Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘maps’

In Media Res

Posted by cadsmith on February 14, 2011

Pen.io publishes pages. SpeakerText does transcription. TigerText does secure texting. Mobile Basecamp released. Automated reading clarifies historic maps. Cloud contest announced. HP challenges Google for cloud. Paygr does service classifieds. DIY blogs Ramshackle Solid and Homegrown Evolution feature case studies.

Universal flu vaccine handles all strains. DNA adhesives used to label valuables.

Anonymous claims Stuxnet source. Night Dragon virus penetrates energy firm systems. Medical Device Innovation Initiative fast tracks regulatory approvals. Unmanned combat air system US Navy X-47B tested.

Motorika provides robotic rehab. Affetto does realistic faces. Bilibot Project makes robotics cheaper. eRockit and YikeBike offer electric bikes.

Nanowires do computing. On-chip photonics speed up processing. There were twenty-five recent links.

Book review:

Verification and Validation in Scientific Computing, Oberkampf and Roy, 2010

Scientific computing is finding more uses in engineering and research. This book is about model verification. The questions are how well a simulation matches an actual activity, or how to get experimental data for a mathematics of micro- and nano-scales, and whether reviewers will find the results credible. Verification activities are shown for software, solution, model and management. Predictive capability is summarized in several steps for identifying sources of uncertainty, characterizing them, estimating error and uncertainty in the system response quantities (SRQs), updating the model, and analyzing sensitivities. There are five parts for sixteen chapters, and an appendix.

Advertisements

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

Pace Time

Posted by cadsmith on December 19, 2010

future of cities

Arbor graphs DDOS stats. The US is establishing an Internet Privacy Office. Supercomputer benchmark measures graph handling. CrisisCommons handles disaster data. List of computer mishaps. A simple site registration utility is provided by Facebook. S4 Momentum tracks social media. Social branding is marketed by Wildfire. Recommendations for Personal Media streaming. Spabba does bookmarking since delicious may be divested. SEO tips for ebooks. 750 Words has online writing editor. Video of Health 2.0 keynote by Tim O’Reilly. Contest offers health prize for in-patient predictions. Body Browser searches anatomy. Muro does browser-based art. Game development is free using UDK. Film-like mocap improves games. Cyborg beetles can fly. PR2 robots sold. Humanoid bot announced in France. Automated round vac prototyped. Startup tech trends listed in addition to Crowdfunding and Chile. Molten Salt stores energy. MapQuest has site in US. Thirty-one recent links added.

Books Reviews:

Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies, Panagiotis and Germanakos, 2008

This book is about how to improve findability. Major sections include theory, content, process, applications and security. Personalization refers to an individual’s or group’s unique needs and preferences. Adaptive features fit to these, context, and structure. Some of the common topics are user profiles, recommendation, models, hypermedia and e-government. Seventeen studies by thirty-eight contributors discuss categories such as privacy-enhanced personalization, emotional intelligence, e-learning assistants, open learner modeling, digital memories, cognitive style, adaptive parallel media stream servers, web usage mining, visualization methods, ontology-based, semantically adaptive, intelligent information, middleware architecture, web-based instruction, access/navigation/search, and adaptive hypermedia.

Surviving Cyberwar, Stiennon 2010
This book details methods of cyber intelligence. Cyberwar is dated from 2008 since, though there were network attacks a decade before, they were not coordinated military offensives. The author proposes four essential pillars which drive the war: technology, logistics, command and intelligence. Cases of social media being used for this as geopolitical tools are shown. Trojans are effective. Denial of service, the classic internet asault, is currently defended in ad hoc fashion. The simple assumption by network and endpoint security are that eachother are hostile, similarly by data for the user. It looks at the level of preparedness of major states and explains the US CNCI. Counterespionage has entered a new age. Future government depends upon how network security and privacy develop. There are fifteen chapters. It was published before the wikileaks controversy.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Pathos Least

Posted by cadsmith on October 31, 2010

Shield-Nano-Blue-Brown-RGB-102px

The internet adds Everest and loses Tehran as US boosts broadband. WiFi direct protocol groups devices. Cell doubles as remote. Semantic web publishes R2RML and MathML 3. China boasts supercomputer lead. Computers used for emotion meter. Intel has press site. HealthTap individualizes care. Knight funds media contest. Security weaves code and judges cyberwar while Iranian hackers trade botnets. No math word problems, but some tips on stories versus statistics. Google does spreadsheet visualization and random street view. AutoBot links car to web. Traffic lights save gas. Digital museums open to public and print 3D. Nook adds color reader. NASA introduces A-Train and tests flight deck. Robots plug into brain and use beanbag hands.

Book reviews:

User Stories Applied, Mike Cohn, 2004

This approach is from Agile User-Centered Design. Stories can also be added to Scrum. Extreme programming, XP, centers on testing, automated and acceptance. The testing is for usability, performance and stress rather than code coverage. There are various techniques used for developing the stories. They are modular for estimation and testability. A case is shown for a workshop having user role cards and story cards. A story card is a reminder of features to discuss. Each bug report is considered its own story. The planning game customer prioritizes their user story cards for the next iteration after developers have indicated the effort estimations for each. Tests are prepared prior to the code. Stories are grouped. A paper prototype is created and refined before programming begins. The UI is postponed for as long as possible. User goals can be listed from which stories will be derived. Burndown charts are used to track iteration hours. Another measure of momentum is the number of story points over time where each is an estimate for an ideal workday. The term smells is used for problems between participants, e.g. customer won’t do the stories, for which solutions are proposed. There are four parts beside an appendix on extreme programming. Each has a chapter summary, responsibilities of the developer and customer, and questions.

Previous links (of about thirty-four):

video

The Poetry of Science: Richard Dawkins and Neil deGrasse Tyson – K21st Essential 21st Century Knowledge
YouTube – R.A. Mashelkar: Breakthrough designs for ultra-low-cost products
The Future of Money on Vimeo
Digg – Deadly Memory Card Testing: Overkill Edition [Video]

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , | 1 Comment »

Cell Complex

Posted by cadsmith on October 18, 2010

Usability test sites are listed below. Visualization has Circos tool. Machine learning can automatically read the web and derive laws from data. Biotech do-it-yourself has reached the garage stage. Japan has machines that win at chess, economize both heat and smartgrid, sing like humans, and crawl like snakes. Surveillance has video analytics and privacy concerns. Movies have character makeover. Security has memory hardware ID, Bugat trojan, cyber cold war and first strike alert. Space tourism is less than a couple of years away. Water shortages are prevented by intelligence, startups and solar power. Ebooks have self-publishing, search, blog converter, and writing nook.

Book reviews:

Undercover User Experience Design, Cennydd Bowles and James Box, 2010

This is a comprehensive do-it-yourself description about many facets of the topic. The undercover manifesto values bottom-up change, delivery, timeliness, sociability, and action. There are details about critiques, deliverables, design process and problems, research, usability testing, and UX design. UX adoption begins in web design, and proceeds to check-up, integration, ownership, allies, education, persuasion, trust, stories, skills, and ROI. The content of the book has dynamic highlights, notes appear in side-boxes. It has tips for Agile as well as waterfall design. There are recommendations for using the process with various types of customers including developers, visual designers, content specialists, product owners, marketers, SEO specialists and senior managers. It talks about metrics, A/B testing, common design review pitfalls. Types of test include rapid iterative testing and evaluation, and remote. Tools range from sketching wireframes and storyboards, to apps, to dedicated sites. Research methods include feedback, surveys, and third-parties. Author sites http://www.cennydd.co.uk and twitter.com/boxman.
Washington Rules: America’s Path to Permanent War, Andrew J. Bacevich, 2010

The title simultaneously refers to the beltway, namesake, possible result, and the name of the national security consensus since WWII which is no longer as effective. The sacred trinity now holds that the US needs global presence, power projections and interventionism. The inability to distinguish institutional well-being from that of the nation has led to the present conditions. This affected historical figures such as Allen Dulles, Curtis LeMay and Maxwell Taylor. The author takes issue with the way things have turned out for the US. The arguments are nonpartisan. The return to counterinsurgency demonstrates an abandonment of victory as an objective. The US could revert to the tradition of military for defense and Just War. Americans would see soldiers stationed in the country as citizen-protectors. This frees up resources to restore the economy.

Previous links (from about fifty-four):

test

Turn Visitors into Customers with Performable.
Easy User Experience research – whatusersdo.com
Webnographer Home
Remote Usability testing, online customer experience research, usability testing software. Userzoom
User Experience | Website Usability Testing and Evaluation
Usability Testing
Treejack :: Optimise your site structure using tree testing.
OpenHallway
Navflow
Remote & Online Usability Testing Tool | Loop11
IntuitionHQ, make website usability testing part of every website project
FiveSecondTest
CommandShift3 – It’s like Hot or Not for web design
Chalkmark :: First impression testing.

astronomy Planet hunters no longer blinded by the light | International Space Fellowship

automotive CarWoo!

climate Old Weather – Our Weather’s Past, the Climate’s Future

community Get Satisfaction | Customer Community Software – Love your Customers.

economics Coming Soon: World Government and Global Currency – Beyond Money

education Next Gen Learning Challenges

invention Dean of Invention : Planet Green – On TV

maps The Web 2.0 Summit Points of Control Map

social Multitude

social-networks MYCUBE

technology Garnter’s Newest Hype Cycle: Discuss

transportation Everyone’s Private Driver / UberCab

windows Windows Live Mesh 2011

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Act of Reason

Posted by cadsmith on October 3, 2010

derakshan

The internet is broadening as its component types become more speciated. It carries more virtual goods and prototypes by DIY makers. Cell phones handle mobile payment. Journalism trends are visualized. Social media is used to tell stories. Ebooks have new readers for Kindle and Blio. Data drives discovery. Original manuscripts are viewable. Fiction publishing includes anthologies of scifi. There is a backlash to blacklisting.

Recent links (about twenty-six):

video

YouTube – SingTel Cloud computing in Augmented Reality

YouTube – Sebastian Seung: I am my connectome

answers Quora

climate NASA – Climate@Home: Creating a Virtual Supercomputer to Model Climate

game Brain Odyssey

maps Polymaps

quality Mass offers “Seal of Commonwealth Quality” – Boston Business Journal

security Technology Review: Blogs: Mims’s Bits: The Hot New Thing in Biometric Security is… Ears

space

NASA – IBEX Finds Surprising Changes at Solar Boundary

A Habitable Exoplanet – for Real This Time | Wired Science | Wired.com

telepresence IEEE Spectrum: A DIY Telepresence Robot

Posted in Uncategorized | Tagged: , , , , , , , , | Leave a Comment »

Webia Potencia

Posted by cadsmith on April 26, 2009

flu

The digital consciousness is responding to a recent flu outbreak for which a vaccine is not yet available. This is putting global data handling and analysis systems to the test. An accurate dashboard was not yet obvious. Expect EMR improvements (in records and responder). Also see links from pandemic.

Evernote public folder allows a type of blog entry, though did not yet insert graphics, or have direct post from Windows Live Writer and Zemanta. Topic included Noë which may be relevant to testing worldware. User profile was not shown so appended contact to title. Site updates sent to friendfeed and facebook. Link added to blogs on wordpress and blogger.

This week’s reading list included Sankar 2009 on Enterprise Web 2.0, Melik 2007 about flatworld project management, Polikoff 2005 discussing capability cases, Hamilton 2004 NUnit.

Image: from HealthMap

Posted in Uncategorized | Tagged: , , , , , , , , , , , | Leave a Comment »