Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘automotive’

Mesh Plexus

Posted by cadsmith on February 20, 2011

Embedded quality concerns highlighted by Accenture. Test lab management organized by Parasoft Virtualize. Mutual Mobile tests enterprise apps. SOASTA performs cloud and mobile load tests. Strike has simple task manager. Google bookmarks imports directly from delicious.

Wolfram reviews Watson. Satellites learn to dodge obstacles. Roombots morph into furniture. Meka Robotics combines Kinect and ROS. Lasers transfer data on-chip. Antilaser absorbs light.

BrainDriver kit for mind over motorcar. Compare to driving while blind. Ants lead in network trails.

inboxQ sweeps Twitter Q&A. RIM acquires Gist contact manager. Greplin searches social media. Crowdsourcing may speed social development. Wikistrat observes how tech propels global middle. EFF reports expansion in federal surveillance. Hackers spoof news via Wi-Fi.

Doctor’s brief presents Tech and Medicine. Nurses are apprehensive of alarm fatigue. Human skin becomes printable. Nanobioconnect hosts directory.

Mississippi powers underwater turbines. Geothermal Energy plentiful in Iceland. There were thirty-one recent links.

Book Review:

The Hidden Reality: Parallel Universes and the Deep Laws of the Cosmos, Brian Greene, 2011

Nine types of parallel universes are proposed including quilted, inflationary, brane, cyclic, landscape, quantum, holographic, simulated and ultimate. The questions include how to test these theories, e.g. involving features which are common, or correlated, to the known universe, possibly through computation, and whether they can be used to solve problems. Various components such as black holes, string theory, and branes are explored and related to each model. There are eleven chapters. Audio comments

Advertisements

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Scrimmage LOC

Posted by cadsmith on January 16, 2011

Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.

Books Review:

Fundamentals of Information Systems Security, Kim and Solomon, 2010

Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

To Be Is To Question

Posted by cadsmith on November 7, 2010

IBM personalizes internet. Australia has a digital city. Adobe adds cloud filesharing. Verify gets user feedback on screens. Impure visualizes data. A biological brain navigates a vehicle. In electric cars, a Chevy gets an IP address, and an Urbee is made on printer. Also in 3D, Janus does interactive scanning and holograms do displays. Invisible material disappears. Chip PC is in the plug. Blekko searches selected sites. Gdb does profiling. Sensors warn of landslides. Technoscience combines science and engineering.

Book reviews:

What Technology Wants, Kevin Kelly, 2010
The author seeks the essence of technology as a force the equal of nature. Technology has features such as evolution, complexity, specificity, diversity, and energy dependencies. He introduces the term technium as a form of civilization, an emergent system of accelerated life. Many advancements happen simultaneously in multiple places, e.g. the Axial Age. This is the result of new technologies increasing the odds of successors. There are four parts for fourteen chapters. It is written in an optimistic, mind-expanding style. He covers the ideas of many other authors such as Joel Garreau and W. Brian Arthur. There are twenty-books in the reading list including authors such as Ray Kurzweil and Steward Brand. Though not cited here, there have been efforts to formalize technology’s philosophical roots, theory, and predictions, reviewed earlier on this blog and google books.

Recent links (of about twenty-four):

video

YouTube – Tom Chatfield: 7 ways video games engage the brain
YouTube – Authors@Google: Alice Walker

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

Pathos Least

Posted by cadsmith on October 31, 2010

Shield-Nano-Blue-Brown-RGB-102px

The internet adds Everest and loses Tehran as US boosts broadband. WiFi direct protocol groups devices. Cell doubles as remote. Semantic web publishes R2RML and MathML 3. China boasts supercomputer lead. Computers used for emotion meter. Intel has press site. HealthTap individualizes care. Knight funds media contest. Security weaves code and judges cyberwar while Iranian hackers trade botnets. No math word problems, but some tips on stories versus statistics. Google does spreadsheet visualization and random street view. AutoBot links car to web. Traffic lights save gas. Digital museums open to public and print 3D. Nook adds color reader. NASA introduces A-Train and tests flight deck. Robots plug into brain and use beanbag hands.

Book reviews:

User Stories Applied, Mike Cohn, 2004

This approach is from Agile User-Centered Design. Stories can also be added to Scrum. Extreme programming, XP, centers on testing, automated and acceptance. The testing is for usability, performance and stress rather than code coverage. There are various techniques used for developing the stories. They are modular for estimation and testability. A case is shown for a workshop having user role cards and story cards. A story card is a reminder of features to discuss. Each bug report is considered its own story. The planning game customer prioritizes their user story cards for the next iteration after developers have indicated the effort estimations for each. Tests are prepared prior to the code. Stories are grouped. A paper prototype is created and refined before programming begins. The UI is postponed for as long as possible. User goals can be listed from which stories will be derived. Burndown charts are used to track iteration hours. Another measure of momentum is the number of story points over time where each is an estimate for an ideal workday. The term smells is used for problems between participants, e.g. customer won’t do the stories, for which solutions are proposed. There are four parts beside an appendix on extreme programming. Each has a chapter summary, responsibilities of the developer and customer, and questions.

Previous links (of about thirty-four):

video

The Poetry of Science: Richard Dawkins and Neil deGrasse Tyson – K21st Essential 21st Century Knowledge
YouTube – R.A. Mashelkar: Breakthrough designs for ultra-low-cost products
The Future of Money on Vimeo
Digg – Deadly Memory Card Testing: Overkill Edition [Video]

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Cell Complex

Posted by cadsmith on October 18, 2010

Usability test sites are listed below. Visualization has Circos tool. Machine learning can automatically read the web and derive laws from data. Biotech do-it-yourself has reached the garage stage. Japan has machines that win at chess, economize both heat and smartgrid, sing like humans, and crawl like snakes. Surveillance has video analytics and privacy concerns. Movies have character makeover. Security has memory hardware ID, Bugat trojan, cyber cold war and first strike alert. Space tourism is less than a couple of years away. Water shortages are prevented by intelligence, startups and solar power. Ebooks have self-publishing, search, blog converter, and writing nook.

Book reviews:

Undercover User Experience Design, Cennydd Bowles and James Box, 2010

This is a comprehensive do-it-yourself description about many facets of the topic. The undercover manifesto values bottom-up change, delivery, timeliness, sociability, and action. There are details about critiques, deliverables, design process and problems, research, usability testing, and UX design. UX adoption begins in web design, and proceeds to check-up, integration, ownership, allies, education, persuasion, trust, stories, skills, and ROI. The content of the book has dynamic highlights, notes appear in side-boxes. It has tips for Agile as well as waterfall design. There are recommendations for using the process with various types of customers including developers, visual designers, content specialists, product owners, marketers, SEO specialists and senior managers. It talks about metrics, A/B testing, common design review pitfalls. Types of test include rapid iterative testing and evaluation, and remote. Tools range from sketching wireframes and storyboards, to apps, to dedicated sites. Research methods include feedback, surveys, and third-parties. Author sites http://www.cennydd.co.uk and twitter.com/boxman.
Washington Rules: America’s Path to Permanent War, Andrew J. Bacevich, 2010

The title simultaneously refers to the beltway, namesake, possible result, and the name of the national security consensus since WWII which is no longer as effective. The sacred trinity now holds that the US needs global presence, power projections and interventionism. The inability to distinguish institutional well-being from that of the nation has led to the present conditions. This affected historical figures such as Allen Dulles, Curtis LeMay and Maxwell Taylor. The author takes issue with the way things have turned out for the US. The arguments are nonpartisan. The return to counterinsurgency demonstrates an abandonment of victory as an objective. The US could revert to the tradition of military for defense and Just War. Americans would see soldiers stationed in the country as citizen-protectors. This frees up resources to restore the economy.

Previous links (from about fifty-four):

test

Turn Visitors into Customers with Performable.
Easy User Experience research – whatusersdo.com
Webnographer Home
Remote Usability testing, online customer experience research, usability testing software. Userzoom
User Experience | Website Usability Testing and Evaluation
Usability Testing
Treejack :: Optimise your site structure using tree testing.
OpenHallway
Navflow
Remote & Online Usability Testing Tool | Loop11
IntuitionHQ, make website usability testing part of every website project
FiveSecondTest
CommandShift3 – It’s like Hot or Not for web design
Chalkmark :: First impression testing.

astronomy Planet hunters no longer blinded by the light | International Space Fellowship

automotive CarWoo!

climate Old Weather – Our Weather’s Past, the Climate’s Future

community Get Satisfaction | Customer Community Software – Love your Customers.

economics Coming Soon: World Government and Global Currency – Beyond Money

education Next Gen Learning Challenges

invention Dean of Invention : Planet Green – On TV

maps The Web 2.0 Summit Points of Control Map

social Multitude

social-networks MYCUBE

technology Garnter’s Newest Hype Cycle: Discuss

transportation Everyone’s Private Driver / UberCab

windows Windows Live Mesh 2011

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Nu Matters

Posted by cadsmith on September 19, 2010

image

Some of the big names in their fields announce changes of opinion including Tim Berners-Lee, Stephen Hawking, and Chris Adnerson of TED. Rob Dunbar talks about ocean acidification. Nicholas Christakis forecasts epidemics from socnet analysis. Problems are being redefined and prioritized. Predictions for next year have begun. New products push the limits of mobility, computation and automation. Weather Waker original scifi can be read on Scribd and Amazon.

Recent links (about forty):

Book reviews:

Cyber War, Richard A. Clarke and Robert K. Knake, 2010

The author discusses govnet, his proposal for private critical infrastructure networks, which the internet architects and privacy advocates were not supportive of. The first third of the book describes the way things are setup and the rest goes into defensive and offensive strategies. The actors are described such as state-run cyber warriors like Russia’s successor to FAPSI, or nationalist hacker groups. Defenses try to promote security by filtering attacks or by disrupting the parts of the network that are required for them to operate. These are non-lethal, but may lead to other types of warfare. There are costs to cyber-crime which demand better counter-measures. There is a speech at the end that sums up the recommendations for a treaty, risk reduction center, and cooperation among victim nations. There are eight chapters and a glossary, but no index. The problems and solutions are ongoing. National servers are used within the cloud framework to protect important data. Countries seek to monitor all types of traffic for security reasons, e.g. Blackberry decryption by India. This becomes sensitive when data may be used for commercial advantage. Other nations may develop their own advancements for private or global networking, such as China’s post-IP efforts.

The Grand Design, Stephen Hawking and Leonard Mlodinow, 2010

Philosophy is dead, science makes the discoveries. M-theory is a candidate for a theory of everything. Descartes formulated the concept of rules of nature. Laplace postulated scientific determinism. Brains follow physical causes. Free will is an illusion, yet economics is based on it. Reality is a model and set of rules connected to observations. The book reviews the history of physics, e.g. Feynman, and concludes that the universe is a part of a multiverse, some of which have life, and began from nothing as a quantum event.

Digital Triage Forensics: Processing the Digital Crime Scene, Pearson and Watson, 2010

This process is intended to eliminate the overly busy lab delays between evidence gathering and analysis. It is different from the in-country RCFLs that are also backlogged. It has been used by Weapons Intelligence Teams since 2004 for cell phones and SIM cards which were used as part of tactical operations, activity records for payment, or detonators. Inspection is initially carried out by TALON robot. Photography in the dark avoids white light which may be targeted or interfere with others’ night-vision. Investigator bias is an issue for defense attorneys. The forensics exam consists of preparation, collection, examination, analysis and reporting. A computer BIOS’ clock may be set differently from standard time, so it must be checked and matched by forensic apps. Data on a cellphone can be accessed by other devices over networks or the cloud. There are specialized applications to review, bookmark and copy data from mobile devices and storage cards for investigative reports, e.g. for contacts, messages, call history and content. There is a glossary. Also see mobileforensics.wordpress.com or www.nfstc.org.

Point Omega, Don DeLillo, 2010

The visual mind consists of heat, space, stillness, distance, and time observes the narrator. “We want to be stones in a field” according to the subject of his film about a military analyst named Elster who also says that “The true life is not reducible to words…”. The title derives from their discussion about the evolution of matter and de Chardin’s ideas, a paroxysm, but the subject also desires another war to shape history. They do discuss the meaning of words like rendition. There is a lot of detail about the narrator’s and subject’s impressions of eachother and others. Elster’s daughter visits and the disappearances of she and the caretaker lead to a number of clues including those from his wife. Some disconnected scenes add others. The emotion of foreboding is enhanced by the prologue and epilogue in third person in 2006 where the author describes the viewing, and fateful viewers of, a slow-motion Hitchcock film which he saw several times and was where he got the idea for the novel. The middle four chapters are in first person. This number may be analogous to the stages of matter, humours or seasons referenced in the text. Both narrators discuss concepts of time, words, and film. The settings are NYC and the desert.

automotive

EFuel100, Earth’s First Home Ethanol System, a Product of E-Fuel Corporation

Welcome to BUMP!

benchmark Kraken JavaScript Benchmark

books

No Plot? No Problem!, Chris Baty, 2004

How to Write a Damn Good Novel Volume II, Frey 1994

climate

IEEE Spectrum: Pure-form Big Chill Scenario Seems Vindicated

Scientists warn geo-engineering unlikely to curb dramatic sea rise

cloud Strategy Roundtable: 5 Cloud Computing Opportunities for Entrepreneurs

cms Jambok

design 7 Excellent Websites To Get Design Feedback Visually Instead Of Emailing Back And Forth | Free and Useful Online Resources for Designers and Developers

marketing QR Codes: Are You Ready For Paper-Based Hyperlinks?

metal Neither Pen Nor Pencil: Write Endlessly In Metal | Gadget Lab | Wired.com

mobile

Pew Survey Finds Predictable Trends Among Mobile Phone Users

Internet Founder Tim Berners-Lee Details 4 Concerns About Future of Mobile Web (Nokia World 2010)

multitouch Multi-touch Technologies for Human-Robot Interaction: UMass Lowell Robotics Lab

network 5 Ways Networking is Being Reinvented

ocean YouTube – Rob Dunbar: The threat of ocean acidification

prediction Nicholas Christakis: How social networks predict epidemics | Video on TED.com

robotics

The HRP-4 humanoid robot unveiled

Honda’s Exoskeletons Help You Walk Like Asimo (video) | Singularity Hub

science Chinese science and technology has long way to go, says Russian expert

scribd The future of reading and publishing is social – Introducing new Scribd home and profile pages – The Scribd Blog

security

Mobile Forensics Central

E-Evidence Information Center – Home

Briggs Softworks: Directory Snoop – File Recovery and Wiping Software for Windows

simulation How galaxies are born inside computers

social-media Seven Important Social Media Trends For The Next Year

software Dr Dobbs – Google Relaunches Instantiations Developer Tools; Now Available for Free

surveillance Technology Review: Blogs: TR Editors’ blog: Intel Outlines An Era of Friendly Surveillance

test

Dr Dobbs – Code Coverage, Performance Profiling Tools Released

uTest Lands $13 Million For Software Testing Marketplace

transportation What happens when you leave a skateboard and a tank alone in a dimly lit room? (video) — Engadget

video YouTube – Chris Anderson: How web video powers global innovation

wearable Looxcie Wearable Camcorder: Capture Unexpected Moments

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »