Test Information Space

Journal of Tech, Testing and Trends

Posts Tagged ‘research’

Info Ops

Posted by cadsmith on January 30, 2011

Data deluge includes new terms. State unites in Sputnik Moment prioritizing tech innovation. All-Seeing Eye test results in contention. Egyptian election revolt disconnects media excepting network surveillance. Cyber police activated in Iran. Facebook handles hacks from Tunisia. Bluetooth is useful to insurgents. Mobile phones are to be tested in space. Android 3.0 SDK announced. Digital docs use steganography. Universal memory seeks to replace flash and DRAM. Alternative energy may take about three more decades. Robot hands become more robust. Cloud bots get smarter. Visual microscopy automated. Autom supports weight reduction. There were twenty recent links.

Book review:

The Next Decade, George Friedman, 2010
This book looks at the near future of US foreign relations in terms of a realignment of the balance of power through actions of the President as Commander-in-Chief. There are two themes, the unintended empire, and whether it can be managed to allow the republic to survive. The US global military supports economic policy. Its President is always engaged in the art of war. This will move beyond recent fear of rising oil prices and Jihadist war and establish surrogates in each region. While democracy, human rights and social progress are still important, strategy becomes more of a concern than ideology. The issues are economic, geopolitical, demographic and technological. There is an aging population, contracting workforce, and lack of water. The state, in the form of the DoD, is more powerful than the market for long-term investment. On the American contents, Cuba is likely to be a target of influence, Latin America will include Brazil, Argentina and Mexico. The latter’s violence and corruption will be resisted at the border and cartels are expected to be in control there, while US hypocrisy will scapegoat members of its government staff during investigations. Canada is stable. In Asia, Korea, Australia and Singapore balance Chinese splintering and Japanese assertiveness. India surges economically, but is not a threat to China, and is balanced by Pakistan to keep its expenditures on Army and Air. In Europe, Brits’ interests are closer to US, and Poland is important to containment since Germany dominates economically, backed by France allied with Russian military which seeks to balance US with radical Islam. Denmark blocks Baltic sea exits. NATO is irrelevant. In the Middle East, US withdraws from Iraq, distances from Israel, and has detente with Iran. Sunni Turkey eventually rises and is important to Russian containment in Balkans and Caucasus. There are fourteen chapters.

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , | Leave a Comment »

Rainbow Positioning System

Posted by cadsmith on May 5, 2010


Following request for comment, new ideas may invoke defensiveness in some, delightful evaluation in others, and possibly incomprehension requiring eventual rediscovery in yet others. Media is emergent though not yet autonomous. It still takes conscious people to make meaning of change, or to consider relevance and consequence. Automated research may eventually yield familiar forms of presentations, but automated reality may seem comparatively upside-down if information density increases by miniaturization. This would be a new context for adaptation. Perhaps philosophy can reinforce and extend the scale of tech and scope of cultural dependencies, if it can survive inquiry. Predicting business requires betting on future value.

Recent bookmarks. Futurict promotes a sustainability clearinghouse. Academia.edu has a topic researcher directory. NASA astrobiology site. Japan plans a lunar robot. Acquia discusses cloud webservice hosting architecture in video. Amsterdam’s Usabilla supports website testing. Spirent offers cloud testing. Pogoplug adds USB cloud storage. Layar hosts an augmented reality marketplace. Textie.me does ipad messsaging. Dailyplaces produces location-based microblogging. Google living stories is now on wordpress.

Book reviews include:

Decoding Reality: The Universe as Quantum Information, Vlatko Vedral, 2010. The news is that a symmetrical pair of processes, the second law of thermodynamics and derived meaning, are enough to generate reality. This bootstraps the existence of information which outweighs matter and energy, while the universe moves to maximize entropy and disorder, and we embody natural laws. That provides a source of ideas which the scientific method, or its analogs in other disciplines, turns into rules of nature. Quantum physics reveals meaning and the other side of the story of creation. The author synthesizes a coherent framework for quantum information science. Landauer’s principle that information is physical, where entropy is proportional to surface area, inspires a combination with Shannon’s information as inverse probability, Boltzmann’s constant, and qubits, to yield randomness at small scales and determinism at large. Twelve chapters explore perspectives of biology, thermodynamics, economics, computer science, sociology, philosophy and quantum physics. Each chapter mixes explanation, observation, anecdotes and humor, and is followed by a summary of the key points. Applications include cryptography, teleportation, climate, diet, segregation and gambling. Literature sources include Popper, Smolin, and Singh. Compare publications by Seth Lloyd, George Johnson, Michael Nielsen and Isaac Chuang, Amir Aczel or Raymond Kurzweil. The challenge is to integrate gravity to quantum physics.

Whole Earth Discipline: An Ecopragmatist Manifesto, Stewart Brand, 2009 This book ambitiously attempts to capture trends in the areas of climate change, urbanization and biotech. There is a lot of data and requirements for much more. It is wordy and tries to wrap a scientific narrative.around things that hold promise for solving issues. The author is optimistic that new tech will provide alternatives and that human nature will shed romanticism for pragmatism. This is a unique datapoint along the scales that, for other authors, would produce do it yourself instructions, computation engines, cognitive advances, nanomanufacturing, human genetic engineering, martial law, or extinction.. It is rather a wholesome approach that prescribes sober effort to get hard data, especially needed about oceans, so that a feasible bearing can be selected from among these currents amid changing forecasts. Readers are treated to statistics about the “city planet” or unlimited growth and economics which include cell phones, electricity, squatters and crime. Nuclear power has become a commodity at the same time as weapons foreshadow the high cost of failure. The upside of genetically modified crops and foods, microbes, metagenomics, and biofuels is examined. Big nations will figure out solutions and curb their toxic tendencies. The author’s roots in the whole earth catalog revisit conservationism, native American Indians, and the oratory of Jerry Brown. This is an anthropocene age demanding new ethics and politics. There is a lot to criticize and be cautious about, which is also the point since the folklore arguments have become outmoded. The resolve is biased and it makes demands of near-future generations which may have local dissenters. The human eye can discriminate shades the most for the color green so that label may not automatically be a consensus builder. As far as the presentation, the layout could stand some alterations, e.g. to add graphics, swap the multi-page bullets for conciseness, and highlight conclusions amid the alternating pluses and minuses. The author was an originator of notions of planetary consciousness who still knows the players so this may be a brief breath of fresh air for those bogged down by confusing terminology and contradictory innovations.

The Windup Girl, Paolo Bacigalupi, 2009 The author presents a very detailed rendering of a near-term survivalist future where the biological clock has been conquered and greed drives society. The genre has been termed biopunk and also has touches of steampunk. A corrupt centralized Thai government controls the population. Corporate foodstuffs are genetically modified and licensed, and plague terrorists maintain scarcity levels for demand and prices. Scientists create synthetic animals and people as slaves. The characters are representative of the major functions of each of the sectors who try their best to succeed, and are combined in various ways to heighten the drama. They see each other through blinders that support their own egotistic biases. The author builds up elaborate structures and then destroys them, naturally, in personal spats, and in battle. A belief in reincarnation rationalizes the sacrifices. The story is told in third person omniscient perspective and, at emotionally intense times, has brief first person thoughts in italics. Each of the fifty chapters is a type of cliff-hanger. The cover art is representative of many of the characteristic elements including the big four-tusked megadonts and their mahouts, dirigibles, and green methane lamps. Some of the characters are from previous short stories. The title New Person combines DNA refinement, extraordinary training, robotic obedience, the resignation of a prisoner, jittery movements for identification, and perfect skin with pores too tiny to cool temperature enough. Others are used as soldiers in Vietnam. This is a cynical world where each potential improvement seems to engender constraints that neutralize or outweigh it. Blade Runner had replicants, but they were used off-world and did not survive long. The biology is more normal than Mieville. Brands’ nonfiction Whole Earth has symmetrical biotech, urbanization and climate though it is more optimistic. A setting in America may have had less mysticism, or in India more divergence of best and worst conditions. The earth does not turn into Mars or Venus here, but it does not seem able to return to any recognized conservationist stage either.

The Annotated Turing: A Guided Tour Through Alan Turing’s Historic Paper On Computability and the Turing Machine, Charles Petzold, 2008. Discusses what can happen when a mathematician attempts to design hardware, actually a mechanical process of proof, yielding a universal virtual machine using notions of finite state and storage, and beginning the field of computer science. This is a tour through mathematical history and a demonstration of how thoughts can be clarified, though details of the existential origins in time of national crisis may be hidden. The subject, one of the most often-cited papers of the century, e.g. impressing Claude Shannon during a meeting prior to his publication about information theory, had ideas which non-mathematicians also sought to understand for potential uses, and which continue to inspire approaches to logical problem-solving. The book author’s style is conversational as if second person directly to the reader. The contents of the original are presented intact with background, biography and blanks filled in enough to translate it to English for the casual reader. There is an extensive bibliography around the scientist and topic.

Posted in Uncategorized | Tagged: , , , , , , , | Leave a Comment »

“… Why Tigers Eat Their Young”

Posted by cadsmith on August 23, 2009

While not yet at the stage of mob behavior resulting from nanobots or neurobots within an internet of genes, the issue of botnets becomes more dramatic due to the simultaneous ease of concealment and scale of effect. Defensive efforts on all sides include a sort of philogeny, or species differentiation, for next generation networks that seek immunity from compromise, e.g. infrastructure utilities, government, and branches of robotics dedicated to security applications. Bots can be bought, and their nets, at least temporarily, assigned to arbitrary tasks through software which is downloaded to all, or specific, clients under herder control. Ideally, this will not reach things like online or absentee ballots in an election, or tax calculations, or the command-and-control systems of emergency management agencies. Pirate applications beat the system by routing transactions world-wide so that illicit goods or services, possibly counterfeit, can easily be distributed and rewards laundered. This is a lucrative franchise which depends upon the unemployed or uneducated to carry out the client recruiting and administration using relatively cheap and easy software developed by experts. There are reports of use against enemies of the state. Government enacts laws to neutralize perpetrators and track and whack cashflow. Military shuts down offenders which may have a high attrition rate as alternate networks assume the load to continue operations. Networks form supercomputers which both allow rapid development and introduce extreme risks. Consider a virtual API to perform large-scale functions using available resources, either open-source or heavily funded from illicit gains from fraud or extortion, so that the villains think that they have control of the internet and related intelligence gathering. (Incidentally, title is part of quote attributed to Al Capone.) Right now there is a lot of infighting. Eventually virtual PCs, possibly disposed of after they carry out actions, exhibit a realtime battle for supremacy. If media is based on volume, then there may seem to be social effects which are actually automatically generated.

Scientific methodology has previously yielded solutions for past grand challenges so timely participation is invited, e.g. on the part of testers. Ultimately there is a trade-off between public awareness reducing market size as user experience degenerates and social overhead costs climb, and arms-dealer-types attempting to increase security market.

Researchers may neutralize botnets and leave installed for active metrics as they interact with others. Custom admin apps add commands for performance analysis, antivirus monitoring and various alarms. This begins from familiar intranet and web testing and proceeds to reveal relevant structures and anomalies for botnets. Reports include statistics about number of clients and servers, non-intrusive network flow analysis, bandwidths, attack profiles, channel characterization, local or remote or coordinated bursty or persistent effects, dormancy periods to evade detection, encryption types, static and temporary IP addresses, types of accounts and website or device degradation and downtime. There are filters at DNS registrars, some of which turn out to be rogues.

Also see topic wiki.

Image: Circle of Spam

Posted in Uncategorized | Tagged: , , , , | 2 Comments »


Posted by cadsmith on July 19, 2009

As constraints are relaxed during design or debugging, the range of speculation tends to increase. Test efforts may be limited by specifications. If one disregards conventional wisdom, then a different picture can emerge. Eliminating compartmentalization may be representative of independent developments or reveal the bull. Local conceptual markers might include HIDE, The Engine, Encopy, tablet slices, metal ontology, Affinity, Trusted Menu, or Space Central, aspects of which indicate essential themes which may invite permutation. Fract is, an indicator of significance includes running into flack which may require renewing resources from the bench. For further entanglement, see TIS evolution and slide summary.

Mcafee account on a system required renewal. After completion, continued to get popups concerning expiration. Solution was to uninstall and reinstall the application so that it could synchronize.

The book Sawyer 2009 is web scifi. Documents page added finds by Spair 2009, Tantri 2009 and Rajasekar 2008.

Image: du monde.

Posted in Uncategorized | Tagged: , , , , , | 1 Comment »

Social Weave

Posted by cadsmith on June 21, 2009

Email forms a primary social network according to Jeremiah Owyang. Since more functionality seems to be needed, custom scripts would be appropriate. Asked LinkedIn about practices and it echoed warnings of impending Google Wave. Upcoming open-source cross-browser extensions and API will take advantage of built-in media and contact handling, e.g. using HTML5. It is reportedly coded using Google Web Toolkit (GWT), which is also discussed in  Hanson and Tacy 2007.

Other wiki additions included Croll 2009 on performance, Hurley 2007 on security.

Can use HTTrack to copy web site content. Parts of Test Info Space can be downloaded into a project for off-line review.

A web service can be run directly from a device using Opera Unite for browser-based collaboration which includes darknets.

Twitter beached the fail whale and graduated from recent celebrity status to geopolitical journalism concerning Iran election. There may be more exceptions in the midst.

Posted in Uncategorized | Tagged: , , , , , , , , , , | Leave a Comment »


Posted by cadsmith on May 31, 2009


Consider whether an ideal tester can emerge from a distributed repository such as Test Info Space, or what a utility of this nature would be like. The effort might lead to a knowledge base to support development and validation efforts, if not as straightforward as a spell-checker for an editor, then at least to assist in browsing, documentation or presentation. A private cloud or internal network might add or replace web content.

Assume that the purpose of the tool is for debug, test and diagnostics. It would have some form of search, e.g. keyword or semantic, a Q&A ability or directory, recommendation generator, a logging mechanism for tracing or reuse, and scripting for automation. It is a composite of sources including history, state of the art, and research. Users can lookup concepts to find descriptions and supporting links, or test cases to match solutions by example. It can provide comparisons by similarity, counter, or uniqueness. This might be done at a high level of methodology or fine-tuned by fields, domains, characteristics, indications, and tradeoffs, or deduced from issues such as data, analysis or symptoms. Rankings can be sorted by title, author, editions, style, level of difficulty, citations, prerequisites, mathematics, and so on.

The present wiki includes pages for each title showing authors, publication date, category, tags, links to content, external links, possibly a book site, other media, and user comments. Sources usually have some combination of table of contents, glossary, index, notes, hyperlinks, bibliography, code and exercises. These may be in any of various formats, e.g. PDF, HTML, hardcover, paperback, flash or e-reader. External pages or bookmarks may provide a booklist linked to the wiki pages. There may also exist other reviews or a synopsis. Authors have biographies, publications, blogs, organizations, teams, social networks and feeds. Tools have sources, possibly open-source, vendors, costs, and dependencies or chains. Projects can be active or archive.

New wiki pages include Guernsey 2009 on databases, Ogrinz 2009 on enterprise mashups, Resig 2006 on javascript, and Newkirk 2004 on test-driven development (TDD).

Image: TIS topic list

Posted in Uncategorized | Tagged: , , , , , , , , , , , , , , | Leave a Comment »