Test Information Space

Journal of Tech, Testing and Trends

Archive for January, 2011

Info Ops

Posted by cadsmith on January 30, 2011

Data deluge includes new terms. State unites in Sputnik Moment prioritizing tech innovation. All-Seeing Eye test results in contention. Egyptian election revolt disconnects media excepting network surveillance. Cyber police activated in Iran. Facebook handles hacks from Tunisia. Bluetooth is useful to insurgents. Mobile phones are to be tested in space. Android 3.0 SDK announced. Digital docs use steganography. Universal memory seeks to replace flash and DRAM. Alternative energy may take about three more decades. Robot hands become more robust. Cloud bots get smarter. Visual microscopy automated. Autom supports weight reduction. There were twenty recent links.

Book review:

The Next Decade, George Friedman, 2010
This book looks at the near future of US foreign relations in terms of a realignment of the balance of power through actions of the President as Commander-in-Chief. There are two themes, the unintended empire, and whether it can be managed to allow the republic to survive. The US global military supports economic policy. Its President is always engaged in the art of war. This will move beyond recent fear of rising oil prices and Jihadist war and establish surrogates in each region. While democracy, human rights and social progress are still important, strategy becomes more of a concern than ideology. The issues are economic, geopolitical, demographic and technological. There is an aging population, contracting workforce, and lack of water. The state, in the form of the DoD, is more powerful than the market for long-term investment. On the American contents, Cuba is likely to be a target of influence, Latin America will include Brazil, Argentina and Mexico. The latter’s violence and corruption will be resisted at the border and cartels are expected to be in control there, while US hypocrisy will scapegoat members of its government staff during investigations. Canada is stable. In Asia, Korea, Australia and Singapore balance Chinese splintering and Japanese assertiveness. India surges economically, but is not a threat to China, and is balanced by Pakistan to keep its expenditures on Army and Air. In Europe, Brits’ interests are closer to US, and Poland is important to containment since Germany dominates economically, backed by France allied with Russian military which seeks to balance US with radical Islam. Denmark blocks Baltic sea exits. NATO is irrelevant. In the Middle East, US withdraws from Iraq, distances from Israel, and has detente with Iran. Sunni Turkey eventually rises and is important to Russian containment in Balkans and Caucasus. There are fourteen chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , | Leave a Comment »


Posted by cadsmith on January 23, 2011

Mobile is hot as Google’s priority this year, app market of 25B in several years, Bubbly has voice tweets, and PLX XWave is a brain monitor. Tablets replace Wintel. Travel includes an all-automated hotel. Vending machines recognize faces. Philosophy promotes testing. Accessibility can be validated using A-Prompt and Cynthia Says. TestFlight can be used forĀ  IOS betas. Security has warnings about attack toolkits, non-Windows systems, printers, resumes, and smartphone seizure, though it may have over-hyped cyberwar. Remote guide dogs announced. Robotics features a comedian and window cleaner. DIY gets alerts from physical mailbox. Internet TV offered by Roku. 3D digitization is exploited for medical visualization. FEMA is looking to adapt to social media. Touch Press displays data dynamically in books. Qwiki searches for information experiences. Firefox 4 released in beta. There were 37 recent links.

Book Review:

Design Driven Testing: Test Smarter, Not Harder, Stephens and Rosenberg, 2010

DDT goals are to fulfill requirements, validate design and verify code. The tests are derived and refactored from the code. This is contrasted to test driven-design. The authors have implemented a process using UML dubbed ICONIX. A conceptual design is positioned midway between the use cases and detailed design. Ten-step lists are each outlined for TDD, DDT, unit, controller, scenarios, requirements, antipatterns, design, integration and algorithm testing. Sequence diagrams are shown throughout. Mock objects and services are used, and unit tests included in builds. There is some discussion of automation, but metrics are not detailed. The style of the book uses allegorical narratives based on satires of alice in wonderland and the temple of doom. This includes some poetry. There are twelve chapters and an appendix from original presentation on subject of use cases. Tips interspersed in the text, as well as inline notes or footnotes that link to other sources. Code samples demonstrate the techniques for a mobile Palm Pilot mapplet to do travel GIS hotel search for a web site.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , | Leave a Comment »

Scrimmage LOC

Posted by cadsmith on January 16, 2011

Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.

Books Review:

Fundamentals of Information Systems Security, Kim and Solomon, 2010

Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Net for Sale

Posted by cadsmith on January 9, 2011

US citizens to get Internet ID. LG ties smart grid to smartphones and tablets. Trimensional has 3D scanner for iphone. Factual has web and mobile APIs. Forrester says third of users will have tablets by 2015. Vuzix makes video eyeware. Videoscape promoted by Cisco service providers. Viewdle tags photos. Google Hotpot ranks realworld locations. Hipmunk does flight search. Clever Sense has location-aware concierge AI. Dedicated AIs are more successful. Hybrid Assistive Limb is a robotic exoskeleton. Industrial robot name Little Helper. OpenStack provides open-source for clouds. OpenStudy supports social study groups. DIASPORA open-source socnet in alpha. Minimal blogging editor outputs RSS. Feed.nu converts a blog to an android app. DKIM vouches for email. Social Security expects next computer to be years behind demand. Kneber botnet hits government. MAINGATE is new mobile defense network. Amazon Web Services used for wifi hacking research. Estonia starts cyber army. Wikistrat produces geopol journals. Eagleman looks at brains and behaviors. Convergence creates revolution in biomedicine. DNA test determines physical characteristics such as hair color. There is a digital Radiation Detector. Oil Prices begin to dig deeper. High tech Horse Show announced. Gilt Groupe carries luxury brands. Thirty-five recent links.

Book Reviews:

The Master Switch, Tim Wu, 2010

A separation principle of content from transport would maintain an open internet. The author discusses the history of telecommunications and describes an open-to-closed cycle. Convergence in this context means monopoly. This results from a paradox of how US consumers chose convenience over freedom. Other factors are network effects, power of integration, economies of scale, and will to power. There are five parts for twenty-one chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Chance Favors

Posted by cadsmith on January 2, 2011

Besides augmented to sound, other accessibility tools like Thimble do text to Braille. Photogene provides mobile photo editor. Jama makes requirements management software. VizThink supports visualization. OpenInvo aggregates innovative opportunities. Living earth simulator announced. MSR makes AI Go. Opensource decreed for eastern Europe. There were ten recent links.

Book Review:

Advanced ICTs for Disaster Management and Threat Detection: Collaborative and Distributed Frameworks, EleanaNik AsimakopoulouBessis, 2010
Title is acronym for information and communication technologies. Editors emphasize natural and technical disaster types. There are three phases: preparation, situation, and analysis. Some recent advances include smart-web radio to translate text to voice for dissemination and radio telecontrol to use power distribution lines to network measurement, communication and switches. It also has scenario-based reasoning for conflicting objectives. Topics include crisis management, disaster risk reduction, systemic disaster management system, educational game, disaster media, rapid onset informatics, tool deployment, early warning, med info systems, social media, web2.0, 3d and virtual world models, mathematical models, sensors and computing, and personalized evacuation data. It cites a variety of blogs. If the reader is interested in environmental development as a prevention measure, then additional sources may be required.

Posted in Uncategorized | Tagged: , , , , , , , , , , | Leave a Comment »