to your environment. Bodet gives you the opportunity to choose the colour and size of your countdown clocks. Our clocks can be installed with various mounting options such as surface mounted, double sided or can be built into a sign or display. Bodet can also offer a Hour / Temperature LED kit to fit inside a sign or display. 

Countdown Clocks controlled by wireless remote control

Remote Control for LED Digital Countdown Clocks - Clocks and Clock SystemsBodet's wide range of countdown clocks controlled via remote control enable you to display normal time information and to use the clock as a chronometer or a countdown timer. The wireless control enable to change the features of the clocks easily. 
The wireless remote control enables you to set the functions that you want from your clock such as: time, count up or down, date, temperature, rate of chlorine, rate of humidity. It also allows you to operate the clock within each function.
HMT & HMS LED digital countdown clocks are available in different sizes and LED colours (red, yellow or white) to fit your requirements. 

LED digital clocks controlled by wired timer control unit (hours, minutes and seconds)

Bodet has designed special countdown clocks that can either display the time as a normal digital clock or be used as a chronometer or countdown timer. The clocks will display the information in hours, minutes and seconds to guarantee accurate and precise timing. Bodet's LED digital clocks can also be synchronised with other clocks using one of Bodet's clock systems (wired or wireless). 
The timer control unit enables you to switch the clock display between time and countdown and allows you to operate the timer when you are using the countdown function. You can count up or down, record split times and reset the timer from the control unit.
Bodet provides different countdown clocks controlled via a timer control unit so you can choose the clock that will best suit your environment and requirements. Our countdown clocks can also be used in healthcare environments. Synchronised time is crucial for recording key events to ensure patients receive treatment at the correct time and at precise intervals.Timer Control Unit - Clocks and Clock Systems
  • LED clock and timer for indoor installation.
  • Precise recording of events. Accurate timing for assessments / procedures.
  • Automatic summer / winter changeover.
  • Easy to install. Peace of mind with our support contract.
  • Style 5 SDV: designed for auction rooms, law courts, amphitheatre, to countdown the speech time or auctions. Red light and buzzer for the end of the count-up or count-down.
  • Style 5S Hospital: Mainly used for operating theatres. Stainless steel casing and keypad adapted to cleaning requirements. No interference with other medical equipments.


                        erilog HDL based simulation flow for reversible sequential circuits. 

                        

                                                 XO___XO Count Down Timers

Count Down Timers are selected based on the way the organization wants to implement the devices. We offer three countdown timers. Each one of these timers are different in how the count down or count up can be performed. We offer a LED Count Down Timer, Analog Count Down Timer and our PoE Count Down Timer.
The LED Count Down Timer is both a countdown timer and a reliable time display when it is not engaged in a count down or count up function. As a LED Digital Clock it can be part of our 467 MHz wireless clock system. This system functions with a transmitter that broadcast a time code throughout your facility so that all wireless clocks can receive the time daily and display accurate, reliable synchronized time.
The LED timer will receive this time and display it. To initiate a count down or count up the clock comes with a small switch controller. The switch controller is tethered to the clock via a cable and controls the function to learn more please visit Digital LED Countdown Timer
It is perfect for a healthcare environment where a OR count down timer is important for the timing of certain procedures in the operating room. At the same time there is a need to display accurate time.
Our Analog Countdown timer performs basically in the same manner as our LED ones except that the time is in an analog display and the countdown function is accomplished on an LCD display located in the center of the dial face. The clock timer is controlled by a switch. For more information please view the video and information at Analog LCD Countdown timer
The third count down timer we offer is with our IP – PoE LED Digital Clocks. The software is what controls that countdown feature. You can schedule a countdown event to occur a a particular time of day and a particular day or days of the week.
This countdown timer function is used in K-12 schools to count down the time between class changes. The programming is very simple with the PoE software that comes with the LED Digital clocks. Please see the video on PoE Digital Countdown Timer.


              examples of analog and digital systems are clocked backwards 
Analog Countdown Timers offer convenience and flexibility. Can be located anywhere applicable. 3 button switch control provides simplistic count-up/count-down functionality, and displays Month, Day, Date when not in timer mode.
  • Analog LCD Countdown Timer
    16″ (40.64cm) Black Standard
    Part # 220001LT – Battery
  • Analog LCD Countdown Timer
    13″ (30.02cm) Brushed Aluminum
    Part # 510006LT – Battery

Dial Options: Additional Custom Logo Designs Available

  • Analog LCD Countdown Timer
    Standard Arabic 12/60
    Part # SA60
  • Analog LCD Countdown Timer
    Standard Millitary 12/24
    Part # SM24

Features

  • Solid, Durable Casing
  • Polycarbonate and Glass Lens
  • Easily Viewable LCD
  • Displays Month, Date, Day
  • Count-Up/Count-Down Modes
  • Battery Operated (2 D-Cell)
  • Automatically Adjust for DST
  • Maintenance Free
analog LCD Countdown Timer has a clear easy to view LCD digital panel on the dial face that is controlled by a switch panel. The analog dial face can be either in a 12 hour format or a 24 hour format. The 24 hour format is ideal for hospital environment where time is charted in a 24 hour format.
The combination of this analog clock and timer is available in a 16″ black standard casing or a 13″ brushed aluminum casing. The performance and operation of both styles is identical. The switch controller is separate from the actual clock. It is tethered to the clock with a wire.
The controller has three buttons; set, start and stop. These simple to use buttons will activate the timer. When the timer is not activated the LCD displays the day, date and month. If the timer is activated in the countdown mode the digital display panel will show the remaining time. In the count up mode the digital display will show the elapsed time.
The clock is part of the KRONOsync master clock system. The system is a wireless system and the 467 MHz transmitter is the brains of the system. The transmitter will broadcast the time code throughout a customer’s facilities creating a matrix type coverage area that allows you to install a clock any place any time.
Many customers will mix and match clocks combining other sync clocks with countdown timers or other Innovation Wireless products such as our message boards. With our system you are able to combine both timing and communication products and operate them on the same frequency.
The analog portion of the timer will display accurate time because it receives accurate GPS or NTP from the transmitter. The transmitter’s time source can either be from GPS or from NTP (Network Time Protocol).
Whatever time sources you decide both are easy to install and no maintenance or upkeep is required. The transmitter will broadcast the time code from either time source. The receiver module on the LCD analog timer will pick up the time and the analog portion will display the time.
The LCD panel which displays the countdown or count up information is 1.375″ by 4″ on the 13″ brushed aluminum framed clock and 1.75″ by 5″ on the 16″ ABS framed clock. These LCD panels provide for able viewing from a respectable distance and angle. If you are looking for a software controlled countdown timer we offer this in our IP – POE Communication System.
The one item that you must determine is how far the switch controller will sit with respect to the placement of the clock. It is best to use a typical LAN cable to connect the controller to the clock 


                                   Message Boards

Synchronized Time and Communication Systems

Wireless Timekeeping and IP-POE Communications

Clock Synchronization with the powerful KRONOsync Transmitter delivers accurate and reliable time while our Control & Protect IP-POE system offers a complete network communications platform. Our systems are easy to install, maintain and use.

Innovation Wireless Info

Innovation Wireless is an industry leading manufacturer of Synchronized Time and Communications Systems. Our product line includes the KRONOsync clock system and the IP – POE Communication System. Our present day product line is built on a foundation of more than 50 years of experience in the design and manufacturing of clocks, clock parts and components.
By specializing in Wireless Clocks, Bell Systems, Wireless Public Address Systems, Digital Messaging and IP POE Communication Systems we serve markets in Healthcare, Education, and Manufacturing & Government. These products in timekeeping and communications has greatly enhanced and simplified the way schools, hospitals and businesses operate and manage their organizations.

Wireless Clocks

Our wireless clock systems, public address systems and IP-POE systems are simple to use, easy to install and maintain. Our customers include some of the most prestigious companies in the world.
Our selection of clocks both LED Digital Clocks and Analog Clocks enables our customers to improve their operational efficiency. Our user-centric IP-POE software provides customers with an intuitive platform for ease of use.
A large selection of end point devices permit customers to build a communication system that advances the way organizations inform, direct and facilitate communications.

IP-POE Systems

Our engineering and technology expertise has positioned us as an innovator and leader in advanced clock solutions and IP-POE Communication Products. This expertise has positively impacted the way schools, colleges, hospitals and businesses connect and communicate.
Organizations are required more than ever to response to emergencies and our technology increases their effectiveness in accomplishing that objective.

LED Message Boards

Our wireless and IP-POE message boards send notifications messages quickly and easily. They provide customers with an eye catching digital display of communication that complements their voice broadcasts. It enables administrators to take more confidence in the relevance and impact of their messages.
There's never been an easier way to help keep your organization safe and informed. With this in mind our engineers built a simple but intuitive interface. It allows your personnel to execute action during an emergency with accuracy and speed. When an emergency occurs people need information. It is a natural human response in an emergency and our communication systems provides that information.
Our wireless clock systems and message boards make life easier for teachers, administrative and students. Productive use of time is the keystone of great Schools, Universities, Hospitals, Manufacturing and Businesses. In K-12 schools the day revolves around the movement of students from one place of learning to another. Teachers build lesson plans in order to maximize teaching time.

Wireless Bells - Horns

Accurate clocks on the wall that are synchronized with bell schedules create a highly effective learning environment and a efficient manufacturing environment. Click here to learn more about our bell and buzzer solution.

KRONOsync Transmitter

Our high powered KRONOsync transmitter is transforming colleges and universities campuses throughout the United States. These institutions are under ever increasing pressure to improve their education value.
Our wireless clock system provides the means for students and professors to stay on time. Visual and accurate display of time commissions the educational process to work at a high level. Our advanced technology provides complete coverage of a college campus.
The selections of both analog and digital clocks permit our customer to match the look and feel of their institutions. Our sync clocks systems for hospitals increase the accuracy involved in the administrative task of charting time.
The pressure on hospitals to control costs and minimize mistakes has never been more important. The legal, insurance and medical requirement for hospitals to accurately chart the time is safeguarded with our wireless synchronized timing solutions.
Patients arriving in the emergency room are charted the moment they arrive. In operating rooms our countdown timers are used extensively to execute numerous timed medical procedures.
Our advanced IP-POE software provides an organization a complete "control and protect" communication platform, thereby, providing organizations with the ability to communication in critical and non-critical times.
In every market we serve our engineering moves forward not only to improve existing products but also to develop products that will save our customers time and money.

Wireless PA Systems

We offer two wireless solutions for schools and commercial facilities. Our Wi-Fi System will operate on your existing Wi-Fi. Our Wi-Fi speaker system only requires a strong Wi-Fi signal to operate. The second system we offer is our UHF frequency based wireless PA system.
This system has many advantageous for those organizations that do not have a reliable Wi-Fi network, however, have the need for a public address system.

Solar Clock

Innovation Wireless has its root in the clock industry .  

        Simple 555 countdown timer circuit with alarm 


simple IC-555 countdown timer circuit with alarm.The red and green LEDs will flash alternately and when time to setting the buzzer will loudly sound each time LED flashes. We use IC-555 timer as Stable multi-vibrator and next integrated circuit LM3905-Precision Timer. Parts used in this circuit are easily available in most of the local markets.
How this circuit works



Alarm Countdown Timer
simple IC-555 countdown timer circuit

When enter 9 volts power supply to the circuit. IC1- 555 timer act as atable multivibrator to generates oscillator in DC pulse about 0.5 hertz frequency out. In normally the output pin 3 will be out of a square wave. So LED1 will light up when the signal is a negative voltage or “low”, but in same time LED2 will go out. Then, the pin 3 is positive signal, LED1 is OFF and LED2 is ON. This will flash alternately throughout the duration of scheduled. Which the R1, VR1-potentiometer, R2 and C1 determine the frequency or the blinking LED rate.
The IC2-LM3905 is also precision timer IC. which it includes VR2, R6 and C3, to setup time will be long with adjusting the VR2. and change C3 capacitor to higher up cause long time. While the output voltage at pin 7 of IC2 is 0 volt, the piezo-buzzer not sound. But when it’s time to set, the output pin 7 has the positive voltage to BZ1-buzzer beeps out the rhythmic flashing of the LEDs.
Parts will you need
IC1: NE555-timer; Quantity=1
IC2: LM3905-Precision Timer; Quantity=1
C1: 33uF 25V-Electrolytic capacitor; Quantity=1
C2: 0.01uF 50V-Ceramic capacitor; Quantity=1
C3: 33uF 25V or more-Electrolytic capacitor; Quantity=1
R1,R2: 10K 0.25W Resistors; Quantity=2
R3,R5: 1K 0.25W Resistors; Quantity=2
R4: 680 ohms 0.25W Resistors; Quantity=1
R6: 1M 0.25W Resistors; Quantity=1
VR1: 50K Trimmer Potentiometer; Quantity=1
VR2: 1M Trimmer Potentiometer; Quantity=1
D1: 1N4001 50V 1A Diodes; Quantity=1
LED1,LED2: 3mm Red and Blue LEDs;Quantity=2
BZ1: 6V piezo-Buzzer;Quantity=1

   

        Electronic Rotary Switch circuit using Digital IC 


Electronic Rotary Switch circuit using Digital IC, use a single switch choose a function of external control circuit has 9 positions.Begin with press the switch S1, the output signal from pin 2 of IC1 as “high” at all, and the pulse signal to IC2, the output at pin 3 is “high” as well.
When you press the switch again and the output pin 3 is “low” is output at pin 2 is “high”. The switch of the output “high” to sort it out. The output at pin 11 and pin 3 to start again.
The output is “high” the output of IC2, can be used for external control, such as volume control circuit, a different function, or control circuit is closed – the lights, etc.Or in combination with IC 4066, which is the analog switch.I need to read the manual first, it is easy to use one circuit.
The resistors R1 and C1, the delay after pressing the switch S1,To a recognition that each of the switch, the switch only once, actually,.As a single pulse, entering the circuit, and the IC3a IC3b, a reset signal to IC1 and IC2.
Electronic Rotary Switch circuit using Digital IC
How to build its.
Although this circuit as the experiment is set. But you can build as the electronic for use in your working. in Figure 2 is Universal PCB layout of all components. and the parts you can see in circuit(Figure 1)
pcb-layout-of-electronic-rotary-switch
Figure 2 Universal PCB layout of all components. 





               

                        Time reversibility


A mathematical or physical process is time-reversible if the dynamics of the process remain well-defined when the sequence of time-states is reversed.
deterministic process is time-reversible if the time-reversed process satisfies the same dynamic equations as the original process; in other words, the equations are invariant or symmetrical under a change in the sign of time. A stochastic process is reversible if the statistical properties of the process are the same as the statistical properties for time-reversed data from the same process. 

                                      Hasil gambar untuk electronic time circuit series backwards 

                                                                   Cyberspace    

The ‘Live Aid’ movement was comprised of a series of globally broadcast rolling concerts sponsored by corporations who received a moral injection to their advertising profile, as well as patrons at the gates who felt that they were doing something for needy people they had seen on TV.
The later version of empathy-at-a-distance is one in which, by sitting at Internet terminals, those people living in economically and informationally rich countries can do ‘something to help’. 
                                   Facebook, cyberspace, and identity
In Life on the Screen: Identity in the age of the internet (1995) Sherry Turkle – Professor of the Sociology of Science at MIT (at the time) and cyber-psychoanalytical theorist – explores the social and psychological effects of the Internet on its users. One of her startling findings is that many denizens of cyberspace appear to value their cyber-identities more than their "normal", embodied selves. The use of the plural – "cyber-identities" – is appropriate here, because invariably the inhabitants of cyberspace construct several identities (or "avatars") for themselves in the course of frequenting MUDS (Multi-user domains), "chatrooms" and the like.
A decade earlier, in The Second Self: Computers and the human spirit (1984), Turkle first examined such identity-transforming relations, but at the time it was still largely a matter of one-on-one, person and machine. The rapidly expanding system of networks, collectively known as the internet, has changed all that, in such a manner that its capacity, via computers, to connect millions of people in new kinds of spaces, has altered the way in which people think, the form of communities, the character of their sexuality and the relative complexity of their very identities (Turkle, 1995: cf 49).
One of the most interesting topics she discusses is the connection between specific kinds of cultural environments and certain kinds of psychological disorders. The advent of the internet and its concomitant opening-up of hitherto unheard-of spaces of encounter have gone hand in hand with many other manifestations of multiplicity and diversity in contemporary, postmodern culture. With this in mind it is striking that, simultaneously, the number of people who display symptoms of what is known as MPD (multi-personality disorder) has burgeoned. She stresses that she is not positing a causal relation between internet-usage and MPD; instead, she is arguing that all the different signs of difference and multiplicity, today, are contributing to modifications of prevailing conceptions of identity (Turkle, 1995: 260-261; Olivier, 2007b).
In clinical cases of MPD, she points out, there are usually various degrees of isolation among the various "alters" and the "host"-personality – an indication that the barriers between these "personalities" block access to "secrets" that have been repressed – while, in contrast, MUD-participants "play" with the various identities constructed by them in virtual spaces.1 This presupposes a fundamentally "healthy" subject capable of constructing and dismantling alter egos as she or he deems fit, without being assimilated into any of them in such a way that it undermines their ability to function 'normally', that is, in a more or less coherent manner. However, it seems likely that a culture that is more tolerant of multiplicity than earlier ones, is also more likely to promote the emergence of multiple identities, in both the healthy sense of developing a more fluid, flexible sense of selfhood, and the sense of creating the cultural environment where pathological symptoms of MPD may manifest themselves more readily. But – and here's the rub – Turkle's (1995: 185, 193) findings indicate an accompanying experience, on the part of many who create online personalities, of their "constructed" selves as somehow "real", more "themselves" even than the person's "basic", everyday, "natural" host-self.
What Turkle has brought to light in her work should not surprise anyone. Didn't Karl Marx already, in the 19thcentury, warn against the dehumanising, reifying effects of factory labour, which robbed workers of their humanity through their use of industrial machines? In other words, technology – including computers and the internet – is never innocuous when it comes to the human beings that use it: invariably it leaves its imprint on people.
But, like computer technology, the internet is not a static thing in its various possibilities either. Among the recent comments (on the part of Turkle) on current technology (such as the IPhone), as well as the appearance of virtual space phenomena such as Facebook, MySpace, LinkedIn and the like, about its progressively diversifying implications regarding the issue of human identity, is her remark, during an interview (Colbert, 2011), that we "have to put technology in its place", and that her research on Facebook indicates that adolescent users reach a certain "performance exhaustion". Not many Facebook users may think of setting up and updating a Facebook profile as a "performance", but as she indicates in the interview with Colbert, it certainly is one.
It is instructive that someone like Turkle, who confesses to loving technology, insists that human beings have somehow overstepped the mark where technology is concerned, and that we have to rediscover the importance of giving other people our full attention when we are together, instead of busying ourselves with our iPhones (Colbert, 2011). How must we understand this caveat being issued by the person who saw in the internet a space of exploration, where we can discover new, better possibilities about ourselves (Turkle 1995: 262-263)? Perhaps one should take a long, hard look at Facebook and its ilk regarding their "effect" on human identity.
If e-mail provided a welcome alternative to those, like myself, who find ordinary postal mail just too cumbersome and slow to engage earnestly in the kind of correspondence sustained by Freud and his contemporaries, Facebook, MySpace and their cyberspace relations have taken the possibilities created by e-mail to new proportions for everyone using these cyber-domains, including users in South Africa. E-mail (or the frenetic use of cell-phones) has its own identity- and psyche-transforming capacities, of course, as the recently deceased French thinker Jacques Derrida shows so convincingly in his Archive fever (1996: 15-18). Derrida argues that Freud already indicated an awareness that, when a new "archiving" technology (including different tools for writing and storing data, such as computers, e-mail and mobile phones) appears on the scene, it is a concrete embodiment of something that has already changed in the human psyche (at least of the inventors of this technology). This will, in its turn, contribute to reconfiguring the psyche of the people who use it. Referring to a kind of cash register made for illiterate people, and to science fiction stories in which robots are depicted as doing everything menial for humans, Rosanne Stone (1996: 168) puts this insight as follows: "... at the inception of the virtual age, when everything solid melts into air, we have other, far more subtle devices that don't do for us but think for us. Not computers, really – they think, in their machinic fashion, and then tell us the answers. Ubiquitous technology, which is definitive of the virtual age, is far more subtle. It doesn't tell us anything. It rearranges our thinking apparatus so that different thinking just is."
Seen in this way, Facebook and its virtual era ilk have paved the way to novel possibilities in the realm of especially the experience of one's own identity. How does one experience one's own identity on Facebook? It seems to me relevant that, on the one hand, these "friend-based" websites are less about socially "connecting and reconnecting". They are, to a far greater extent, I believe, a stage for developing one's own "brand", as it were, and one might add, doing so in a fairly exhibitionistic way. That this is informed by the (ironically) person-diminishing values of capitalism, should be obvious: to "brand" oneself is to offer yourself as a commodity to others for their use, which cannot leave one's intrinsic sense of self-worth unaffected, either negatively or affirmatively, depending on whether one buys into the ideology of capitalism and the market.2Moreover, because "privacy" has been such an issue (Fletcher, 2010) regarding Facebook, one might legitimately wonder at the practice of placing so much information about oneself, one's preferences, likes and dislikes (in textual as well as photographic and video-format), on such a site. It is hardly a manifestation of the desire for privacy. What individuals post there is not what they regard as private (although it may seem like it to others); it is exactly what they want to show, and show off, to others. In the process they do not leave their own sense of identity unaffected.
After all, the question arises, whether the best, digitally "retouched" photos of oneself, or one's list of favourite films, books, musical numbers, and so on (or alternatively, pictures selected to show off just how well you can hold your liquor, or how hard you can party) really represent "you". I would argue that, on the contrary, this composite, mostly carefully constructed "identity" is located at the level of the largely self-deluding, alienating register of what psycho-analytical theorist Jacques Lacan calls the "imaginary" (which is the subject-register of fantasy and alienation, so clearly shown in his analysis of the "mirror phase"; Lacan, 1977: cf 1-7; Olivier, 2009). If this is indeed the case, the upshot is that it is not one's everyday, multi-facetted "self" displayed on Facebook, but something entirely fictional, of the order of the "ego" in Lacanian terms, which is a far cry from the "self that speaks". Unlike the "ego" of the imaginary register, the "self that speaks" (at the level of the symbolic register of language) cannot be objectified in this manner, because it always accompanies speech-acts at an unconscious level (Lacan, 1977a: cf 49, 55).
While it is true that the ego-component of one's subjectivity is an indispensable constituent of the human subject, the more one identifies with its embodiments in the guise of carefully chosen photographs (on Facebook), and so on, the more it becomes a straitjacket for one's "identity", and the less one is able to "choose one's own narrative" (Lacan, 1977a: cf 46-47). In addition to the imaginary "ego", every human subject needs the registers of the symbolic (as well as of the "real") to be capable of such choice. Given their commitment to imaginary representation, Facebook aficionados are bound to find the third Lacanian register of the self disconcerting – that of the unsymbolizable "real", which surpasses language as well as iconicity (Lacan 1981: cf 55; Lacan, 1997: cf 20). It constitutes the always latent, but inexpressible domain which announces itself negatively when we come up against the limits of language, as in cases of trauma. (Lacan's theory is discussed in more detail below.) Facebook users may delude themselves into believing that what they see in its "pages" are "real" people, but in truth these images amount to only one aspect of their complex selves, namely its fantasy (imaginary) component, and by identifying with them, they introduce a significant element of fictionalizing alienation into their lives (Lacan, 1977; Olivier, 2007a).

SOCIAL NETWORKING SITES, THE PRIVATE AND THE PUBLIC.
I'm not pointing out these implications because I want to be a spoilsport. It is also true that, on the other hand, Facebook and MySpace have, like all novel inventions, an upand a downside. The upside includes the possibilities they create for genuinely interpersonal, "communicative" cyber-communities of friends, colleagues, scientists, academics and other (shared) interest groups, to engage in debates, exchange valuable information relevant to research in various disciplines, share photographs of hiking trips, and so on. But people should not fool themselves into believing that Facebook will leave the face of humanity unchanged. If Turkle's work on the internet's social effects is anything to go by, one may anticipate that the very artificiality of the personal profiles on Facebook may well aggravate the kind of socially "artificial" behaviour encountered among economically competitive yuppie types, in whose interest it is to promote themselves as a "brand".3
At the time when Turkle published Life on the screen (1995), the social networkingsite, Facebook, did not yet exist, and for some time now it has seemed important to reflect on the relevance of her work for such virtual social spaces (Olivier 2007). One could legitimately surmise that, as in the case of older MUDS, frequenting spaces such as Facebook or MySpace would not leave the social identities of the individuals who do so untouched, either. Recent reports and articles on Facebook seem to confirm this, but more importantly, they enable one to see an unexpected side of the social networking site. (I shall return to Turkle's more recent work later.)
So, for example, Steven Johnson's piece in Time (2010: 29), called "In praise of oversharing" contrasts Josh Harris's experimental "art project" of the 1990s, where, first, a hundred-plus people, and later, just he and his girlfriend, lived together in an underground bunker, every moment of their lives recorded on film by a network of live web cameras ("webcams"), with the kind of "oversharing" made possible by Facebook on a large and ever-growing scale (it recently registered its 500 millionth user). In the case of the former, Johnson argues, we witnessed a case of "extreme" exposure – with every quarrel and toilet visit filmed – which hardly anyone would voluntarily submit to or choose, while the latter represents a shared space of limited public exposure – one that is subject to users' own decisions about what and how much of it they wish to share, and with whom. Still – and this is the important thing, as far as I can judge – for Johnson the growth in Facebook membership, as well as its popularity, is an indication of people increasingly feeling at home in what is neither the secluded space of privacy, nor the public space of prominent or famous public figures, but something in-between.
There is more to it than this, however. In "Friends without borders", Dan Fletcher (2010: 22-28) also focuses on the phenomenon of Facebook, affording one a glimpse of another, less often discussed side of what may, to some, seem to be no more than an innocuous, socially useful internet site, where one can keep track of events on your friends' and family's lives. Moreover, it seems reassuring that privacy controls on Facebook allow you to set limits to the identities of the people you want to give access to it, in other words, to just how public you want information about yourself and your family to be. There's the rub, however, because no matter how "safe" and personally useful Facebook may appear to be, the company has on more than one occasion introduced innovations that were met with dismay on the part of users, and its privacy controls have been described as "less than intuitive", if not downright "deceptive" (in Fletcher's words).
Why would this be the case, if one may reasonably expect the company to ensure that such control settings are relatively easy to operate? It may be silly to see anything sinister in this, but consider the following. Among the innovations referred to earlier, was the 2007 introduction of Facebook Beacon, which, by means of default settings, automatically sent all users of Facebook friends' updated information about their shopping on some other sites. At the time, CEO Zuckerberg was forced into a public apology for such unwarranted invasion of users' privacy (Fletcher, 2010: cf 24).
It did not end there, however. Following his hunch, that the amount of information that people would be willing to share (and that Facebook as well as other companies could benefit from) is virtually unlimited, Zuckerberg introduced a far-reaching enterprise called Open Graph in April 2010. It allows users to comment on anything and everything that they like on the internet, from merchandise to stories on news sites – presumably on the assumption that you would be interested in your friends' preferences, and vice versa. The catch is that it is not only one's friends who are interested in this. As Fletcher (2010: 24) points out in his article, Facebook is able to display these predilections on the part of its users on any number of websites. Not surprisingly, in one month's time after Open Graph's launch, in excess of 100000 other sites had integrated its technology with theirs (Fletcher 2010: 24).
It is not difficult to guess why. Small wonder that Facebook has had to look at its privacy controls once again, in order to "enhance" them, after the Electronic Privacy Information Center lodged a complaint – relating to confusion regarding Facebook's ever-changing policy, as well as its less-than-clear privacy controls design – with the Federal Trade Commission in the US (Fletcher 2010: 24). It is easy to see in all of this merely a misunderstanding of Facebook's "mission", described by Zuckerberg as aiming at making the world "more open and connected" (ibid: 24). This comes with a rider, though. It appears that the company is pushing users as far as it can to expose their likes and dislikes to other, customer-hungry companies, and benefitting financially in the process. Few people would find fault with Facebook's attempt to profit from its users' buying preferences, but there is more at stake than that, as I shall try to show.

FOUCAULT, PANOPTICISM AND FACEBOOK.4
The philosopher Michel Foucault (1995: cf 191-194) has observed that in the premodern age the individuals whose identities were fleshed out to more than life-size were royalty and nobility – the King and Queen were highly individualized because of their elevated station in society, while ordinary people, at the bottom of the social ladder, were largely left to anonymity. According to Foucault, what has distinguished modernity in this respect is the "descending" level of individualization, that is, the fleshing out, through meticulous description, of the identities of people who are furthest removed from royalty, such as criminals and individuals with a distinctive medical or psychiatric condition. And today, in postmodernity, one might add that the level of individualization has been taken a step further in various ways5, including the advent of social networking sites such as Facebook. Needless to stress, "individualization" is inseparable from what is commonly meant by "identity", namely features or attributes that distinguish individuals from one another, but that may also display marked similarities, as in the case of "cultural identity".
As the "panoptical", "maximum-visibility" age of disciplined, docile6 bodies (as Foucault has described modern people whose lives are constantly subjected to procedures of "normalization" and infantilization; 1995: cf 136-138; 200-201) has unfolded, even those ordinary people who did not fall foul of the law, nor became assimilated into medical and psychiatric institutions, have had their identities progressively assigned to educational and governmental data banks and population registers in a process of "normalizing judgment". The consequence has been that virtually every citizen in contemporary democratic states has become as highly individualized in terms of personal attributes – birthplace, domicile, educational qualifications, criminal record, and so on – as royalty and the aristocracy were in earlier ages.
It may seem counter-intuitive that Facebook could contribute to "normalizing" in any sense, and yet, it is a social networking site that appears to "dictate" important social "decisions" or behaviour of millions of internet users. One should not overlook the unexpected ways in which it dovetails with individualizing practices of the kind described by Foucault. For one thing, Facebook is predicated, according to CEO Zuckerberg (Fletcher 2010: cf 24), on the hypothesis that the public is receptive to virtually unlimited openness regarding sharing of (personal) information. But what is the myriad of informational elements that are placed on Facebook every day, other than (voluntarily supplied) information – that one cannot definitively delete, into the bargain – and that can be used by, or against, the users involved? (Rosen, 2010).
Moreover, when one looks carefully at the three specific ways, identified by Foucault, in which modern subjects are turned into "docile bodies", Facebook and MySpace are cast in an even less innocuous light. There are especially three distinctive modern ways of producing such docile bodies, according to Foucault. The first is what he calls "hierarchical observation", or "a mechanism that coerces by means of observation; an apparatus in which the techniques that make it possible to see induce effects of power" (Foucault, 1995: 170-171), of which the "panopticon"-prison (ibid: cf 200-202) is an embodiment, where the prisoners are (potentially) under constant surveillance by warders.
Foucault (1995: cf 177-184) calls the second way of producing docile bodies "normalizing judgment". It concerns the "power of the norm". Where he elaborates (ibid: 184) there are noticeable points of connection with Facebook as a virtual space of display and comparative judgment: "In a sense, the power of normalization imposes homogeneity; but it individualizes by making it possible to measure gaps, to determine levels, to fix specialities and to render the differences useful by fitting them one to another. It is easy to understand how the power of the norm functions within a system of formal equality, since within a homogeneity that is the rule, the norm introduces, as a useful imperative and as a result of measurement, all the shading of individual differences." In former ages, then, individuals may have been judged according to the intrinsic moral value ("virtue") or the reprehensibility of their actions, but today the tendency is to place them on a differentiating scale or continuum which ranks them in relation to everyone else.
The third disciplinary practice of reducing bodies to docility is familiar to everyone today: the examination (Foucault, 1995: cf 184-194; Gutting, 2005: cf 84-86). The introduction of the examination made possible the connection of knowledge of individuals with a specific exercise of power. According to Foucault (1995: 187), the "examination transformed the economy of visibility into the exercise of power". He points to the ironic reversal, namely that traditional (premodern) power was visible, while the subjects of power were largely invisible, whereas modern, disciplinary power operates through its invisibility, while simultaneously enforcing an obligatory visibility on disciplined subjects, in the course of which they are drawn into a "mechanism of objectification" (ibid: 187). The examination "also introduces individuality into the field of documentation" (ibid: 189). This entails archiving, through which individuals are placed within "a network of writing", and one cannot ignore the discursive violence reflected in Foucault's choice of words, where he alludes to the "mass of documents that capture and fix them" (ibid: 189). Moreover, examination as a mechanism of disciplinary power, "surrounded by all its documentary techniques, makes each individual a 'case'" (Foucault 1995: 191). In this way the examination has contributed significantly to lifting ordinary individuality, which once was in the shadows of imperceptibility, into the kind of conspicuousness that goes hand in hand with disciplinary control, which turns the individual into an "effect and object of power" (ibid: 192), a "docile body".7
Examination is probably the most invidious and effective form of disciplinary domestication, because it combines the previous two, hierarchical observation and normalizing judgment, and is a privileged locus of the modern nexus of power and knowledge. At the same time, the examination generates "truth" about individuals, and lays the basis for their control through the norms that are established in this way.
I have elaborated on Foucault's account of disciplinary mechanisms which have played a crucial role in the constitution of the subject of modern power, not because I believe that Facebook, MySpace and similar internet sites are identical to the disciplinary mechanisms concerned, but because I believe one can learn much about contemporary identity-formation from considering these cyberspaces of social interaction in light of Foucault's observations.
Had Foucault still been alive today, he would probably have looked upon virtual spaces for social interaction and information-distribution, including Facebook and YouTube, as a phenomenon that has taken the process of individualization in a panoptical context (in the service of optimal control) a few steps further. Not content with the amount of personal information that one is already obliged, by law, to furnish to governmental, educational and commercial institutions, people have more than lived up to the CEO of Facebook, Mark Zuckerberg's bet, that they have an expandable appetite as far as sharing information goes (Fletcher, 2010: cf 24) – information that is hugely valuable for companies searching for potential customers.
The difference with Facebook is that, by contrast with obligatory information given to the state, the information shared with friends and family is voluntary, and that it is selectively posted with a view to promoting something – either optimal informedness among family members, or one's personal standing among your friends regarding your "cool" looks and fashion tastes, or perhaps one's professional interests, by using the space for sharing important information (such as lecturers disseminating reading matter among students). But Facebook has not made sure that information about users' lives is restricted to this; in fact, quite the opposite. The very fact that the default settings on users' privacy controls is automatically on maximum exposure (Fletcher, 2010: cf 24), so that the responsibility for adjusting them rests on every user's shoulders, is already quite telling in this regard.
It may be that, at this stage, the subtle and not-so-subtle ways in which Facebook has succeeded in exposing users to more (potential) attention from other companies than they probably anticipated, have no more than financial or economic objectives, but the potential for extensive social or psychological manipulation, if not "control", is considerable. Moreover, just as, in the panoptical prison, where inmates monitor their own behaviour (on the assumption of their constant surveillance by warders with full visual access to them), indications are that individuals are increasingly engaging in a form of self-monitoring of behaviour via voluntary self-exposure on internet sites such as Facebook.
It is not difficult to grasp such self-monitoring in terms of the three mechanisms of disciplinary power distinguished by Foucault (discussed earlier). Posting information about oneself on Facebook in the form of selected photographs and textual descriptions of likes and dislikes regarding movies, clothes, cosmetics, food, books and more, is subject to "hierarchical observation" in so far as it conforms to notions of what is "cool" (or, ironically, "hot"), that is, acceptable to one's peers. In the light of what Susan Faludi (1999) has called "ornamental culture", where the "cool look" is valorized at the cost of meaningful social and political action, the implication is that Facebook probably reinforces this state of affairs. Even the odd instance of cocking a snoot at criteria of "coolness" confirms the behavioural power (the power to affect behaviour) of the hierarchical norm in a paradoxical fashion, albeit the kind of behaviour – if Faludi is right (and I believe she is) – which is marked by political passivity in post-industrial, "developed" societies like the United States.8
The same is true, in a related manner, of "normalizing judgement" and the "examination". While Facebook is also a means for family members and friends to keep in contact, and share photographs of trips, places visited, and so on, "normalizing judgement" (which probably even functions among family and friends in a "keeping up with the Joneses"-fashion), operates through evaluating-judging comparisons, which have the result of setting up certain norms (of appearance and choice of merchandise, for instance). It may seem counter-intuitive that "examination" should play a role here, but if one recalls the phenomenon of the (often televised) "makeover" – that is, revamping one's home, or one's personal appearance, for the approval of one's peers – then it is clear that Facebook participates in this process of "making visible" of individuals, and therefore also of "individualizing" in terms of standards that allow comparison (which, paradoxically, is closer to "standardization" than to individualization!).
In the context of Facebook it may appear that all of these mechanisms attain an undeniable level of psychological importance if we consider that – while this is not necessarily true of the "disciplinary" cases considered by Foucault – they comprise what Rabinow (1984: cf 10-11) considers to be Foucault's most original contribution regarding the "modes of objectification" by which human beings are made into subjects, namely "subjectification". (The other two are "dividing practices" and "scientific classification"). This entails the "way a human being turns him-or herself into a subject" (Foucault, quoted in Rabinow, 1984: 11). Rabinow further characterizes this as "those processes of self-formation in which the person is active", such as what Foucault (1988; Olivier 2010a) terms "the care of the self" practiced by individuals during the Hellenistic era – a difficult process of active self-examination and living according to a strict regime of self-formation and self-discipline. However, further reflection indicates that this is not the case. Although Facebook arguably does contribute to "selfformation", it does not seem to exhibit the strenuous, active character of Hellenistic practices of self-formation.

FACEBOOK AND "THE INFORMATION BOMB".
The most radical assessment of Facebook is made possible by the work of Paul Virilio, in a book that was first published before Facebook existed – which itself confirms the extent to which it is another development along a continuum of technical-social transformations. Virilio extends Foucault's interpretation of the panoptical, disciplinary society with far-reaching consequences in The information bomb (2005) – it seems that he virtually anticipated the Wikileaks affair of 2010 (Olivier, 2011), as is clearly evident from the following (Virilio, 2005: 63): "After the first bomb, the atom bomb, which was capable of using the energy of radioactivity to smash matter, the spectre of a second bomb is looming at the end of this millennium. This is the information bomb, capable of using the interactivity of information to wreck the peace between nations." I would argue that social networking sites like Facebook are part and parcel of this "information bomb".
What led Virilio to this insight? When June Houston installed 14 "live-cams" in her house in 1997 to transmit visual access to all its strategic sites to a website, in the process enabling others to provide her with "surveillance reports" on the appearance of anything suspicious, Virilio (2005: 59; bold in original) believes that one saw: "... the emergence of a new kind of tele-vision, a television which no longer has the task of informing or entertaining the mass of viewers, but of exposing and invading individuals' domestic space ... the fear of exposing one's private life gives way to the desire to over-expose it to everyone ..."
This description seems to me to apply to Facebook and MySpace. That it is an extension of the panoptical spaces of Foucault's disciplinary society should be evident, although it is less clear whether such over-exposure goes hand in hand with "discipline". Virilio makes its panoptical character explicit (2005: 61) where he intimates that the extension of June Houston's self-created panopticism demands "a new global optics, capable of helping a panoptical vision to appear". Significantly, he also points out that such a vision is indispensable for a "market of the visible" to emerge. According to Virilio (2005: 60), Houston's actions – which have since been replicated with different purposes in mind – were revolutionary, transforming the transparency of living spaces to which informational television programmes have accustomed us, towards what he calls "... a purely mediatic trans-appearance ...", and he attributes the growth of this practice to the requirement, on the part of the globalization of the market, that all activities and behaviour be "over-exposed" (2005: 60): "... it requires the simultaneous creation of competition between companies, societies and even consumers themselves, which now means individuals, not simply certain categories of 'target populations'. Hence the sudden, untimely emergence of a universal, comparative advertising, which has relatively little to do with publicizing a brand or consumer product of some kind, since the aim is now, through the commerce of the visible, to inaugurate a genuine visual market, which goes far beyond the promoting of a particular company." It is especially the "competition between individuals" that is germane to the present theme. Facebook is part and parcel of this phenomenon, in so far as it enables one to display one's wares, as it were, and appear to attract as many "friends" as one would like, but simultaneously deferring the moment of entering into real friendships, and all that accompanies them, such as trust, risk, mutual emotional support and fulfilment, but also the possibility of betrayal.9
This is seamlessly connected to what Virilio (2005: cf 61) further sees as being part and parcel of globalization, namely, that individuals continually observe one another comparatively in terms of ("ornamental") appearance. It is further related to the marketing value of (among other things) Facebook usage that was referred to earlier, because of the access that companies have to the comparatively displayed preferences on individuals' Facebook pages. It is mainly for this reason that Facebook was recently (January 2011) valued at $500 billion, given the unprecedented access that companies have to the more than 500 million Facebook users' likes and dislikes. Companies don't even have to advertise comparatively any more; potential customers and clients do the advertising of their own preferences in merchandise on an individual basis, with ever more refined targeting of such individuals' tastes by sellers of just about anything that may be bought, from personal services to all the consumer products available on the globalized market today.
It is debatable whether this state of affairs displays an increased potential, if not actuality, of the "disciplining" or the manipulation of individuals by various agencies, from corporations to the state. In the first place it should be clear that the voluntary display of personal preferences on the internet invites marketers of all stripes to focus their efforts on individuals. Needless to say, being targeted (online) by multiple companies on the basis of one's displayed preferences in the virtual realm, contributes to a sense of identity that is bound up with "cyber-selves". Secondly, the attempt by many Facebook users, to put their best foot forward as far as their appearance is concerned, signals something closely related to the kind of self-monitoring that occurs in panoptical prisons on the part of prisoners who know they are potentially being monitored. In posted photographs Facebook aficionados tend to appear as they believe their "friends" would like to see them, whether that be in perfectly "photoshopped" guise or in any other way they would like to be seen. This is part of Virilio's "comparative observation" and Faludi's "ornamental culture". It is the "pseudo" version of what Foucault (in Rabinow, 1984: 11) calls (self-) "subjectivization", which (unlike its active counterpart) is consonant with panoptical surveillance.
Virilio provides one with a broader horizon for understanding phenomena such as Facebook, one that allows you to see surveillance as a truly global project. He shows that the internet has allowed the transformation of "tele-vision" into what he calls "planetary grand-scale optics" (Virilio, 2005: 12): "... domestic television has given way to tele-surveillance". The mono-directionality of television is replaced with dualdirectionality of visualization through the use of live web cameras ("webcams"), which enable one to see "what is happening at the other end of the world" (Virilio, 2005: 17). If it is kept in mind that "virtualization" (the representation of the world, or aspects of it, in computer- and internet-generated "cyberspace") cannot be separated from "visualization" (ibid: 14) in this context, Facebook, MySpace and YouTube can all be seen as constituting visual perspectives on the virtualization of the world, more specifically, the virtualization of subjects or personalities. In Virilio's words (2005: 16): "The aim is to make the computer screen the ultimate window, but a window which would not so much allow you to receive data as to view the horizon of globalization, the space of its accelerated virtualization ..."
Such developments are not innocuous as far as individuals' experience of themselves – that is, individual psychology – is concerned. At the beginning of this paper I referred to Sherry Turkle's misgivings about what she sees as the detrimental effect of technology (such as cell phone use) on individuals' social skills. Virilio (2005: cf 19-27) allows one to take this further. In a nutshell, he interprets the development of the internet and everything that it has made possible – e-mail, global-reach "live webcams", Facebook, YouTube, and so on – as the contemporary manifestation of a tendency that is (and, for historical reasons, has for a long time been) part and parcel of the American collective psyche, namely the projection of a "frontier" to be crossed or conquered. Only, there are no more geophysical frontiers to be conquered on the planet (something graphically captured in the subtitle of Gene Roddenberry's fictional television series, Star trek, namely, The final frontier), and hence the turn, progressively, to so-called "virtual or cyber-reality": "Cyber is a new continent, cyber is an additional reality, cyber must reflect the society of individuals, cyber is universal, it has no authorities, no head, etc." (Barlow et al, quoted in Virilio, 2005: 27).
Virilio leaves one in no doubt about his understanding of, and expectations concerning the social consequences of this virtualization of the world. He quotes from a speech by President Bill Clinton, where the latter eulogized the "promise of America" in the 20th century, but also spoke of America's "fractured, broken-down democracy" that could lead to a "major political catastrophe" (Virilio, 2005: 19). Then, implicitly tying this to the belief that cyberspace is widely seen as the new territory to be conquered, Americanstyle, Virilio observes (2005: 25): [ Hollywood] "... industrial cinema, by upping its false frontier effects to the point of overdose, must inevitably generate social collapse and the generalized political debacle we find at this 'American century'-end".
Like Lyotard (1992: cf 9) before him, Virilio (2005: cf 25) sees the development of capitalist "industrial" and "post-industrial" cinema as stages in the "catastrophe of the de-realization of the world", the more recent stages of which involve the development of computer-technology, the internet and its attendant technologies. Judging by strong words like "social collapse" it is quite apparent that, for him, these developments are not inconsequential or innocuous. He (ibid: 67; italics and bold in original) sees the intermittent collapse of financial markets – which display an undeniable "virtual" side – as symptomatic of the possibility of such a social collapse: "The smaller the world becomes as a result of the relativistic effect of telecommunications, the more violently situations are concertinaed, with the risk of an economic and social crash that would merely be the extension of the visual crash of this 'market of the visible', in which the virtual bubble of the (interconnected) financial markets is never any other than the inevitable consequence of that visual bubble of a politics which has become both panoptical and cybernetic".

FACEBOOK, IDENTITY AND LACAN.
The question, then, is how one should understand my initial claim, that the use of social networking internet sites like Facebook has an impact on identity-or self-formation. And what is the connection between such identity-formation and the bleak picture, painted by Virilio, of the globalization of panopticism in a new guise, namely the visualization of what used to be social and political space, and its "virtual" consequences? Here I have to turn, once more, to Sherry Turkle, before framing my conclusion in Lacanian terms of the real, imaginary and the symbolic. In Simulation and its discontents (2009) (with its Freudian overtones), Turkle elaborates on the extent to which spaces of simulation – including cyberspace – have of late exercised an irresistible attraction for individuals like architects, with the result that the spatiotemporal world of concrete objects like buildings seems to be progressively devalued at the cost of the simulated realm.
Given their attachment to a less obviously mediated contact with the materials and objects of their fields of inquiry in architecture and physics, Turkle contrasts an older generation's skepticism about simulation and its promises with the younger generation's infatuation with simulation in all its guises. Many of the older generation viewed the computer as a tool which, despite some useful computing functions, would lead students and scientists alike away from reality, to their detriment. Today, by contrast, architecture students find it hard to imagine how skyscrapers could have been designed in the 1950s without the use of a computer and the appropriate design software. Her research has led her to the point where she issues a warning, however (Turkle, 2009: 7): "Immersed in simulation, we feel exhilarated by possibility. We speak of Bilbao [ probably a reference to Frank Gehry's Bilbao Guggenheim, sometimes called the most complex building ever designed, with the help of computer-simulation] , of emerging cancer therapies, of the simulations that may help us address global climate change. But immersed in simulation, we are also vulnerable. Sometimes it can be hard to remember all that lies beyond it, or even acknowledge that everything is not captured in it. An older generation fears that younger scientists, engineers, and designers are 'drunk with code'. A younger generation scrambles to capture their mentors' tacit knowledge of buildings, bodies, and bombs. From both sides of a generational divide, there is anxiety that in simulation, something important slips away."
Turkle rephrases the architect, Louis Kahn's famous question, "What does a brick want?" to read: "What does simulation want?" and answers that, at one level, it wants immersion, which is a prerequisite for actualising its full potential. The negative side of this is, as one can easily gather from the enthusiasm of students and practitioners of various stripes, that it is easy to be seduced by it, and difficult to take critical distance from it. As Turkle (2009: 7-8) observes: "Simulation makes itself easy to love and difficult to doubt. It translates the concrete materials of science, engineering, and design into compelling virtual objects that engage the body as well as the mind ... Over time, it has become clear that this 'remediation', the move from physical to virtual manipulation, opens new possibilities for research, learning, and design creativity. It has also become clear that it can tempt its users into a lack of fealty to the real ... The more powerful our tools become, the harder it is to imagine the world without them."
These reflections on the part of someone intimately familiar with the internet technology-mediated virtuality and visuality thematized by Virilio, seem to me to confirm that there is something irresistibly seductive about this mediated realm, of which Facebook is a part. One may wonder whether the massive participation in cyberactivities like those discussed above can really be of such consequence that Foucault's and Virilio's insights may gain a critical purchase on them in terms of a kind of selfformation which could conceivably have a disastrous impact on society (especially if you are a willing participant in the cyber-activities involving Facebook and/or various other MUDs like WoW). Jacques Lacan's work enables one to give a tentative answer to this question.
I referred earlier briefly to Lacan's theory of the human subject in terms of three interlocking registers or orders, namely the "real", the imaginary and the symbolic (Lee, 1990: cf 82; Olivier, 2004). To elaborate: still lacking a sense of self or ego, as well as language, the individual is at birth caught in the real, which she or he leaves behind, like a chrysalis, when they enter, first, the imaginary through the so-called "mirror stage", and subsequently the symbolic order through the acquisition of language. The imaginary order is one of alienation through "misrecognition" of the self in what amounts to a fiction, but also of particularistic ego-identification with one's own mirrorimage, which forms the basis of subsequent identifications with others and with the images of others. A person's "identity" is not synonymous with his or her subjectivity – in fact, "identity" does not sit well with Lacan's complex conception of the subject – but pertains largely to the imaginary register of the ego. The symbolic register, by contrast, is universalistic, in so far as it bestows upon the individual ego, through "universals" such as "human being", her or his character as a "subject" – that is, subject to the moral law conceptually embedded in language. (Without language, no ethics.) The symbolic is also the index of the social, in so far as it is the register of the "other", which is why Lacan (1977a) refers to the unconscious, which is said to be structured "like a language", as the "discourse of the Other". Although the "real" surpasses language and iconicity, and is surpassed through the subject's entry into language, it remains one of the registers along which the subject's subjectivity is articulated, and can, in various ways, affect the imaginary and the symbolic which, together, comprise what we call "reality". It does so through what Lacan (1981: 55) calls the "missed encounter" of trauma, for instance.
In light of this brief account of Lacan's conception of the subject, individuals who dwell in cyber-realms such as Facebook, MySpace or World of Warcraft, may be said to engage in the elaboration, largely, of their imaginary selves, which exacerbates alienation from their "true" selves – the subject of the unconscious (Lacan, 1977b: cf 166; 1981: cf 34) – depending on the degree of linguistic interaction, the symbolic aspect of their subjectivity. The latter may counteract such alienation, provided it is not anchored in the imaginary in such a way that its "talking cure" qualities are hamstrung from the outset. Because the symbolic is the register of social being (or being social), and because it is ineluctably "interrupted" by symptoms of unconscious desire, it always harbours the axiological potential to free oneself from the suffocating grip of the imaginary.10
In other words, there are more ways than one of using language, or rather, of "being in language", not all of them conducive to promoting the kind of subject that is capable of self-questioning and relative autonomy, both of which are functions of discourse, or the symbolic. Virilio (2005: 69-76) points in this direction where he argues that, concomitant with the expansion of the increasingly pervasive cyber-realm (as the new territory to be conquered), one witnesses the contraction of language. That we are increasingly inhabiting what I would label "the era of compliance" – a phenomenon that coincides with the retreat of (un-expurgated) language – is evident from Virilio's (2005: 69-70) observation, that current affairs reporters are being subjected to the distinction between what he calls "'soft' (politically correct) language" and "'hard' (visually incorrect) images": language can give offence to any number of listener-groups, but (uninterpreted) images of violence keep viewers glued to television screens. He (Virilio 2005: 70-71) also remarks on the prominence of international "supermodels" in the popular press, in the place of movie stars, ascribed by some to the fact that "they don't speak", and adds: "There is nothing enticing about our supermodels any more once they have been reduced to silence. Their bodies are not just denuded, but silently exposed ... to laboratory sufferings – from plastic surgery to testosterone ... if they are starting a fashion, it is not a fashion in clothing. The supermodels are already mutants ushering in an unprecedented event: the premature death of any living language ... The new electronic Babel might be said to be dying not from the plethora of languages, but from their disappearance".
Even if one allows for what might seem like an overstatement of the current state of affairs by Virilio, it must be granted, I believe, that the phenomenon in question is not a figment of his imagination. It is confirmed by Faludi's (1999) perspicacious insight into the "ornamental" culture of today, which leaves men and women politically impotent (and suits the economic and political status quo; hence also the culture of "compliance" reinforced through audits, compliance legislation and the like). What I want to argue here, is that there is a link between political correctness, compliance, the devaluation of language, on the one hand, and the progressive valorization of images, especially in cyberspace, including Facebook. To be sure, there is "text" on Facebook, too, but this takes a back seat to images.11 Consider Virilio's (2005: 72) observation, that: "Technological acceleration initially brought about a transference from writing to speech – from the letter and the book to the telephone and the radio. Today it is the spoken word which is logically withering away before the instantaneity of the real-time image. With the spread of illiteracy,12 the era of silent microphones and the mute telephone opens before us. The instruments will not remain unused on account of any technical failings, but for lack of sociability, because we shall shortly have nothing to say to each other, or really the time to say it – and, above all, we shall no longer know how to go about listening to or saying something, just as we already no longer know how to write ..."
The question therefore arises, if the visual image is becoming hegemonic, at the cost of spoken (and written) language, does it signify the unilateral dominance of Lacan's imaginary -the register of alienation – over the symbolic? Both Turkle (Colbert, 2011), who alludes to the detrimental effect of mobile phone use on our social skills, and Virilio (above), who talks about "lack of sociability" that accompanies the rise of the image, draw attention to this possibility.
In terms of Lacan's conception of the subject, this would mean that the imaginary register of the ego (and alter ego), which is also that of "identity" and alienation, would be in the process of subverting the inalienable social, communicational function of the symbolic, If this process were to become pervasive, it might well trigger the "social and political catastrophe" that Virilio (above) has warned about. There is hope in the fact that the third Lacanian register, that of the "real", is always there, however ineffable it may be. What I mean, is simply that, to the degree that something unexpected may, and sometimes does, happen to human beings, be it an unwelcome visitor, or a motor car accident, or some gigantic, collective trauma, like 9/11,13 or the recent tsunami in Japan, the "real" represents the originary source of "something", an "I know not what", which has the power to reconfigure our world completely. And this means reconfiguring our imaginary and symbolic horizons. If the present trajectory of virtual imagepreponderance in cyberspace were to develop to the point where inter-subjective communication were to be threatened to the point of breaking down, that would probably be of the magnitude of a collective trauma that would impact on our imaginary and symbolic horizon with such force that the symbolic would re-claim its place in human subjectivity. The way that "identity" is currently being configured in cyberspace, of which Facebook is a major part, may just be an indication that – given what has been uncovered in dialogue with Foucault, Turkle, Virilio and Lacan – such an event is not an impossibility.

CONCLUSION
I end this article with a quotation from Sherry Turkle, which serves as a reminder of the ambivalent status of the cyber-realm's capacity to enchant, seduce and simultaneously enslave its adherents. Alluding to Wim Wenders's film, Until the end of the world, where a scientist invents a device that transforms brain-activity into such alluring digital images that people are able to see their innermost dreams and fantasies in vivid iconic form,14 she says (Turkle, 1995: 268): "However, the story soon turns dark. The images seduce. They are richer and more compelling than the real life around them. Wenders's characters fall in love with their dreams, become addicted to them. People wander about with blankets over their heads the better to see the monitors from which they cannot bear to be parted. They are imprisoned by the screens, imprisoned by the keys to their past that the screens seem to hold ... We, too, are vulnerable to using our screens in these ways. People can get lost in virtual worlds ... Our experiences there are serious play."
What she observes here goes for social networking cyber-sites such as Facebook as well. They should be kept at arms' length. Lest we become imprisoned, or muted, by them, we should remind ourselves that, although the experiences they enable are not insignificant, they cannot be human social reality, with its indispensable symbolic sphere, in its entirety, and we allow ourselves to be assimilated by them at our peril. 

                           Cyber electronic warfare

  
Cyber electronic warfare (cyber EW) is a form of electronic warfare. Cyber EW is any military action involving the use of electromagnetic energy to control the domain characterized by the use of electronics and the electromagnetic spectrum to use exchange data via networked systems and associated physical infrastructures.
Cyber EW consists of the following three activities: cyber electronic attack (cyber EA), cyber electronic protection (cyber EP), and cyber electronic warfare support (cyber ES). These three activities are defined as follows:

Cyber electronic attack (cyber EA)
Is the use of electromagnetic energy to attack an adversary’s electronics or access to the electromagnetic spectrum with the intent of destroying an enemy’s ability to use data via networked systems and associated physical infrastructures.
Cyber electronic protection (cyber EP)
Is any means taken to protect electronics from any effects of friendly or enemy employment of cyber EW that destroys ability to use data via networked systems and associated physical infrastructures.
Cyber electronic warfare support (cyber ES)
Is any action to locate sources of electromagnetic energy from networked systems for the purpose of immediate threat recognition or conduct of future operations. 

Electronic warfare support

Electronic Warfare Support (ES) is a subdivision of EW involving actions taken by an operational commander or operator to detect, intercept, identify, locate, and/or localize sources of intended and unintended radiated electromagnetic (EM) energy. This is often referred to as simply reconnaissance, although today, more common terms are Intelligence, Surveillance and Reconnaissance (ISR) or Intelligence, Surveillance, Target Acquisition, and Reconnaissance (ISTAR). The purpose is to provide immediate recognition, prioritization, and targeting of threats to battlefield commanders.
Signals Intelligence (SIGINT), a discipline overlapping with ES, is the related process of analyzing and identifying intercepted transmissions from sources such as radio communication, mobile phonesradar or microwave communication. SIGINT is broken into three categories: Electronic Intelligence (ELINT), Communications Intelligence (COMINT), and Foreign Instrumentation Signals Intelligence FISINT. Analysis parameters measured in signals of these categories can include frequencybandwidthmodulation, and polarization.
The distinction between SIGINT and ES is determined by the controller of the collection assets, the information provided, and the intended purpose of the information. Electronic warfare support is conducted by assets under the operational control of a commander to provide tactical information, specifically threat prioritization, recognition, location, targeting, and avoidance. However, the same assets and resources that are tasked with ES can simultaneously collect information that meets the collection requirements for more strategic intelligence . 

   
                                    The Well  and deep Proxies on electronic circuit concept                                     

The MACH5 appliance is a proxy server that acts as an intermediary for requests from clients in a local network wanting to download or access information from origin content servers (OCS) on the Web. A client makes a request to an OCS, but the appliance, acting as a proxy server, processes the request. Content is placed in the cache to be provided to other users, and the proxy provides the file to the user who requested the content.
Proxy Concept
The MACH5 appliance contains a number of protocol-specific proxies for managing different types of traffic, as listed below.

Add Static Bypass Rules

bypass rule tells the MACH5 appliance to not process requests sent between specific clients and servers; this traffic will pass through the appliance without any processing. For example, you can create rules to bypass traffic between all clients and a specific server, between a client subnet and a server subnet, or a specific client IP address and all servers. You may find it necessary to create bypass rules for protocol-incompliant clients and/or servers, in order to avoid disruption in services. Bypass rules prevent the MACH5 appliance from enforcing any policy on requests between the specified client/server pairs and disables any caching of the corresponding responses. Because these rules bypass Blue Coat policy, use them sparingly and only for required situations.

  1. In Blue Coat Sky, click the Configure tab.
  2. Select  Acceleration > Static Bypass.
  3. Click Add new rule. A panel opens up for the rule definition.
  4. For Client IP, select one of the following:
    • AllBypasses traffic between any client and the Server IP specified in step 5 below.
    • Enter IP or subnetBypasses traffic between a client IP address or subnet and the Server IP specified in step 5 below. Enter the IP address (in IPv4 or IPv6 format) or specify a subnet in IP/CIDR format (for example, 157.54.128.0/21 or 2001:DB8:0:DC00::/54).
  5. For Server IP, select one of the following:
    • AllBypasses traffic between any server and the Client IP specified in step 4 above.
    • Enter IP or subnet—Bypasses traffic between a server IP address or subnet and the Client IP specified in step 4 above. Enter the IP address (in IPv4 or IPv6 format) or specify a subnet in IP/CIDR format.
  6. Click Done.
  7. Repeat steps 3-6 to create additional bypass rules.
  8. Click Commit all to save all of your bypass rules. 

Add Restricted Intercept Rules

When creating a custom service, you can define which client and server pairs have their traffic intercepted for a particular protocol. When creating a restricted intercept rule, on the other hand, you define which client/server pairs have their traffic intercepted for all services set to intercept; the rule applies to all intercepted services. For example, you can create rules to intercept traffic between all clients and a specific server, between a client subnet and a server subnet, or a specific client IP address and all servers.
Restricted intercept rules are useful in a rollout, prior to full production, where you only want to intercept a subset of the clients (or servers). After you are in full production mode, you can disable restricted intercept. It's also useful when troubleshooting an issue, because you can reduce the set of systems that are intercepted. If restricted intercept is enabled, only the traffic specified in these rules will be intercepted. All other traffic will be bypassed.
  1. In Blue Coat Sky, click the Configure tab.
  2. Select Acceleration > Restricted Intercept.
  3. Click Add new rule. A panel opens up for the rule definition.
  4. For Client IP, select one of the following:
    • AllIntercepts traffic between any client and the Server IP specified in step 5 below.
    • Enter IP or subnetIntercepts traffic between a client IP address or subnet and the Server IP specified in step 5 below. Enter the IP address (in IPv4 or IPv6 format) or specify a subnet in IP/CIDR format (for example, 157.54.128.0/21 or 2001:DB8:0:DC00::/54). 
  5. For Server IP, select one of the following:
    • AllIntercepts traffic between any server and the Client IP specified in step 4 above.
    • Enter IP or subnetIntercepts traffic between a server IP address or subnet and the Client IP specified in step 4 above. Enter the IP address (in IPv4 or IPv6 format) or specify a subnet in IP/CIDR format.
  6. Click Done.
  7. Repeat steps 3-6 to create additional rules to restrict interception.
  8. Set Restricted Intercept to Enable.
  9. Click Commit all to save your intercept rules and settings.
Restricted intercept rules are ignored unless the Enable setting is selected. If your rules don't seem to be working, double-check this setting and make sure you have saved it (Commit all).
Use the Edit  icon to modify an intercept rule after it has been saved.
Use the Delete  icon to delete an intercept rule.
Use the Disable setting to ignore the intercept rules without deleting them. 

What is the DNS Proxy?

The Domain Name Service (DNS) proxy performs a lookup of the DNS cache on the MACH5 appliance to determine if requests can be answered locally. If yes, the MACH5 responds to the DNS request. If not, the DNS proxy forwards the request to the DNS server list configured on the MACH5appliance.
To use the DNS proxy, the DNS service must be set to intercept on the Branch peers.
After the proxy identifies DNS traffic, the appliance uses the following techniques to control these connections:
  • Object caching
  • Protocol optimization 

What is Encrypted MAPI?

Blue Coat's encrypted MAPI solution provides the ability to transparently accelerate encrypted MAPI traffic between the Outlook client and the Exchange server. The ability to decrypt and encrypt MAPI is transparent to the user, with no knowledge of the user's password.
This feature assumes your acceleration network is set up as follows.
The encrypted MAPI acceleration feature expects the Outlook client to use the Simple and Protected Negotiation (SPNEGO) security protocol, and as a result the proxy will negotiate NTLM protocol on the client side and Kerberos on the server side. SPNEGO is used when a client application wants to authenticate to a remote server, but neither end is sure what authentication protocols the other supports. 

What is the FTP Proxy?

The FTP proxy allows the MACH5 appliance to control FTP traffic. When an FTP client uploads or downloads files to/from an origin content server (OCS), the proxy identifies the traffic as FTP, allowing the appliance to control file transfers using the following techniques:
  • TCP optimization — On high-latency networks or networks experiencing packet loss, the appliance is able to optimize FTP traffic, resulting in faster file transfers.
  • Caching — When files have previously been requested on the network, the appliance can retrieve the files from its cache, without contacting the FTP server. Serving FTP content from the cache significantly reduces upstream bandwidth usage and cost and significantly increases performance.

What is the HTTP Proxy?

The HTTP proxy controls the delivery of Web traffic on your network. After the proxy identifies HTTP traffic, the appliance uses the following techniques to control these connections:
  • Object caching
  • Byte caching
  • Compression
  • TCP optimization
  • Protocol optimization
Together, these techniques minimize latency and improve response times for Web page requests.

What are the Outlook Email Proxies?

The MACH5 appliance has two proxies that work together to accelerate Microsoft Outlook email traffic: Endpoint Mapper and MAPI.

What is the SSL Proxy?

The SSL proxy controls HTTPS and other SSL traffic so that security measures and performance enhancements can be applied to secure web content. With the appropriate configuration, the SSL proxy will:
  • hand off HTTPS traffic to the HTTP proxy for protocol optimization and other acceleration techniques.
  • hand off traffic from intercepted SSL-based services to the STunnel proxy which will accelerate the traffic with compression and byte caching (but no protocol optimization).
  • tunnel other types of SSL traffic for which an intercepted service is not configured; this traffic will not be accelerated
One of the functions of the SSL proxy is to emulate server certificates; that is, present a certificate that appears to come from the origin content server (OCS). The MACH5 appliance emulates the certificate and signs it using the issuer keyring. The keyring includes the public and private key pair for encrypted communication, as well as the certificate that is signed by an authority that the browser trusts.
STunnel supports SSLv2, SSLv3, TLS 1.0, TLS1.1, and TLS 1.2.

Requirements

The SSL proxy in an application delivery network requires the following configuration:
  • The Branch and Concentrator peers must have SSL licenses installed.
  • Secure ADN must be enabled and configured on all ADN nodes.
  • The Branch peer needs to specify how it proves to the browser that it's a trusted authority; this is done by specifying a keyring. In addition, you need to specify a server CA Certificate List (CCL) that provides the list of CA certificates the Branch peer should trust. .
  • On the Branch peers, proxy services must be configured to intercept HTTPS and other SSL-based traffic.
  • On the Branch peers, policy must be configured to intercept SSL using the STunnel proxy; protocol detection must be enabled in the policy as well.

What are the Streaming Media Proxies?

The streaming media proxies identify various types of streaming video and audio traffic that use real-time streaming protocol (RTSP), real-time messaging protocol (RTMP), or HTTP as transport. This allows the MACH5 appliance to filter, monitor, or limit streaming media traffic on your network. The streaming proxies use several optimization techniques to improve the quality of the streaming media.
Because video, audio, and other streaming media use a considerable amount of bandwidth—much more than Web traffic—you will probably want to use the streaming proxies to control this type of traffic. Without the proxy on a congested network, users are likely to experience problems such as jagged video, patchy audio, and unsynchronized video and audio as packets are dropped or arrive late. By using the proxy, you can save bandwidth, increase quality of service, and reduce pauses and buffering during playback.
The MACH5 appliance uses the following techniques to control streaming delivery:
  • Caching — The appliance stores frequently requested media content in its cache and distributes it upon client requests. Because the appliance is closer to the client than the origin media server, the data is served locally at nearly LAN speed.
  • Live splitting — The appliance supports the splitting of a live stream to multiple local users.
  • TCP optimization — On high-latency networks or networks experiencing packet loss, the appliance is able to optimize streaming traffic by reducing stutter and static.
  • Bandwidth limits — The appliance includes options for limiting the amount of streaming media traffic on your network.

Streaming Media Support

The MACH5 appliance offers five proxies for streaming media: Flash, MS Smooth, Windows Media, QuickTime,and Real Media. The following streaming media clients are supported:
  • Adobe Flash Player — The appliance can fetch a live Flash stream once from the OCS and serve it to all users behind the appliance. In addition, the appliance caches content as Flash clients stream pre-recorded content from the OCS through the MACH5 appliance. The Flash proxy is able to accelerate unencrypted connections that use the RTMP (Real Time Messaging Protocol) or RTMPT (RTMP tunneled over HTTP) protocol as well an encrypted connections that use the RTMPE (RTMP encrypted) or RTMPTE (RTMP encrypted, tunneled over HTTP) protocol. Note that the Flash streaming proxy does not support bandwidth limits or bandwidth management for any RTMP-based protocol, such as RTMP, RTMPT, RTMPE, or RTMPTE.
  • MS Smooth Streaming — The MACH5 appliance caches on-demand Smooth Streaming video content delivered over HTTP. Silverlight is the typical player used for Smooth Streaming and is available as a plug-in for web browsers running under Microsoft Windows and Mac OS X.
  • Adobe HTTP Dynamic Streaming — The MACH5 appliance caches Adobe HDS on-demand and live adaptive bit-rate video delivery of MP4 media over HTTP.
  • Apple HTTP Live Streaming — The MACH5 appliance caches Apple HLS on-demand and live video content delivered over HTTP. This protocol was developed for iOS and Apple TV devices.
  • Microsoft Windows Media Player — The appliance caches Windows Media-encoded video and audio files. The standard extensions for these file types are .wmv, .wma, and .asf.
  • Real Networks Real Media Player — The appliance caches Real Media-encoded files, such as RealVideo and RealAudio. The standard extensions for these file types are .ra, .rm, and .rmvb. Other content served from a Real Media server through RTSP is also supported, but it is not cached; this content is served in pass-through mode only. (Pass-through mode offers TCP optimization but does not support caching.)
  • Apple QuickTime Player — The appliance does not cache QuickTime content (.mov files). All QuickTime content is served in pass-through mode only.
Streaming media can be delivered in a real-time live media stream or a previously-recorded on-demand media stream. The MACH5 appliance supports both types of streaming media.
The streaming proxies function when the RTMP, RTSP, and HTTP proxy services are being intercepted. 

Control Streaming Media Traffic

Without controls, streaming media can easily cause congestion on your network and disrupt mission-critical traffic.
This solution does not apply to Flash streaming or protocols that stream over HTTP. For an alternate solution for HTTP, see Limit Bandwidth for Protocols that Stream over HTTP below.
  1. To control streaming media traffic, the appliance must be configured to intercept the following services: 
    RTSP and MMS
    See Intercept a Service; make sure the applicable streaming services are set to intercept.
  2. Decide how much of your WAN bandwidth you are willing to set aside for streaming media traffic; this number (in kilobits per second) is the gateway bandwidth limit. Show example...Closed Closed
    If you want to block all streaming media traffic, you can specify a gateway bandwidth limit of 0.
  3. Using the value determined in step 2, specify the gateway bandwidth limit for connections to streaming servers. See Limit Bandwidth of Streaming Media.
  4. To see how much bandwidth the streaming-based services are using, you can look at Traffic History utilization graphs. See Monitor Bandwidth Utilization. and select the service you are interested in: RTSP or MMS.
  5. When the appliance is caching video and audio files and optimizing the delivery of streaming media, you will see an increase in bandwidth savings for the streaming proxies. See Analyze Bandwidth Savings and select the proxy you are interested in: Windows Media, Real Media, or QuickTime. 


Improve Quality of Streaming Media

The MACH5 appliance's streaming proxies are able to improve the quality of streaming media, reducing artifacts such as frozen playback and dropped frames.
  1. To control streaming media traffic, the appliance must be configured to intercept the following services:
    RTMP (for Flash)
    Explicit HTTP and External HTTP (for Microsoft Smooth Streaming, Apple HLS, Adobe HDS)
    RTSP and MMS (for Windows Media, Real Media, and QuickTime)
    See Intercept a Service; make sure the applicable services are set to intercept.
  2. Verify player-specific settings and adjust if necessary. Make sure the HTTP handoff is enabled.
  3. To monitor streaming media traffic on your network:
    • Display the Traffic Summary report, select the Proxy view, and look at the table underneath the graphs.  Locate the streaming proxy you are interested in (such as Flash or Windows Media) and observe the amount of WAN and LAN traffic.
      Note: By default, the top 10 proxies are listed in the table; if the proxy of interest isn't displayed, click the View alllink.
    • Display current connections and filter the list for the streaming proxy you are interested in (Adobe HDS, Apple HLS, Flash, MS Smooth, Windows Media, Real Media, or QuickTime). See List Active Sessions.
  4. Although not a scientific measurement, talk to users to find out anecdotal information about the quality of streaming traffic after deploying the MACH5 appliance.


What is the ISATAP Proxy?


                            Hasil gambar untuk electronics circuit of proxy server
                          Gambar terkait
                          Gambar terkait

                         Gambar terkait
                   Gambar terkait
                           Gambar terkait
                        Gambar terkait

                   Hasil gambar untuk electronics circuit of proxy server

                             Application Delivery control of Proxy and Fire well 





                               XO___++XO DW on --- off real life in electronic

                                 Hasil gambar untuk on off real life in electronic
                                      SPST circuit example and real-life example

                      Hasil gambar untuk on off real life in electronic
 Battery Backup in which basic function of a diode comes handy acting as a switch(ON when forward biased                                                                                               otherwise off )                                                                       


     Gambar terkait

Timer circuit diagrams, designs and schematics for timing based applications. Design of timer elements using                                                                digital IC chips and other components in it                                                        
     
                          Hasil gambar untuk on off real life in electronic
                                          Gambar terkait

                                    Hasil gambar untuk on off real life in electronic

                                Hasil gambar untuk electronics sensors of proxy

                                                      Gambar terkait 
                               Gambar terkait

                                Hasil gambar untuk electronics sensors of proxy  
                                                            Sensors IPV6 Proxy      

                               Gambar terkait           
                                  Gambar terkait

                             
                                      Hasil gambar untuk electronics sensors of proxy
                                           Gambar terkait
                     
                                  Gambar terkait



                                  Gambar terkait
                                                      Gambar terkait

                                 Gambar terkait

                                       Capacitive Proximity Sensor Circuit Diagram Block Of A Generic Electric Potential
                     

Capacitive Proximity Sensor Circuit Diagram Rapid Prototyping Figure Block With Equivalent Resistance Of

Capacitive Proximity Sensor Circuit Diagram Planet Analog Articles Designers Guide To Rapid Prototyping Figure Block With Equivalent Resistance Of
Capacitive Proximity Sensor Circuit Diagram Of Clap Operated Remote Fan Switch

   

Capacitive Proximity Sensor Circuit Diagram Of Clap Operated Remote Fan Switch

               
                        Capacitive Proximity Sensor Circuit Diagram Figure 5
                                  Capacitive Proximity Sensor Circuit Diagram

             

Capacitive Proximity Sensor Circuit Diagram Single Dual Wiring

Capacitive Proximity Sensor Circuit Diagram Single Dual Wiring  
                                         Capacitive Proximity Sensor Circuit Diagram

                          Capacitive Proximity Sensor Circuit Diagram Water Level Indicator Using

                            Capacitive Proximity Sensor Circuit Diagram Water Level Indicator Using


                         Hasil gambar untuk electronics sensors of proxy

            How to make a Light Sensor / Darkness detector circuit on breadboard using LDR and a transistor. This circuit can be used to automatically control and turn on-off lights or any loads depending on the brightness of ambient light, by adding a relay at the output. The sensitivity a.k.a the brightness at which the circuit switches on the load can also be controlled by using a potentiometer. 

Components Required:

  1. 1 LDR (Light Dependent Resistor or Photo-resistor) 
  2. 1 npn Transistor (I used BC547)
  3. Resistors: 470R, 1K (For Light Sensor), 47K (For Dark Sensor)
  4. Potentiometer (Only if you need adjustable sensitivity): 10K (For Light Sensor), 100K (For Dark Sensor)
  5. Breadboard
  6. Power Supply: (3-12)V
  7. Few Breadboard connectors

Explanation of Circuit's Working:


The sensing component in this circuit is LDR (short form for Light Dependent Resistor or Photo-Resistor). The resistance of LDR depends on the intensity or brightness of light incident on it and the relation is of inverse proportionality. Which means that when the intensity of light increases, the LDR's resistance reduces and vice versa.
You can visually observe this effect by connecting the LDR in series with an LED and power up the circuit. Now if you reduce the brightness of ambient light, the LDR's resistance increases, resulting in lesser current flowing through the circuit (remember: more the resistance, less the current) and so you will observe that the LED's brightness reduces. Exactly the opposite happens when you increase the brightness of ambient light.
Although this LDR and LED in series circuit is the easiest to make, it has some limitations. Some of them are: you can't control the brightness at which the LED exactly turns on or off. Also, practically we would want the LED to turn on when it is dark and turn off when there's enough light. The maximum load that the circuit can drive is also limited. So for these reasons, we move on to more functional circuit using transistor.

Some transistor basics: For an npn-transistor, the emitter, collector are of n-junction and the base is of p-junction. For the transistor to turn on or to allow current to flow from collector to emitter, the voltage at the base should be above a certain threshold voltage.
We used a resistor in series with the LDR (basically a voltage divider) to convert the change in resistance of the LDR to change in voltage. This change in voltage at the common point between LDR and resistor is used the trigger the transistor by connecting it to base of the transistor.
In the Light Sensor Circuit (first diagram) when the brightness of light increases, the LDR's resistance reduces and so the voltage at the base of transistor increases (because if LDR resistance reduces, the voltage drop(gap) across the LDR, towards positive side decreases). Once this voltage increases above the required threshold voltage at the base, the LED turns on. You can now visualize what happens when you reduce the brightness of ambient light.
In the Dark Sensor Circuit (second diagram) when the LDR's resistance decreases when the intensity of light increases. So the voltage at the base of transistor increases when the brightness of light decreases, and once it gets past the minimum threshold voltage required at the base of transistor, it turns on the LED.

Circuit Diagram:

Light Sensor using LDR and Transistor circuit diagram
Darkness Sensor/Detector using LDR and Transistor circuit diagram



      
                           



                       XO___+XO  DW  

Hasil gambar untuk electronic time circuit series backwards


1. The Reverse Delay Effect.

The concept behind reverse delay device is simple: The input signal is passed through a memory buffer, where it is delayed for a short time and then sent reversed to the output.
Mixing the reverse delayed sound with the original signal, the pedal produces a single repeat following the original sound, but feedbacking a percentage of the delayed signal back to the input produces a repeating echo effect, where each subsequent echo is a little quieter than the previous one. 
If the feedback gain is more than unity, the echoes will build up in level rather than decaying, resulting in an uncontrollable psychedelic howl.
Back Talk Reverse Delay Signal DiagramTo illustrate the operation, a sawtooth signal is used as a guitar input signal.
  1. Original sawtooth input wave.
  2. In the beginning of the process, the wave is chopped according to the pedal knobs.
  3. Each of these pieces are reversed and delayed. 
  4. At last, the original blue wave (2) and the reverse delayed green one (3) are blended creating the sound effect.
Back Talk Reverse Delay Signal

1.1 Reverse Delay Back Talk Control Knobs.

The pedal is commanded by 3 knobs: Mix, Speed, and Repetitions which will adjust the effect sound features:
  • Mix: Controls the blend between the original dry signal and the wet processed signal, giving more presence to the genuine input wave or to the effected sound.
  • Repetitions: Sets the number of times that the sampled delayed signal will be repeated over the original signal, creating an echo effect and controlling its depth. 
  • Speed: Adjusts the sample delay window, in other words, the amount of time that the signal is delayed and the duration of the delay. To illustrate this factor, in the below figure the reverse delay effect is applied over two sawtooth signals with a different speed/delay window:
     Back Talk Reverse Delay Speed Knob
 2. Back Talk Reverse Delay Circuit.
The circuit is implemented in two PCBs: the Analog PCB and the Digital PCB, linked by a 7-pin connector. 
The input signal enters into the pedal through the Analog PCB, being buffered and prepared to the digital signal processing in the Digital PCB. After the digital effect is added by the Digital PCB, the signal is sent back to the Analog PCB to be buffered again and be prepared to the output.Back Delay Reverse Delay Exploded View

2.1 The Analog PCB Circuit.

The small input/output buffer board is a single layer PCB which contains 3 stages: the Voltage Bias, the Input Buffer, and the Output Buffer. 
Back Talk Reverse Delay Analog PCBThe circuit is based on the famous 4558 dual op-amp IC, one half of it will be used as Input Buffer and the other half as an Output Buffer. The 7-pin connector will send and receive signals between this PCB and the Digital Board.Back Talk Reverse Delay Analog Board Circuit

2.1.1 Voltage Bias Block.

The Voltage Bias Block provides the voltage levels to the 4558 dual op-amp and electrical protection against reverse polarity supply.Back Talk Reverse Delay Voltage Bias
  • The resistor divider (R114, R115) generates +2.4 volts from +4.8V. The +2.4V resistors junction is decoupled to ground with a large value electrolytic capacitor C907 (100uF) to remove all ripple from the supply voltage. 
  • The diode D101 protects the pedal against reverse polarity connections.
  • The stereo in jack is used as an on-off switch, switching the battery (-) terminal to ground when the guitar jack is connected.

2.1.2 Input Buffer Stage.

The Input Buffer grants high input impedance, frequency filtering and voltage gain, keeping signal integrity and preparing it to be digitalized.
Back Talk Reverse Delay Input Buffer
Not considering for the moment the caps C3 and C4, the non-inverting amplifier gain can be calculated as:
The capacitors C3 and C4 create a pass-band filter (low pass + high pass) where:
  • Low pass = R6C3 network with fc=1/(2Ï€R6C3
  • High pass = R7C4 network with fc=1/(2Ï€R7C4)
This pass-band filter is similar to the non-inverting amp in the Tube Screamer. It will add a subte honky tone but besides this small tone modification, it is important for digital effects to eliminate the excess of bass and treble due to the bandwidth limitation in the analog to digital conversion stage.
  • The network C5 R8 R10 and the input impedance of the 4558 (Zin=50MΩ) also creates a high pass filter to remove the DC component from the input line.
  • The resistor R9 next to the input jack to ground is a pull-down resistor which avoids popping sounds when the pedal is switched on. The input pull-down resistor becomes the maximum input impedance of the pedal.

2.1.3 Output Buffer Stage.

The Output Buffer procures low output impedance, filtering and some voltage Gain, keeping signal integrity and preparing it to the output.
Back Talk Reverse Delay Output Buffer
The op amp is in inverting configuration, C6 will smooth high harsh harmonics and C8 is a bass cut filter, muting the excess of bass to be delivered to the next stage.

2.2 The Digital PCB Circuit.
The 2-layers PCB can be broken down into simpler blocks: Power Supply stage, Potentiometers & Footswitch ADC block, Audio Codec and Memory Management.
Back Talk Reverse Delay Digital PCB
The circuit is based in the 8-bit Atmel microcontroller AT1200S which manages few peripherals. The input signal coming from the Analog Board is primarily digitalized by the PCM3500E Audio Codec and the resulting data is processed by the Micro using the RAM memory to generate the reverse delay effect. Finally, the digital signal is translated back to analog levels using again the PCM3500E Codec. Two linear voltage regulators will grant 5.0 and 3.6 of voltage supply for the parts.Back Talk Reverse Delay Digital Board Circuit

2.2.1 Power Supply Stage.

The Power Supply Stage is made up of two Holtek voltage regulators, they will provide voltage supply to all stages in the pedal. 
Back Talk Reverse Delay Power Supply
  • The IC5 HT7550 is a three-terminal 5V@100mA low dropout CMOS linear voltage regulator, supplying 5.0 volts.
  • The 9V battery primary voltage source and the 5.0V output are decoupled to ground with several capacitors C9, C8C29 (4.7uF elec.)C30 (4.7uF elec.) and C5 (100uF elec) to remove all ripple from supply voltage.
  • The R14C41 network generates +4.8V Slow supply, which is used only by the 4558 Dual Op-Amp and the HC4066 Analog Switch, grants a smooth supply ramp due capacitor C41 charge/discharge time:
Time Charge/Discharge = 5*R14*C41 = 5*100Ω*10uF = 5ms
  •  The IC4 HT7136 is a three-terminal 3.6V@30mA low dropout CMOS linear voltage regulator, supplying 3.6 volts only to the Audio Codec.
  • The 9V battery primary voltage source and the 3.6V output are decoupled to ground with several capacitors C7, C10, and C6 (100uF elec.) to remove all ripple from supply voltage.

2.2.2 Power On Reset Circuit.

It is important to keep under control the system at start-up estate. Otherwise, the microcontroller may initially operate in an unpredictable fashion.Back Talk Reverse Delay Power On Reset
The Power-On-Reset circuit asserts a reset signal whenever Vcc supply falls below a reset threshold. The reset time-out period can be adjusted using C42. Reset remains asserted for an interval programmed by C42, after Vcc has risen obove the threshold voltage.

2.2.3 Potentiometers & Footswitch ADC Block.

The VR3 Mix, VR1 Speed, VR2 Repetitions 3K3 potentiometers and the pedal footswitch SW1 are read by the microcontroler through an Analog to Digital Converter IC7 TLC0834C.Back Talk Reverse Delay ADC
The microcontroler does not have enough embedded ADCs to read all the analog levels from the potentiometers and the footswitch, so as to do it and save the maximum resources, the Texas Instruments TLC0834C ADC is used. The result of these measures are sent in a single serial line to the microcontroller to be processed.
  • D-Latches from IC10 HC373 multiplex the port B of the micro, keeping these lines accessible for other purposes at the same time.

2.2.4 Audio Codec.

The Audio Codec is a single chip that encodes the guitar analog input as a digital serial signal to be taken by the microcontroller. It also decodes the processed digital signals from the microcontroller back into analog. So, the Codec contains both an Analog-to-digital converter (ADC) and Digital-to-analog converter (DAC) running off the same clock at 11.286 MHz.Back Talk Reverse Delay Audio Codec
The PCM3500E by Burr-Brown contains 16-bit Delta Sigma ADC and DAC, with a sampling frequency of 22.05KHz (11.286/512). The chip also includes anti-aliasing filter, digital high-pass filter for DC blocking, and output low-pass filter to enhance performance.
The dry input signal is encoded or digitalized by the ADC block of the PCM3500 and sent in serial mode to the micro. The microcontroller manage and modify the digitalized signal adding the back delay effect and finally the wet signal is translated back to analog using the DAC block of the PCM3500.
  • Using the Analog Switch HC4066 commanded by the microcontroller, the input signal can skip all the digital signal processing and go straight to the output when the pedal is in off/bypass mode.
  • The Power on diode D1 is turned on when the push footswitch is pressed, showing whether the effect is active or not.

2.3 Memory Management.

All delay based pedals need some mechanism to store the audio in order to play it later as a delayed version. This method can be magnetic tape in old pure analog effects, capacitors in bucket brigade delay devices or just RAM memory in pure digital pedals.
The two ISS ram chips supply 8-bits of 32K memory each one, these parts can be associated as 32K of 16-bits memory. The Audio Codec works at 16-bits with a sampling period of 22.05KHz, with this speed, the memory system is able to store 32K/22.05KHz = 1.45 seconds of delay.  
In the Back Talk pedal, the main bottleneck in the hardware design is the way to manage two 28 pined memory chips with a limited free lines. To do so, 16 d-type latches are needed to extend the number of available lines multiplexing the port B of the micro.Back Talk Reverse Delay Memory Management
The Microcontroler receives the digitalized guitar signal from the PCM3500 Audio Codec in serial mode. Then, the data serial string is processed and sent in parallel to the RAM memory through the HC373 D-latches; the IC9 D-Latch is used to drive the address lines and the IC8 manage the memory I/O lines.
Depending on the user potentiometers (mix, speed, repetitions) the micro will apply different adjustments in the feedback, deep of memory buffer and mixing algorithm.
  • The HC137 3-to-8 Line Decoder is in charge of enable the latches and also address the memory extending the number of available lines. The diodes D3, D4, D5 and D6 are used to adjust levels between parts.
  • The IC12 HC368 Hex inverting buffers adapt the levels to negative logic to engage ICs.

3. Back Talk Reverse Delay Clon.

After understanding the circuit and Danelectro approach for this pedal, it can be concluded that the reverse engineering clone is pretty discouraging. Despite the relatively complex PCB layout and all surface montage devices, some of then obsoletes, the git of the pedal remains in the source code of the microcontroller which is not available.
The hardware design indicates that the program code must be complex as well; the serial data encryption and decryption for the Audio Codec and the ADC, the 24 latches, 2 memories and decoder management for real time signal processing is not trivial.
Anyway, is a good learning exercise to see how the big ones design DSP pedals, so you can for sure gain some ideas for you own designs, good luck!

4. Resources.

4.1 Back Talk Reverse Delay Datasheets.



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                        e- The retreat of time for e- DIREW on Cyberspace clock countdown 
                                           Gambar terkait 
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++










Rabu, 26 September 2018

e- PRM ( Power Request management ) in electronic device for e- SWITCH ( Short Wave Interaction To Couple Highway ) and then For block of energy locking diagram in control electronics AMNIMARJESLOW GOVERNMENT 91220017 XI XAM PIN PING HUNG CHOP 02096010014 LJBUSAF e- PRM until e- SWITCH electronics automatic ___ Thankyume on Lord Jesus Blessing predicate ___ PIT Management Power and JESS Original Switch electronics ___ Gen. Mac Tech Zone Power Request Management switch electronics device






           Hasil gambar untuk usa flag power resonance  Gambar terkait Gambar terkait


                                             Hasil gambar untuk Auto-discharge Function

                                               Development Battery Management System 




           

                                   Energy Harvesting & Storage



Ambient light, thermal gradients, vibration/motion or electromagnetic radiation can be harvested to power electronic devices. EnerChips enable high-efficiency Energy Harvesting (EH) designs that convert the relatively low levels of energy into an amount that can provide the power for an electronic system. The diagram below shows the major components of an autonomous wireless sensor which are the EH transducer, Energy Processing, Sensor, Microcontroller and the Wireless Radio. There are 3 key areas in the Energy Processing stage that must be addressed for successful EH implementations: Energy Conversion, Energy Storage, and Power Management.
Cymbet Energy Harvesting Diagram

Energy Harvesting Hybrid for Battery Extension

There are cases where there is not enough ambient energy to power a device and a larger battery must be used. However, energy harvesting can be used to significantly extend the life of the battery. Cymbet EH solutions (especially solar) can be combined with primary or rechargeable batteries to extend their life. 

system must be capable of capturing, converting, storing and delivering energy in a form that can be used to provide the power needed by the system it serves. A typical Energy Harvesting system starts with an energy collector or transducer device and depends on the type of energy one is trying to convert. These are typically solar or photovoltaic cells for light energy, piezoelectric for pressure, kinetic for movement, inductive for rotational or motion, thermoelectric for heat or temperature differential, and electromagnetic.
The energy collected from these transducers must be converted to a form that can be stored for later use. In remote sensor systems or portable device applications that use Energy Harvesting a small rechargeable battery or storage capacitor is often employed to store the collected energy the system needs for operation. The drawbacks to each of these storage methods are numerous in that even rechargeable batteries wear out after a few hundred charge/discharge cycles and need to be replaced and super caps while they eventually change their characteristics, will self discharge rapidly, as much as 20% per day, causing much of the converted energy to be wasted. A more robust and permanent solution is to use an EnerChip solid state battery as the energy storage element in the system to eliminate the need for replacement since it can support in excess of 5000 cycles and has a minimal self-discharge of less than 3% per month.
The final stage of the system conditions to stored energy to suit the requirements of the system. This could be as simple as a regulator and level shifter to a complex power control circuit that intelligently manages the power distribution to the system based on power needs and system operation.

Calculating Power Requirements

In order to power systems using ambient energy harvesting, several factors must taken into consideration to calculate the power required to operate the system in various states:
1 - Identify the sources of ambient energy to be used and the type of Energy Harvesting transducer to be used
2 - Characterize the power output of the EH transducer over various ambient conditions
3 - Looking at all the system components, calculate the power required for all states operation (e.g. sleep, sensing, wireless)
4 - Identify the EH conversion and power management electronics to be used and add the power used to the overall total.
5 - Size the energy storage device (solid state battery) to cover all the system energy storage and power delivery requirements.
Image of energy harvesting transducers.

Energy Transactions

The definition of an energy transaction is "the amount of discrete energy required to perform a certain task or functional transaction". This concept of energy transaction is very useful in the design of energy harvesting-based systems. In order to calculate the power budget and power boundary conditions for an EH-based system, all operating and quiescent power states of the system must identified. Each of these states requires an energy transaction level to function. Identifying all the various energy transactions will determine the sizing of the Energy Harvesting transducer and the energy storage devices.

Image of maximum peak power tracking.

Maximum Peak Power Tracking

To optimize the performance of energy harvesting based systems, it is critical the high efficiency energy conversion technique of maximum peak power tracking (MPPT) be used. MPPT can adapt to either constant impedance or variable impedance EH transducers. MPPT is used to match the impedance between the energy harvesting transducer and the system load as seen in the diagrams below. The EnerChip EP Energy Processor CBC915 implements an optimized version of MPPT.
Image of maximum peak power tracking.

Design Tips

When building energy harvesting based systems the following 10 Tips and Techniques will help improve system performance:
1 - Optimize for low average power in the system.
2 - Firmware efficiency is key; no loops, etc.
3 -Use hardware timers and interrupts. Isolate loads; all loads should be switchable.
4 - Watch power leaks via back-feeding other devices.
5 - Net power is a tradeoff between dynamic and static power. Quick processing with high power may be better than slow processing with low power.
6 - Usually better to process data and send result vs. sending data for processing elsewhere.
7 - Wireless protocols and topology must be minimized.
8 - Power up sequencing – must understand implications of when to power each device along with other devices.
9 - Every MCU vendor provides hints and tricks to minimize power.
10 - Use Energy Processing devices that provide status indications so informed power management choices can be made.


                        Gambar terkait

          Gambar terkait 

                          Gambar terkait 


                                   Affordable energy storage is key

As climate change garners more attention around the world, have made critical advances in understanding the physical properties of an emerging class of solar cells that have the potential to dramatically lower the cost of solar energy.

Solar cells remain a focal point of scientific investigation because the sun offers the most abundant source of energy on earth. 

The concern, however, with conventional solar cells made from silicon is their cost. Even with recent improvements, they still require a significant amount of electricity and industrial processing to be manufactured.

we need to be able to scale up this process while maintaining or even improving the efficiency of the solar cell. To do that, we need to understand how this material crystallizes and grows from solution into a thin film." 

By adding different chemicals to the solution, they were able to control how fast the MHP crystals formed and what direction they grew on a surface. The specific orientation of the MHP crystals on a surface affected how well a solar cell performed . 

"MHP solar cells can be used in flexible, lightweight materials," Choi said. The ultimate goal would be to make manufacturing MHP solar cells as easy as printing newspapers, generating rolls of thin solar cell material that could be easily applied to houses, cars, or anywhere else they were needed.

One significant drawback with many current MHP solar cells is that they contain lead. Researchers are working on identifying viable alternative compositions that are not toxic. 

Elsewhere, MHPs have already been used in lasers, photo detectors, transistors and light emitting diodes (LEDs).

Still, it is the solar cell that arguably offers MHPs the best chance to address pressing global problems.

"To mitigate the impact of climate change and also to ensure the energy security . 

it is very important to come up with renewable energy sources rather than just be relying on fossil fuel-based energy," 




                                         XO____XO   Electronic Smart Lock

Electronic smart locks are growing as a result of IoT. These battery-powered locks often require features such as BLE, Sub-1 GHz, Wi-Fi connectivity, interactive RGBW HMI, audio and sensing etc.  

Electronic smart lock designs require:
  • Energy efficiency and long battery life with a wide operating temperature range
  • Secure management of keys and access control
  • Low power HMI like RGBW LEDs, touch, proximity sensing and audio notification
  • Support of multiple industry standards like ZigBee®, 6LoWPAN, and ZigBee RF4CE remote control applications
  • Configurable BLE advertisement intervals to reduce power consumption

Electronic door locks are primarily battery powered. High-efficiency buck converters provide the voltage rails needed by the system components and maximize battery life. Boost converters provide higher voltage rails to operate motors and sourcing LED arrays. Linear regulators can also be used to reduce BOM cost at the expense of battery life.


                        Hasil gambar untuk Electronic components automatically absorb dc energy


                                    Gambar terkait 
                             A charging management-based intelligent control


                            Hasil gambar untuk Electronic components automatically absorb dc energy 
                                                         Power Management 


   

            How does light appear from electricity?

how does actually electrons produce light energy in the bulb? What I know is there is so-called the filament, a thing with great resistance, and this thing heat-up when current is flowing and it produce light, but I still don't understand how it's possible. Light energy includes photons. Electrons can emit or absorb photons. Does that mean, that they already had photons?

Photons are not conserved. They can be created by the energy of charged particles moving in electric and/or magnetic fields

Rather than looking at an incandescent bulb, let us consider an LED (light emitting diode). In terms of building a circuit out of it, it is no different from a light bulb (at least the differences are not relevant here). The point is, that in an LED, the microscopic mechanism simply is that an excited electron relaxes to its ground state, emitting light.  that this is a concept you are familiar with. In contrast, a filament emits light because it is hot. The microscopic description (with electrons and atoms) is much more complicated here. 

the  intuition tells you that 'the number of photons' must be conserved. Actually, the conserved quantity you are looking for is energy. Some quantum of energy (e.g. potential or electrical, or, in the case of an LED, it's the excited energy of an electron) is converted into a quantum of radiation. This quantum of radiation is called a photon. The same energy existed before! It was just present in a different form, but still in quanta. We just don't usually give special names to it. Still, sometimes physicists talk about phonons, vibrons, magnons, etc. They all describe quanta of some energy degree of freedom.

As to why hot things emit light; heat is energy and the increase in energy in the filament means that electrons can jump to higher energy levels in the atoms (excitation). When they de-excite, they emit photons.
Think about how the filament heats up when the current flows through it. As the electrons move along through the filament, they are constantly bumping into the atoms that make up the filament, transferring their energy to them. The energy of each impact vibrates an atom -- in other words, the current heats the atoms up.
Now, the bound electrons in the vibrating atoms may be boosted temporarily to a higher energy level when they're hit by on-coming high-energy electrons that form the electric current. After the energy is transferred to the bound electrons, they fall back to their normal levels. This happens when the electrons release the extra energy, that they had absorbed via the collision, in the form of photons.
Note that the absorbed energy may be released in other forms energy than photons depending on the material in question etc. So the electrons(ones inside the filament) did not already have photons- they were given some energy, which for the choice of material in the bulb, leads to an emission of photons when the electrons relax from that excited high-energy state.

                              Hasil gambar untuk Auto-discharge Function
                                     Development of battery management systems 

     Gambar terkait

                                                          Lithium Battery Charger 

               
                   

                        Universal Laptop Power Supply Adapter Circuit

                                 


                                         XO___XO DW  Power Management ICs.

Reset ICs (Voltage Detectors)

reset IC (voltage detector) product lineup has features of a high-accuracy output voltage with ±0.5%, a lower consumption current of 290nA, and the wide operating voltage range of 0.5 V to 60 V. The reset IC product offers Manual Reset pin, SENSE pin, Power-on Reset, and the function to monitor not only undervoltage but also overvoltage, suited for functional safety.
These products are available for various applications as voltage supervisor.






Reset Timers

DCDC Converters (Switching Regulators)

corresponding to different output characteristics such as low input voltage to high input voltage and small output current to large output current.
Our portfolio of DCDC converters includes step-up, step-down and inverting DCDC converters that are all manufactured by CMOS technology to ensure high voltage accuracy and high efficiency.



LDO Regulators (Linear Regulatorssuperior voltage regulator lineup from a maximum input voltage 42 V to a maximum output current 3 A.




+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

          e- PRM ( Power Request Management ) for e- SWITCH electronic Automatic


                                           Gambar terkait
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++