Test Information Space

Journal of Tech, Testing and Trends

Archive for August, 2009

Lightning Bug

Posted by cadsmith on August 30, 2009

The stimulus has lit up some new testing territory if nothing else since change yields information which probably reboots IT. Past examples include fallout from introduction of the satellite or the internet. The smart grid is a new metaphor to answer the question “Is the planet better off yet?”.

Can initially sketch some outlines around the new field. If the grid is the computer, it can predict its own behaviors, however issues concerning timeliness of buffered sensor data yield anomalies and incorrect responses; autonomous is not always accurate. Complexity may fall somewhere between investment and weather systems. There are some scenarios when Poor Ingrid’s AI is a short-timer because local sources, e.g. solar power coatings, and netzero eliminate the need for distribution or an energy service provider. Popular engineering may become fashionable as public learns to improve energy usage amid concerns about scale of state surveillance. A new economic model is sought if electricity becomes a form of currency; probably can’t rule out an open-source Enron that drives the tax Pinkertons berserker. Other risks are that it periodically generates the wrong outcomes, i.e. increased carbon emissions, higher prices, shortages, monopolies or reflexive official shutdowns.

While the grid is supported, evaluation methods from other industries can be integrated. There is some second-order load for the measurement itself.

Also see wiki topic for more about clean energy, smart meters and buildings, storage, economics, vendors, electric autos, regulations, standards, advantages, constraints, risks, and measures.

Image: notepad.

Posted in Uncategorized | Tagged: , | Leave a Comment »

“… Why Tigers Eat Their Young”

Posted by cadsmith on August 23, 2009

While not yet at the stage of mob behavior resulting from nanobots or neurobots within an internet of genes, the issue of botnets becomes more dramatic due to the simultaneous ease of concealment and scale of effect. Defensive efforts on all sides include a sort of philogeny, or species differentiation, for next generation networks that seek immunity from compromise, e.g. infrastructure utilities, government, and branches of robotics dedicated to security applications. Bots can be bought, and their nets, at least temporarily, assigned to arbitrary tasks through software which is downloaded to all, or specific, clients under herder control. Ideally, this will not reach things like online or absentee ballots in an election, or tax calculations, or the command-and-control systems of emergency management agencies. Pirate applications beat the system by routing transactions world-wide so that illicit goods or services, possibly counterfeit, can easily be distributed and rewards laundered. This is a lucrative franchise which depends upon the unemployed or uneducated to carry out the client recruiting and administration using relatively cheap and easy software developed by experts. There are reports of use against enemies of the state. Government enacts laws to neutralize perpetrators and track and whack cashflow. Military shuts down offenders which may have a high attrition rate as alternate networks assume the load to continue operations. Networks form supercomputers which both allow rapid development and introduce extreme risks. Consider a virtual API to perform large-scale functions using available resources, either open-source or heavily funded from illicit gains from fraud or extortion, so that the villains think that they have control of the internet and related intelligence gathering. (Incidentally, title is part of quote attributed to Al Capone.) Right now there is a lot of infighting. Eventually virtual PCs, possibly disposed of after they carry out actions, exhibit a realtime battle for supremacy. If media is based on volume, then there may seem to be social effects which are actually automatically generated.

Scientific methodology has previously yielded solutions for past grand challenges so timely participation is invited, e.g. on the part of testers. Ultimately there is a trade-off between public awareness reducing market size as user experience degenerates and social overhead costs climb, and arms-dealer-types attempting to increase security market.

Researchers may neutralize botnets and leave installed for active metrics as they interact with others. Custom admin apps add commands for performance analysis, antivirus monitoring and various alarms. This begins from familiar intranet and web testing and proceeds to reveal relevant structures and anomalies for botnets. Reports include statistics about number of clients and servers, non-intrusive network flow analysis, bandwidths, attack profiles, channel characterization, local or remote or coordinated bursty or persistent effects, dormancy periods to evade detection, encryption types, static and temporary IP addresses, types of accounts and website or device degradation and downtime. There are filters at DNS registrars, some of which turn out to be rogues.

Also see topic wiki.

Image: Circle of Spam

Posted in Uncategorized | Tagged: , , , , | 2 Comments »

Blaugur Spear

Posted by cadsmith on August 16, 2009

Papervision - Augmented Reality

Augmented testing is a way to see things that never were without immediate annihilation. Virtualization may be able to overlay any reality for another. These types of systems bridge previous metaphorical user interfaces. It supports humans rather than replaces them. The new frame of reference has its own terms, some of which may not be available to other users, so a dictionary can be assigned to combinations of (subject or tester, object) so testers can simultaneously have their own slice of reality whether for monitoring, troubleshooting, or research. How do we map the abyss? Users consider multiple dimensions from editing, interacting, or analyzing. What twitter did for words, this does for cognition, so may expect some local reality bubbles until there eventually is sanity in the form of agreed upon commons. Templates can be traded. Activists can establish new precedents, e.g. concerning issues of virtual property. Stealthy types find novel ways to avoid MP surveillance, e.g. by cloning, recombining, or knocking out particular channels. Making the case often requires representation in other forms, e.g. as shown on flash video. Applications seem unlimited, e.g. for Q&A if one can interrogate the context <insert Homeric quote>. Conferences mix participant realities or may attempt to reduce to dedicated framework. Regulatory groups may constrain their field. There are classes of measures which can begin to be characterized. What unique concerns does the augmented reality tester have? For example:


How does it get user attention? Track where looking? Know location? Navigate? Manage states and events? Determine probabilities? Generate alerts, e.g. when thresholds reached?

How is significant data backed-up? e.g. how recover lost playlists.

How are outages handled?

What are tools to produce or customize content (e.g. FLAR, iPhone ARkit, Papervision, Blender)?

Are new domains warranted, e.g. .ar?

How do reality clips?

Issues on rights management?

What are types of hardware and software standards, e.g. OpenGL, URI, GPS, RFID.

How compensate for limitation of GPS resolution if commercially limited to 20′-30′ or wider.

How about physical aspects of bulk, weight, mobility, temperature sensitivity, ruggedization, wearability?


What happens to attention span?

What types of tasks are enabled?

How do usability testing? e.g. independent variable of reality type (real, virtual, augmented), dependent transparency or navigation, and metrics for abstract/concrete, user-centered/techniques-oriented, transparent/unintelligible, incomplete/complete.

Does it negatively affect how user looks to others?

What are the safeguards?


Which new contacts or organizations are found?

Is it considered a social network? If so, usage may not be allowed by some groups? What do they do instead?


How much does it cost?

What industries result?

Which are replaced?


Is this an enhancement, game changer or evolutionary shift? What shifts result, e.g. post-printing-press, telegraph, TV, internet.

What are side-effects on other forms of media, e.g. cloud?

How are contexts selected or created? For example may be historical, improvement, theme-related, experimental, and so on.

How are grievances handled? e.g arbitration.


What are implications for cryptography?


What does augmented mean? e.g. better, improved, greater, increased, amplified, enlarged, larger, bigger, enhanced, upgraded, perfected, expanded, superior, ideal, developed or constructive, mixed, or ultimate. What ontologies result? Aliases?

What are vulnerabilities?

What surveillance results? How is it defeated?

What causes obsolescence?

Documents included AR Preseetha VV on components, Klinker and others on machine diagnostics, Odeh and others on usability, and Cowper on law enforcement.

Other book was Ashenden 2007 on VHDL.

Wiki added Content Guidelines page.

Image by Rev Dan Catt via Flickr

Posted in Uncategorized | Tagged: , , , | Leave a Comment »


Posted by cadsmith on August 9, 2009

IT might have a future where it can strategically edit a map of this century based on actual and projected conditions. Various types of networks interact to realize scenarios. Each continent has players. Population growth changes demographics. Ideally can preserve civilization commons such as health, rights, law and trade. Dependencies include at least energy, natural resources, transportation and communication. Disruptions to states lead to realignments in treaties and rivalries. Downing big guardians can result in various melees, so there may be attempts to order conflicts to preserve security,  lower intensity and defuse escalation, though these still have to deal with surprise attacks and arms dealers. Issues of national security may be construed as threat to species whether from war (conventional, WMD, guerrilla, cyber, nano), climate warming, pandemics or natural disasters. New powers may emerge, e.g. Turkey, Poland, Mexico and Brazil. Politics range across democratic, socialist, communist, religious, martial and possibly growing sympathy among distributed small groups. Complex human emotions often seem two-sided, e.g. fear/greed, mortality/sex, or group-power/free-will. Simultaneously, science offers prospects of augmented physiology, cloning, smarter machines, robotics, and conquering space. Waiting on reality transport protocol.

Topics of interest include network support by Allen 2009, software test by Davis 2009, survival fiction by Forstchen 2009, hardware design verification by Fujita 2007 and Martin 2007, and hardware testability by Wang 2006.

Posted in Uncategorized | Tagged: , , , , , , , , | Leave a Comment »

Stem the Tide

Posted by cadsmith on August 2, 2009


Whether the internet is the primary achievement of the age, on a par with the wonders of the world, is yet to be seen, though the polar ice caps seem to be yielding quicker. As more components are joined, it seems to become like materials such as wood, metal, and plastic which are used extensively to rework structures, in this case adding interactive behaviors. Internet protocol is second-nature for networked machines. Other robust standards can therefore be built upon it. If a part of the web disappears, for example, it is relatively straightforward for it to grow back. It is not considered a biological phenomenon which would regenerate without knowledgeable human supporters, but that can possibly be emulated using automation that adjusts for prevalent local elements. As new regions are built out, and history is rewritten, each social region may take credit for inventing the thing, presumably finding workarounds for previous gotchas, the most immediate of which include at least spam, censorship, and weather. The last might be averted if the environment was allowed to give feedback symbolically rather than dramatically which might lead to advances in the areas of look-ahead, testability and accessibility, e.g. if coupled with augmented mobile sensing. Dangling some non-specific user-interfaces at various scales might hook unexpected demonstrations of intelligence if not new actors. At least, it could lead to some new ringtones.

Books included Boleyn-Fitzgerald 2010 on cognitive mapping (in process), Osherove 2009 on unit testing, Wang 2007 on hw test, Johnson 2006 on virtual instruments, and Munden 2004 on hw verification.

Documents added titles of 40+ pages for Jenkins 2008, Samadhiya 2008 (3), Thông tin giảng viên 2008,  Pointe Technology, Rational Software 2001 and IEEE 1989.

New video was released for HWTSAM 3.

Image: wetmind

Posted in Uncategorized | Tagged: , , , , , , , , | Leave a Comment »