Test Information Space

Journal of Tech, Testing and Trends


Posted by cadsmith on January 23, 2011

Mobile is hot as Google’s priority this year, app market of 25B in several years, Bubbly has voice tweets, and PLX XWave is a brain monitor. Tablets replace Wintel. Travel includes an all-automated hotel. Vending machines recognize faces. Philosophy promotes testing. Accessibility can be validated using A-Prompt and Cynthia Says. TestFlight can be used for  IOS betas. Security has warnings about attack toolkits, non-Windows systems, printers, resumes, and smartphone seizure, though it may have over-hyped cyberwar. Remote guide dogs announced. Robotics features a comedian and window cleaner. DIY gets alerts from physical mailbox. Internet TV offered by Roku. 3D digitization is exploited for medical visualization. FEMA is looking to adapt to social media. Touch Press displays data dynamically in books. Qwiki searches for information experiences. Firefox 4 released in beta. There were 37 recent links.

Book Review:

Design Driven Testing: Test Smarter, Not Harder, Stephens and Rosenberg, 2010

DDT goals are to fulfill requirements, validate design and verify code. The tests are derived and refactored from the code. This is contrasted to test driven-design. The authors have implemented a process using UML dubbed ICONIX. A conceptual design is positioned midway between the use cases and detailed design. Ten-step lists are each outlined for TDD, DDT, unit, controller, scenarios, requirements, antipatterns, design, integration and algorithm testing. Sequence diagrams are shown throughout. Mock objects and services are used, and unit tests included in builds. There is some discussion of automation, but metrics are not detailed. The style of the book uses allegorical narratives based on satires of alice in wonderland and the temple of doom. This includes some poetry. There are twelve chapters and an appendix from original presentation on subject of use cases. Tips interspersed in the text, as well as inline notes or footnotes that link to other sources. Code samples demonstrate the techniques for a mobile Palm Pilot mapplet to do travel GIS hotel search for a web site.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , | Leave a Comment »

Scrimmage LOC

Posted by cadsmith on January 16, 2011

Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.

Books Review:

Fundamentals of Information Systems Security, Kim and Solomon, 2010

Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Net for Sale

Posted by cadsmith on January 9, 2011

US citizens to get Internet ID. LG ties smart grid to smartphones and tablets. Trimensional has 3D scanner for iphone. Factual has web and mobile APIs. Forrester says third of users will have tablets by 2015. Vuzix makes video eyeware. Videoscape promoted by Cisco service providers. Viewdle tags photos. Google Hotpot ranks realworld locations. Hipmunk does flight search. Clever Sense has location-aware concierge AI. Dedicated AIs are more successful. Hybrid Assistive Limb is a robotic exoskeleton. Industrial robot name Little Helper. OpenStack provides open-source for clouds. OpenStudy supports social study groups. DIASPORA open-source socnet in alpha. Minimal blogging editor outputs RSS. Feed.nu converts a blog to an android app. DKIM vouches for email. Social Security expects next computer to be years behind demand. Kneber botnet hits government. MAINGATE is new mobile defense network. Amazon Web Services used for wifi hacking research. Estonia starts cyber army. Wikistrat produces geopol journals. Eagleman looks at brains and behaviors. Convergence creates revolution in biomedicine. DNA test determines physical characteristics such as hair color. There is a digital Radiation Detector. Oil Prices begin to dig deeper. High tech Horse Show announced. Gilt Groupe carries luxury brands. Thirty-five recent links.

Book Reviews:

The Master Switch, Tim Wu, 2010

A separation principle of content from transport would maintain an open internet. The author discusses the history of telecommunications and describes an open-to-closed cycle. Convergence in this context means monopoly. This results from a paradox of how US consumers chose convenience over freedom. Other factors are network effects, power of integration, economies of scale, and will to power. There are five parts for twenty-one chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Chance Favors

Posted by cadsmith on January 2, 2011

Besides augmented to sound, other accessibility tools like Thimble do text to Braille. Photogene provides mobile photo editor. Jama makes requirements management software. VizThink supports visualization. OpenInvo aggregates innovative opportunities. Living earth simulator announced. MSR makes AI Go. Opensource decreed for eastern Europe. There were ten recent links.

Book Review:

Advanced ICTs for Disaster Management and Threat Detection: Collaborative and Distributed Frameworks, EleanaNik AsimakopoulouBessis, 2010
Title is acronym for information and communication technologies. Editors emphasize natural and technical disaster types. There are three phases: preparation, situation, and analysis. Some recent advances include smart-web radio to translate text to voice for dissemination and radio telecontrol to use power distribution lines to network measurement, communication and switches. It also has scenario-based reasoning for conflicting objectives. Topics include crisis management, disaster risk reduction, systemic disaster management system, educational game, disaster media, rapid onset informatics, tool deployment, early warning, med info systems, social media, web2.0, 3d and virtual world models, mathematical models, sensors and computing, and personalized evacuation data. It cites a variety of blogs. If the reader is interested in environmental development as a prevention measure, then additional sources may be required.

Posted in Uncategorized | Tagged: , , , , , , , , , , | Leave a Comment »

New Year’s Greetings

Posted by cadsmith on December 26, 2010

Mechanical Turk provides pool of internet beta testers. Mass High Tech has feed on startups. Google converts wave to shared spaces. Electronic authentication built into banknotes. Smart grid gets smarter. Hydrogen and oxygen produced using solar energy. Bruce Sterling discusses Wikileaks. Surveillance on police. New Year’s security trends. Software requests made by sysadmins. EditPad has online text editor. Delicious does semantic analysis. Groupon trains journalists. Local gifts shown on eBay. Wall St. computers trade on news. Numenta AI apps discussed. Pen provides biofeedback. Developer makes prosthetic tentacle. Gostai Jazz telebot. Eclipse Phase has posthuman game. New ScienceFiction.com site. New Zealand put UFO data online. The Last of the Humans 2010 second edition technothriller about the rise and fall of machine-controlled civilization on Earth was revised and expanded to eight chapters on Amazon and Scribd. Twenty-three links added. (Photo: Boeing X-45 )

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Pace Time

Posted by cadsmith on December 19, 2010

future of cities

Arbor graphs DDOS stats. The US is establishing an Internet Privacy Office. Supercomputer benchmark measures graph handling. CrisisCommons handles disaster data. List of computer mishaps. A simple site registration utility is provided by Facebook. S4 Momentum tracks social media. Social branding is marketed by Wildfire. Recommendations for Personal Media streaming. Spabba does bookmarking since delicious may be divested. SEO tips for ebooks. 750 Words has online writing editor. Video of Health 2.0 keynote by Tim O’Reilly. Contest offers health prize for in-patient predictions. Body Browser searches anatomy. Muro does browser-based art. Game development is free using UDK. Film-like mocap improves games. Cyborg beetles can fly. PR2 robots sold. Humanoid bot announced in France. Automated round vac prototyped. Startup tech trends listed in addition to Crowdfunding and Chile. Molten Salt stores energy. MapQuest has site in US. Thirty-one recent links added.

Books Reviews:

Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies, Panagiotis and Germanakos, 2008

This book is about how to improve findability. Major sections include theory, content, process, applications and security. Personalization refers to an individual’s or group’s unique needs and preferences. Adaptive features fit to these, context, and structure. Some of the common topics are user profiles, recommendation, models, hypermedia and e-government. Seventeen studies by thirty-eight contributors discuss categories such as privacy-enhanced personalization, emotional intelligence, e-learning assistants, open learner modeling, digital memories, cognitive style, adaptive parallel media stream servers, web usage mining, visualization methods, ontology-based, semantically adaptive, intelligent information, middleware architecture, web-based instruction, access/navigation/search, and adaptive hypermedia.

Surviving Cyberwar, Stiennon 2010
This book details methods of cyber intelligence. Cyberwar is dated from 2008 since, though there were network attacks a decade before, they were not coordinated military offensives. The author proposes four essential pillars which drive the war: technology, logistics, command and intelligence. Cases of social media being used for this as geopolitical tools are shown. Trojans are effective. Denial of service, the classic internet asault, is currently defended in ad hoc fashion. The simple assumption by network and endpoint security are that eachother are hostile, similarly by data for the user. It looks at the level of preparedness of major states and explains the US CNCI. Counterespionage has entered a new age. Future government depends upon how network security and privacy develop. There are fifteen chapters. It was published before the wikileaks controversy.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »


Posted by cadsmith on December 12, 2010


MakerBot has a 3D printer. Holograms are used for animation. Samsung offers 3D memory modules. Archaeology model shows an underground village. ChromeDeck is a browser app for Twitter. InteraXon mentally commands computers. New tool for scientific visualization. Drone navigates flight using terrain. Video of robotic strawberry picker. There is a contest for Cosmological Lensing analysis. Crowdsortium catalogs best practices. List of good data blogs. Google adds an eBookstore. OpenLeaks is new clearinghouse for curated secrets. There is a call for US technology investment by China. Shift has beta fashion site. Bacteria are used for computer circuits. Plants exhibit swarm intelligence. Collisions are expected between spacecraft and junk. Twenty-one recent links added.

Book reviews:

Integrating Usability Engineering for Designing the Web Experience: Methodologies and Principles, Spiliotopoulos and others, 2010
This book includes website usability cases, practices and theory. Quality factors are accessibility and user interfaces. Methods use development steps, questionnaires, scenarios, inspections and testing. Examples are shown for 3D apps, ecommerce, learning management systems, and marketing. Utilities are discussed such as literacy tools, screen-readers for blindness, and captions for deafness. It lists some of the regulatory guidelines. There are three parts for eighteen sections.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Counter Logic

Posted by cadsmith on December 4, 2010

The internet has public resources for improving community wealth. Tools for datamining and code metrics include cmetrics, FLOSSmole, FLOSSMetrics. and SLOCCount.Award for software testing and debugging: 1, 2, and 3. Utilities assist scenario forecasting. Kurzweil’s futurist performance was graded. AI is used for sports betting. Security adds computational forensics. SocialSci is a science research network. Engineering addresses world problems. Trees have been added to google earth engine. Digital evolution arrives at fireflies. News stream made from bitly links. CreateSpace self-publishes media. Irish expats have a social network. Comicspipeline.com shows arts in progress. Veterinarian designs prostheses. Phylo is a genomic game. Video discusses bioliberation. There were twenty-eight recent links.

Book Reviews:

Model-Driven Software Development: Integrating Quality Assurance, Rech and Bunse, 2008

An effect of a good model is to define the terminology and to automate analysis. The control and data flow are often similar to classical code-driven processes, but may be easier to handle since formats are less difference. The book has four sections for eighteen chapters from fifty authors. They discuss quality evaluation and improvement for specific domains. UML was an early instance; peer review was a quality method. New developments are shown for embedded systems, automotive, service engineering and infrared telescope. Some of these have used Matlab/Simulink/TargetLink. Metrics include matrices for maintainability, reusability, portability, efficiency and performance, for example. The book describes case studies. Models are inspected for completeness, consistency, traceability, and correctness. Empirical testing is still used to characterize system implementations.

Making Software, Oram and Wilson, 2010
This is a set of scholarly research papers which is interesting for, not only the results, but also the methods and the places under study. There are two parts on general principles and specific topics by forty-five authors. The table of contents shows the titles and subjects for thirty chapters, each of which also has a list of references. Part of the book’s implicit knowledge comes from how the authors answered their questions as well as how they present the evidence. The question becomes how to measure and improve these skills in other organizations and on a more continuous basis. The most common areas of interest are productivity metrics and measurement. These are shown for different software development process models and code bases. They also look at the limitations of education. There are some new concepts such as socio-technical congruence as a measure of coordination.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Being Wells

Posted by cadsmith on November 28, 2010


The internet-of-things will use a mobile embedded SIM chip. Notebook apps include Simplenote, Org-Mode and alternatives. Aviary added an HTML5 Photo Editor. Formstack eases editing. Mastermind allows hands-free game play. Search considers serendipity. Feds aim for cloud option. Trusted Secure Computing is presented in Europe. API usage is clarified. Kaggle aggregates datamining competitors. Data Compression is based on a card trick.

The health industry expects more networks, bots, ad artifacts. Biotech reviews ramifications of ID implants. A mobile camera drone has bird’s eye view. Bots rescue the battle-ridden. Communities reevaluate economics. Futurist Bill Gates discusses progress. Nanoparticles have environmental impact. Journalism uses more social media.  Philosophy uses field experiments. AI attends to when computers will take over and Numenta hierarchical temporal memory. Human Enhancement: Bioliberation shown on video.

There were about twenty-eight recent links.

Book Reviews:

Data Analysis with Open Source Tools, Philipp K. Janert, 2010
This book discusses how to make models and mine data. The author provides caveats that that appearances often override data, decision makers use data for support rather than reasoning, ethics outweigh data, and many things cannot be measured yet. Realtime means right this minute rather than up to date. Data is cleaned prior to analysis. There are a couple of dozen software tools discussed. It uses math examples rather than code, for data analysis and calculus, and has a statistics refresher. There are interesting styles of plots. Some case studies are detailed. Each chapter has workshop exercises, an intermezzo for related topics, and further reading. There are four parts, eighteen chapters and three appendices. The reader interested in data filtering might need additional sources beyond the time series presented here.

The Moral Landscape: How Science Can Determine Human Values, Sam Harris, 2010
This book proposes that science can address moral absolutes. If right and good relate to human and animal wll-being, then there are answers. The title is an analogy to a texture that has peaks for well-being and depths for suffering. Mental experience and values can be measured. Facts of the world can be assembled into knowledge. There can then be rational argument that results in the highest amount of well-being. This is an interesting discussion also presented in video lectures. There are five chapters which also include belief, religion and the future of happiness. There is heavy emphasis on topics related to brain science and structures and neuroimaging. The author likens the method to medicine or economics yet, while these are considered sciences, they are subject to significant errors, so there is also a need to understand how to improve the practice of the principles. The reader may also wonder if the brain will be the best processor for these types of decisions. The Monty Hall problem is discussed as a demonstration of the wisdom of switching, but this seems to be neutralized if contestants are split half on one side and half on the other so both would be better off switching.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »


Posted by cadsmith on November 21, 2010

Approaching the conclusion of the year, predictions for the next begin with announcements for the cloud and security. An easier messaging system is introduced for Facebook and AI may eventually use data. Gravity graphs interests. Ipad may have a new digital newspaper. A personal network supports photography. Indeed searches business classifies. States publish statistics. Developers can use head or gestural interfaces. Augmented reality is used to compose music. Robots learn by doing. Radio uses saltwater antenna. Stuxnet may have been built to change nuclear processing. Drones can survey Mars. Fins offered as prosthetics. A teacher plans to put a camera inside back of head. Climate is answerable to science. Carbon nanotubes are inflammable. Maxwell’s demon has been demonstrated. There are contests for movies, and med and bio images.

Recent links (from about twenty-eight):

This Video Will Blow Your Mind (Probably) | The Creators Project
YouTube – Authors@Google: Kevin Kelly
YouTube – Digital Art@Google: DJ Spooky

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , | 1 Comment »