Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘answers’

Mesh Plexus

Posted by cadsmith on February 20, 2011

Embedded quality concerns highlighted by Accenture. Test lab management organized by Parasoft Virtualize. Mutual Mobile tests enterprise apps. SOASTA performs cloud and mobile load tests. Strike has simple task manager. Google bookmarks imports directly from delicious.

Wolfram reviews Watson. Satellites learn to dodge obstacles. Roombots morph into furniture. Meka Robotics combines Kinect and ROS. Lasers transfer data on-chip. Antilaser absorbs light.

BrainDriver kit for mind over motorcar. Compare to driving while blind. Ants lead in network trails.

inboxQ sweeps Twitter Q&A. RIM acquires Gist contact manager. Greplin searches social media. Crowdsourcing may speed social development. Wikistrat observes how tech propels global middle. EFF reports expansion in federal surveillance. Hackers spoof news via Wi-Fi.

Doctor’s brief presents Tech and Medicine. Nurses are apprehensive of alarm fatigue. Human skin becomes printable. Nanobioconnect hosts directory.

Mississippi powers underwater turbines. Geothermal Energy plentiful in Iceland. There were thirty-one recent links.

Book Review:

The Hidden Reality: Parallel Universes and the Deep Laws of the Cosmos, Brian Greene, 2011

Nine types of parallel universes are proposed including quilted, inflationary, brane, cyclic, landscape, quantum, holographic, simulated and ultimate. The questions include how to test these theories, e.g. involving features which are common, or correlated, to the known universe, possibly through computation, and whether they can be used to solve problems. Various components such as black holes, string theory, and branes are explored and related to each model. There are eleven chapters. Audio comments

Advertisements

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Scrimmage LOC

Posted by cadsmith on January 16, 2011

Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.

Books Review:

Fundamentals of Information Systems Security, Kim and Solomon, 2010

Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Act of Reason

Posted by cadsmith on October 3, 2010

derakshan

The internet is broadening as its component types become more speciated. It carries more virtual goods and prototypes by DIY makers. Cell phones handle mobile payment. Journalism trends are visualized. Social media is used to tell stories. Ebooks have new readers for Kindle and Blio. Data drives discovery. Original manuscripts are viewable. Fiction publishing includes anthologies of scifi. There is a backlash to blacklisting.

Recent links (about twenty-six):

video

YouTube – SingTel Cloud computing in Augmented Reality

YouTube – Sebastian Seung: I am my connectome

answers Quora

climate NASA – Climate@Home: Creating a Virtual Supercomputer to Model Climate

game Brain Odyssey

maps Polymaps

quality Mass offers “Seal of Commonwealth Quality” – Boston Business Journal

security Technology Review: Blogs: Mims’s Bits: The Hot New Thing in Biometric Security is… Ears

space

NASA – IBEX Finds Surprising Changes at Solar Boundary

A Habitable Exoplanet – for Real This Time | Wired Science | Wired.com

telepresence IEEE Spectrum: A DIY Telepresence Robot

Posted in Uncategorized | Tagged: , , , , , , , , | Leave a Comment »

In Turn Troth

Posted by cadsmith on August 17, 2010

100702b

The internet wants to be the answer. It has tied together all of the testimonials and provided search to find sources, and rankings to reveal the best. Women can review unbiased medical advice, and patients all of their records. It can reshape itself from smartphones if needed. Show sensors tell people what to hear. Robotics reports progress in batteries, walking, emotions and space travel. The brain is almost mapped. Beyond scifi, the imagination is also scenic, intriguing and mysterious.

Recent links (twenty-two):

answers

Sprouter
Swingly | It’s time you got some answers.

books The Scene Book: A Primer for the Fiction Writer, Sandra Scofield, 2007

cloud

Exploring How to Build a Cloud With Smartphones – ReadWriteCloud
IBM’s Cloud Computing Coming to a Hospital Near You
4 Tools for Assessing Cloud Performance – ReadWriteCloud

cognitive Reverse-Engineering of Human Brain Likely by 2030, Expert Predicts | Gadget Lab | Wired.com

fiction Foreign Influence, Brad Thor, 2010

manufacturing Global Guerrillas: RESILIENT COMMUNITY: Forget Afghanistan, These are Needed in Detroit etc.

medical ChickRx: Expert Info on Sex, Fitness, Relationships, Dermatology, and Health

ranking

FindTheBest.com | Find. Compare. Decide.
The Best Top 10, Top 100 & More Lists: List Making is Easy at Ranker | Ranker – A World of Lists

rfid Sensors On Broadway: Live Performances Enhanced by RFID

robotics

Boston-Power heads to the moon – Boston Business Journal
A Robot Capable of Developing Bonds and Showing Emotions
IEEE Spectrum: Iran’s Humanoid Robot Surena 2 Walks, Stands on One Leg (Video)
Robot to escort on space shuttle mission: NASA – International Business Times

scifi

Kraken, China Mieville, 2010
Terminal World, Alastair Reynolds, 2010
The Dervish House, Ian McDonald, 2010

startup Never Mind the Valley: Here’s Montreal

writing How to Write a Damn Good Mystery, James N Frey, 2004

Posted in Uncategorized | Tagged: , , , , , , , , , , , , | Leave a Comment »

Last Resort

Posted by cadsmith on August 10, 2010

bm2lw

Society seems to be in the midst of another big shuffle. Part of it is seasonal, but there are major ideological shifts as previous institutions shed the characters that embodied them. Despite oft-repeated scripts, new contacts made online or in person are superficial and find it difficult to pierce the compartmentalization of previous history or biography quickly enough. Discontinuities in authority may occur. Risk mitigation strategies then need review. A tag or stereotype invites examination.

Recent links (about sixty): grouped using Bookmarks2LiveWriter which plugs into the windows live writer app and downloads delicious bookmarks for a date range, which can then be sorted by leading tag. Manually edited to skip newline for single entries.

agile: Tasktop Agile Planner

ajax: Dr Dobbs – Open Source Community Paves Way for Developers to Improve Internet Access for the Aging, Disabled

animation: the macula

answers

MathOverflow
Fluther: Tap the Collective

architecture: International Architecture Database

blog

Anthologize
Who’s in the Blogosphere? / Flowtown (@flowtown)

books

Defending the Undefendable, Walter Block, 2008
Writing Tools: 50 Essential Strategies for Every Writer, Roy Peter Clark, 2006

business: rule.fm | let your work flow…

drawing: News: deviantART Muro: It’s Time to Draw!

ebooks: calibre – E-book management

education: Bill Gates: Forget university, the web is the future for education – Tech Products & Geek News | Geek.com

hardware: UCLA Professor Warns of Hardware Hackers – International Business Times

IT

IDS Readies Data Centers on Ships « Data Center Knowledge
A sneak preview of enterprise IT in 2020 – Computerworld Blogs

media: Renewed Interest in Financing Original Web Shows – NYTimes.com

mobile: Yes I am Precious

opensource

Par4All
Collaborative Analysis of Competing Hypotheses, available soon under GPL

optical

Young Engineer Uses Webcam, Laser to Build Budget 3-D Scanner | Gadget Lab | Wired.com
Technology Review: Computing at the Speed of Light
Medical Daily: Purple light means go, ultraviolet light means stop

phone: http://apps.facebook.com/vonage-talkfree/

photography: Computer Scientists Build Pedestrian Remover

publishing: B.V. Larson Official Author’s site

quantum

Scientists provide a new angle on quantum cryptography
Physicists develop model that pushes limits of quantum theory

reading: The Monkey Cage: Social Highlighting

robotics

IEEE Spectrum: Engineers Turn Robot Arm into Formula 1 Simulator
The University of Utah: Mechanical Engineering:
Remote controlled, multi-tasking climbing machine
Technology Review: Blogs: TR Editors’ blog: A Strange New Take on Telepresence

scifi

The Fuller Memorandum, Charles Stross, 2010
Mech, B. V. Larson, 2010
Containment, Cantrell, 2009
Living Digitally: Fiction by Christian Cantrell

security: Feds admit storing checkpoint body scan images | Privacy Inc. – CNET News

singularity: Singularity Institute for Artificial Intelligence | AI

space: Sharpest Image Yet of Massive Galaxy Collision | Wired Science | Wired.com

storytelling: Storytelling Part 1: Change of Storytelling on Vimeo

technology: More Than Human: Embracing the Promise of Biological Enhancement, Ramez Naam, 2005

test

6 Ways Eye Tracking Is Changing the Web
Injecting Errors for Fun and Profit – ACM Queue
Dr Dobbs – Time and Testing: The Biggest Developer Headaches

translation: Translation and undo smartquotes in documents – Official Google Docs Blog

ui: Dolphin uses iPad as way to communicate with humans – Boing Boing

use-case: Advanced Use Case Modeling: Software Systems, Armour and Miller, 2000

video

LoiLo inc
Light Reading – Service Provider IT – Verizon Tailors Video to Criminal Justice – Telecom News Analysis

wave: Official Google Blog: Update on Google Wave

web: Domain Names & Web Hosting : 1&1 Internet Inc.

writing

Poynter Online – Writing Tools
The Soulmen | We Got It! Ulysses 2.0
Welcome – Ommwriter
The Organized Writer
17 Fantastic Apps Made Especially for Writers | tripwire magazine

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Sharper IM Age

Posted by cadsmith on May 17, 2009

wa4

How do we figure out where to look for answers amid the offerings from computation, search, wikis, social networks, semantic web, and so on? Datasets differ. Would be nice to handle user preferences, history, context, word-based problems, voice, and local state of knowledge. Caches allow them to provide up-to-the-minute FAQs. Timestamps are able show historical answers. Text-driven user input can be cut, piped to functions, and the answer returned or posted somewhere, e.g. an editor. Questions can be sent to all and merged or integrated, or the APIs can make them recombinant. The hardware scales from cells to chips. Cloud-based services seek to be more platform than killer app because various industries each have idiosyncracies, so there will likely be multiple solutions. Also started a basic wolframalpha experiment as way to observe learning curves for utility and user. There seem to be more variables than controls initially, so will need to characterize what is (un)settling and how.

Human-based textual image parsing this week included Farrell-Vinay 2008 on test management, McDonald 2008 on QA, Burns 2007 on security, Holzmann 2003 on SPIN model checker, Krepinevich 2009 on futurism, and Oreilly 2009 on the microblog.

“When you have eliminated the impossible, then whatever remains, however improbable, must be the truth.”

Posted in Uncategorized | Tagged: , , , , , , , , , , , | Leave a Comment »

Final Term

Posted by cadsmith on May 3, 2009

Answer engines indicate uptick, e.g. Wolfram Alpha or IBM DeepQA to augment expertise.

Search now yields Google profile. Added a site to Ning which features social networking, pictures and videos.

Recent reading list composed of Nilekani 2009 on future of India and IT, Ash 2008 web performance, Weilkiens 2008 SysML and UML, Andrews 2006 testing web security, and Beck 2002 about test-driven development.

Twine upgraded to Sprint 36. UI looks more like feed reader sorted by topics which can be ordered by preference. Each twine’s view indicates items that have not been read yet and can be sorted by type (e.g. all, bookmark or comment). Authors are not obvious so dialogue swarms seem to be less frequent. Can bookmark or subscribe to feeds of particular twines or members to follow, or pipe to Twitter or its newly imitative complements, Facebook and Friendfeed.

ComboFix security was useful to cleanup self-reinstalling adware processes.

Image: Dr. Eldon Tyrell

Posted in Uncategorized | Tagged: , , , , , , , , , , , | 1 Comment »