Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘identity’

Ventral Casting

Posted by cadsmith on February 6, 2011

Apps for Development seeks evaluations. Sysadmins called to improve testability. Coverity leads market in automated software testing. Topicmarks does document summarization. Wrangler simplifies form-based data cleanup. Linked open data adds value. EMC released Greenplum visual language for big data. Canvas learning management system announced.

White house publishes innovation strategy. Startup America supports entrepreneurship. National Power Grid has security issues. FBI search engine developed. Local Motors announces transport design battle. National Security Space Strategy published. Russians resume plans for spaceplane. China announces 2020 science goals. Clean nuclear power is a priority in China. Japanese elderly not quick to accept bot care companions. RoboEarth networks bots globally. Surgeons communicate with nurse bots using gesture recognition. David Hanson’s bot heads advance.

Video discusses implants for humans and brains for bots. Heart cells are made from skin. Accelerometer is made of paper. Nestle tests products in huge stomach. Neer tracks group member locations. Ericsson texts money transfers. AT&T expands mobile banking. Walgreens fill prescriptions by cell cam. IntoNow promotes social TV. Digital museums are browsable in Google Art Project. There were thirty-three recent links.

Book Review:

Verification and Validation in Systems Engineering
This book looks at how architecture frameworks use SysML and UML 2.0. Techniques are classified as informal, static, dynamic or formal. These use inspection, testing, simulation, reference model equivalence checking and theorem proving. It proposes a unified approach to evaluate designs, including comparative metrics and procedures There is a case study of an ATM. Semantics, probabilistic behavior and performance analysis of activity diagrams are considered using the PRISM model. There are thirteen chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Scrimmage LOC

Posted by cadsmith on January 16, 2011

Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.

Books Review:

Fundamentals of Information Systems Security, Kim and Solomon, 2010

Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »