Posted by cadsmith on January 16, 2011
Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.
Fundamentals of Information Systems Security, Kim and Solomon, 2010
Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.
Posted in Uncategorized | Tagged: answers, automotive, digital-libraries, economics, identity, investing, network, news, optical, robotics, science, security, test, touchscreen, training, travel, video | Leave a Comment »
Posted by cadsmith on November 7, 2010
IBM personalizes internet. Australia has a digital city. Adobe adds cloud filesharing. Verify gets user feedback on screens. Impure visualizes data. A biological brain navigates a vehicle. In electric cars, a Chevy gets an IP address, and an Urbee is made on printer. Also in 3D, Janus does interactive scanning and holograms do displays. Invisible material disappears. Chip PC is in the plug. Blekko searches selected sites. Gdb does profiling. Sensors warn of landslides. Technoscience combines science and engineering.
What Technology Wants, Kevin Kelly, 2010
The author seeks the essence of technology as a force the equal of nature. Technology has features such as evolution, complexity, specificity, diversity, and energy dependencies. He introduces the term technium as a form of civilization, an emergent system of accelerated life. Many advancements happen simultaneously in multiple places, e.g. the Axial Age. This is the result of new technologies increasing the odds of successors. There are four parts for fourteen chapters. It is written in an optimistic, mind-expanding style. He covers the ideas of many other authors such as Joel Garreau and W. Brian Arthur. There are twenty-books in the reading list including authors such as Ray Kurzweil and Steward Brand. Though not cited here, there have been efforts to formalize technology’s philosophical roots, theory, and predictions, reviewed earlier on this blog and google books.
Recent links (of about twenty-four):
YouTube – Tom Chatfield: 7 ways video games engage the brain
YouTube – Authors@Google: Alice Walker
Posted in Uncategorized | Tagged: 3D, automotive, books, cloud, cognitive, contest, disaster, engineering, holography, internet, materials, pc, profiler, robotics, search, test, video, visualization | Leave a Comment »
Posted by cadsmith on October 31, 2010
The internet adds Everest and loses Tehran as US boosts broadband. WiFi direct protocol groups devices. Cell doubles as remote. Semantic web publishes R2RML and MathML 3. China boasts supercomputer lead. Computers used for emotion meter. Intel has press site. HealthTap individualizes care. Knight funds media contest. Security weaves code and judges cyberwar while Iranian hackers trade botnets. No math word problems, but some tips on stories versus statistics. Google does spreadsheet visualization and random street view. AutoBot links car to web. Traffic lights save gas. Digital museums open to public and print 3D. Nook adds color reader. NASA introduces A-Train and tests flight deck. Robots plug into brain and use beanbag hands.
User Stories Applied, Mike Cohn, 2004
This approach is from Agile User-Centered Design. Stories can also be added to Scrum. Extreme programming, XP, centers on testing, automated and acceptance. The testing is for usability, performance and stress rather than code coverage. There are various techniques used for developing the stories. They are modular for estimation and testability. A case is shown for a workshop having user role cards and story cards. A story card is a reminder of features to discuss. Each bug report is considered its own story. The planning game customer prioritizes their user story cards for the next iteration after developers have indicated the effort estimations for each. Tests are prepared prior to the code. Stories are grouped. A paper prototype is created and refined before programming begins. The UI is postponed for as long as possible. User goals can be listed from which stories will be derived. Burndown charts are used to track iteration hours. Another measure of momentum is the number of story points over time where each is an estimate for an ideal workday. The term smells is used for problems between participants, e.g. customer won’t do the stories, for which solutions are proposed. There are four parts beside an appendix on extreme programming. Each has a chapter summary, responsibilities of the developer and customer, and questions.
Previous links (of about thirty-four):
The Poetry of Science: Richard Dawkins and Neil deGrasse Tyson – K21st Essential 21st Century Knowledge
YouTube – R.A. Mashelkar: Breakthrough designs for ultra-low-cost products
The Future of Money on Vimeo
Digg – Deadly Memory Card Testing: Overkill Edition [Video]
Posted in Uncategorized | Tagged: 3D, automotive, aviation, books, computer, contest, digital-museum, health, internet, maps, mobile, news, robotics, satellite, security, semantic web, spreadsheet, standards, statistics, video, wireless, writing | 1 Comment »