Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘contest’

Ventral Casting

Posted by cadsmith on February 6, 2011

Apps for Development seeks evaluations. Sysadmins called to improve testability. Coverity leads market in automated software testing. Topicmarks does document summarization. Wrangler simplifies form-based data cleanup. Linked open data adds value. EMC released Greenplum visual language for big data. Canvas learning management system announced.

White house publishes innovation strategy. Startup America supports entrepreneurship. National Power Grid has security issues. FBI search engine developed. Local Motors announces transport design battle. National Security Space Strategy published. Russians resume plans for spaceplane. China announces 2020 science goals. Clean nuclear power is a priority in China. Japanese elderly not quick to accept bot care companions. RoboEarth networks bots globally. Surgeons communicate with nurse bots using gesture recognition. David Hanson’s bot heads advance.

Video discusses implants for humans and brains for bots. Heart cells are made from skin. Accelerometer is made of paper. Nestle tests products in huge stomach. Neer tracks group member locations. Ericsson texts money transfers. AT&T expands mobile banking. Walgreens fill prescriptions by cell cam. IntoNow promotes social TV. Digital museums are browsable in Google Art Project. There were thirty-three recent links.

Book Review:

Verification and Validation in Systems Engineering
This book looks at how architecture frameworks use SysML and UML 2.0. Techniques are classified as informal, static, dynamic or formal. These use inspection, testing, simulation, reference model equivalence checking and theorem proving. It proposes a unified approach to evaluate designs, including comparative metrics and procedures There is a case study of an ATM. Semantics, probabilistic behavior and performance analysis of activity diagrams are considered using the PRISM model. There are thirteen chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Pace Time

Posted by cadsmith on December 19, 2010

future of cities

Arbor graphs DDOS stats. The US is establishing an Internet Privacy Office. Supercomputer benchmark measures graph handling. CrisisCommons handles disaster data. List of computer mishaps. A simple site registration utility is provided by Facebook. S4 Momentum tracks social media. Social branding is marketed by Wildfire. Recommendations for Personal Media streaming. Spabba does bookmarking since delicious may be divested. SEO tips for ebooks. 750 Words has online writing editor. Video of Health 2.0 keynote by Tim O’Reilly. Contest offers health prize for in-patient predictions. Body Browser searches anatomy. Muro does browser-based art. Game development is free using UDK. Film-like mocap improves games. Cyborg beetles can fly. PR2 robots sold. Humanoid bot announced in France. Automated round vac prototyped. Startup tech trends listed in addition to Crowdfunding and Chile. Molten Salt stores energy. MapQuest has site in US. Thirty-one recent links added.

Books Reviews:

Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies, Panagiotis and Germanakos, 2008

This book is about how to improve findability. Major sections include theory, content, process, applications and security. Personalization refers to an individual’s or group’s unique needs and preferences. Adaptive features fit to these, context, and structure. Some of the common topics are user profiles, recommendation, models, hypermedia and e-government. Seventeen studies by thirty-eight contributors discuss categories such as privacy-enhanced personalization, emotional intelligence, e-learning assistants, open learner modeling, digital memories, cognitive style, adaptive parallel media stream servers, web usage mining, visualization methods, ontology-based, semantically adaptive, intelligent information, middleware architecture, web-based instruction, access/navigation/search, and adaptive hypermedia.

Surviving Cyberwar, Stiennon 2010
This book details methods of cyber intelligence. Cyberwar is dated from 2008 since, though there were network attacks a decade before, they were not coordinated military offensives. The author proposes four essential pillars which drive the war: technology, logistics, command and intelligence. Cases of social media being used for this as geopolitical tools are shown. Trojans are effective. Denial of service, the classic internet asault, is currently defended in ad hoc fashion. The simple assumption by network and endpoint security are that eachother are hostile, similarly by data for the user. It looks at the level of preparedness of major states and explains the US CNCI. Counterespionage has entered a new age. Future government depends upon how network security and privacy develop. There are fifteen chapters. It was published before the wikileaks controversy.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Crowdseason

Posted by cadsmith on December 12, 2010

091216

MakerBot has a 3D printer. Holograms are used for animation. Samsung offers 3D memory modules. Archaeology model shows an underground village. ChromeDeck is a browser app for Twitter. InteraXon mentally commands computers. New tool for scientific visualization. Drone navigates flight using terrain. Video of robotic strawberry picker. There is a contest for Cosmological Lensing analysis. Crowdsortium catalogs best practices. List of good data blogs. Google adds an eBookstore. OpenLeaks is new clearinghouse for curated secrets. There is a call for US technology investment by China. Shift has beta fashion site. Bacteria are used for computer circuits. Plants exhibit swarm intelligence. Collisions are expected between spacecraft and junk. Twenty-one recent links added.

Book reviews:

Integrating Usability Engineering for Designing the Web Experience: Methodologies and Principles, Spiliotopoulos and others, 2010
This book includes website usability cases, practices and theory. Quality factors are accessibility and user interfaces. Methods use development steps, questionnaires, scenarios, inspections and testing. Examples are shown for 3D apps, ecommerce, learning management systems, and marketing. Utilities are discussed such as literacy tools, screen-readers for blindness, and captions for deafness. It lists some of the regulatory guidelines. There are three parts for eighteen sections.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Endgame

Posted by cadsmith on November 21, 2010

Approaching the conclusion of the year, predictions for the next begin with announcements for the cloud and security. An easier messaging system is introduced for Facebook and AI may eventually use data. Gravity graphs interests. Ipad may have a new digital newspaper. A personal network supports photography. Indeed searches business classifies. States publish statistics. Developers can use head or gestural interfaces. Augmented reality is used to compose music. Robots learn by doing. Radio uses saltwater antenna. Stuxnet may have been built to change nuclear processing. Drones can survey Mars. Fins offered as prosthetics. A teacher plans to put a camera inside back of head. Climate is answerable to science. Carbon nanotubes are inflammable. Maxwell’s demon has been demonstrated. There are contests for movies, and med and bio images.

Recent links (from about twenty-eight):

This Video Will Blow Your Mind (Probably) | The Creators Project
YouTube – Authors@Google: Kevin Kelly
YouTube – Digital Art@Google: DJ Spooky

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , | 1 Comment »

To Be Is To Question

Posted by cadsmith on November 7, 2010

IBM personalizes internet. Australia has a digital city. Adobe adds cloud filesharing. Verify gets user feedback on screens. Impure visualizes data. A biological brain navigates a vehicle. In electric cars, a Chevy gets an IP address, and an Urbee is made on printer. Also in 3D, Janus does interactive scanning and holograms do displays. Invisible material disappears. Chip PC is in the plug. Blekko searches selected sites. Gdb does profiling. Sensors warn of landslides. Technoscience combines science and engineering.

Book reviews:

What Technology Wants, Kevin Kelly, 2010
The author seeks the essence of technology as a force the equal of nature. Technology has features such as evolution, complexity, specificity, diversity, and energy dependencies. He introduces the term technium as a form of civilization, an emergent system of accelerated life. Many advancements happen simultaneously in multiple places, e.g. the Axial Age. This is the result of new technologies increasing the odds of successors. There are four parts for fourteen chapters. It is written in an optimistic, mind-expanding style. He covers the ideas of many other authors such as Joel Garreau and W. Brian Arthur. There are twenty-books in the reading list including authors such as Ray Kurzweil and Steward Brand. Though not cited here, there have been efforts to formalize technology’s philosophical roots, theory, and predictions, reviewed earlier on this blog and google books.

Recent links (of about twenty-four):

video

YouTube – Tom Chatfield: 7 ways video games engage the brain
YouTube – Authors@Google: Alice Walker

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

Pathos Least

Posted by cadsmith on October 31, 2010

Shield-Nano-Blue-Brown-RGB-102px

The internet adds Everest and loses Tehran as US boosts broadband. WiFi direct protocol groups devices. Cell doubles as remote. Semantic web publishes R2RML and MathML 3. China boasts supercomputer lead. Computers used for emotion meter. Intel has press site. HealthTap individualizes care. Knight funds media contest. Security weaves code and judges cyberwar while Iranian hackers trade botnets. No math word problems, but some tips on stories versus statistics. Google does spreadsheet visualization and random street view. AutoBot links car to web. Traffic lights save gas. Digital museums open to public and print 3D. Nook adds color reader. NASA introduces A-Train and tests flight deck. Robots plug into brain and use beanbag hands.

Book reviews:

User Stories Applied, Mike Cohn, 2004

This approach is from Agile User-Centered Design. Stories can also be added to Scrum. Extreme programming, XP, centers on testing, automated and acceptance. The testing is for usability, performance and stress rather than code coverage. There are various techniques used for developing the stories. They are modular for estimation and testability. A case is shown for a workshop having user role cards and story cards. A story card is a reminder of features to discuss. Each bug report is considered its own story. The planning game customer prioritizes their user story cards for the next iteration after developers have indicated the effort estimations for each. Tests are prepared prior to the code. Stories are grouped. A paper prototype is created and refined before programming begins. The UI is postponed for as long as possible. User goals can be listed from which stories will be derived. Burndown charts are used to track iteration hours. Another measure of momentum is the number of story points over time where each is an estimate for an ideal workday. The term smells is used for problems between participants, e.g. customer won’t do the stories, for which solutions are proposed. There are four parts beside an appendix on extreme programming. Each has a chapter summary, responsibilities of the developer and customer, and questions.

Previous links (of about thirty-four):

video

The Poetry of Science: Richard Dawkins and Neil deGrasse Tyson – K21st Essential 21st Century Knowledge
YouTube – R.A. Mashelkar: Breakthrough designs for ultra-low-cost products
The Future of Money on Vimeo
Digg – Deadly Memory Card Testing: Overkill Edition [Video]

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , | 1 Comment »