Posted by cadsmith on February 14, 2011
Pen.io publishes pages. SpeakerText does transcription. TigerText does secure texting. Mobile Basecamp released. Automated reading clarifies historic maps. Cloud contest announced. HP challenges Google for cloud. Paygr does service classifieds. DIY blogs Ramshackle Solid and Homegrown Evolution feature case studies.
Universal flu vaccine handles all strains. DNA adhesives used to label valuables.
Anonymous claims Stuxnet source. Night Dragon virus penetrates energy firm systems. Medical Device Innovation Initiative fast tracks regulatory approvals. Unmanned combat air system US Navy X-47B tested.
Motorika provides robotic rehab. Affetto does realistic faces. Bilibot Project makes robotics cheaper. eRockit and YikeBike offer electric bikes.
Nanowires do computing. On-chip photonics speed up processing. There were twenty-five recent links.
Verification and Validation in Scientific Computing, Oberkampf and Roy, 2010
Scientific computing is finding more uses in engineering and research. This book is about model verification. The questions are how well a simulation matches an actual activity, or how to get experimental data for a mathematics of micro- and nano-scales, and whether reviewers will find the results credible. Verification activities are shown for software, solution, model and management. Predictive capability is summarized in several steps for identifying sources of uncertainty, characterizing them, estimating error and uncertainty in the system response quantities (SRQs), updating the model, and analyzing sensitivities. There are five parts for sixteen chapters, and an appendix.
Posted in Uncategorized | Tagged: aviation, cloud, computation, diy, ecommerce, hacking, health, maps, mobile, nanotech, optical, regulatory, robotics, security, sustainability, transcription, transportation, writing | Leave a Comment »
Posted by cadsmith on February 6, 2011
Apps for Development seeks evaluations. Sysadmins called to improve testability. Coverity leads market in automated software testing. Topicmarks does document summarization. Wrangler simplifies form-based data cleanup. Linked open data adds value. EMC released Greenplum visual language for big data. Canvas learning management system announced.
White house publishes innovation strategy. Startup America supports entrepreneurship. National Power Grid has security issues. FBI search engine developed. Local Motors announces transport design battle. National Security Space Strategy published. Russians resume plans for spaceplane. China announces 2020 science goals. Clean nuclear power is a priority in China. Japanese elderly not quick to accept bot care companions. RoboEarth networks bots globally. Surgeons communicate with nurse bots using gesture recognition. David Hanson’s bot heads advance.
Video discusses implants for humans and brains for bots. Heart cells are made from skin. Accelerometer is made of paper. Nestle tests products in huge stomach. Neer tracks group member locations. Ericsson texts money transfers. AT&T expands mobile banking. Walgreens fill prescriptions by cell cam. IntoNow promotes social TV. Digital museums are browsable in Google Art Project. There were thirty-three recent links.
Verification and Validation in Systems Engineering
This book looks at how architecture frameworks use SysML and UML 2.0. Techniques are classified as informal, static, dynamic or formal. These use inspection, testing, simulation, reference model equivalence checking and theorem proving. It proposes a unified approach to evaluate designs, including comparative metrics and procedures There is a case study of an ATM. Semantics, probabilistic behavior and performance analysis of activity diagrams are considered using the PRISM model. There are thirteen chapters.
Posted in Uncategorized | Tagged: application, art, books, contest, data, education, energy, identity, innovation, linked-data, medical, mobile, nutrition, programming, robotics, science, security, sensors, space, startup, test, text, tv, urban | Leave a Comment »
Posted by cadsmith on January 30, 2011
Data deluge includes new terms. State unites in Sputnik Moment prioritizing tech innovation. All-Seeing Eye test results in contention. Egyptian election revolt disconnects media excepting network surveillance. Cyber police activated in Iran. Facebook handles hacks from Tunisia. Bluetooth is useful to insurgents. Mobile phones are to be tested in space. Android 3.0 SDK announced. Digital docs use steganography. Universal memory seeks to replace flash and DRAM. Alternative energy may take about three more decades. Robot hands become more robust. Cloud bots get smarter. Visual microscopy automated. Autom supports weight reduction. There were twenty recent links.
The Next Decade, George Friedman, 2010
This book looks at the near future of US foreign relations in terms of a realignment of the balance of power through actions of the President as Commander-in-Chief. There are two themes, the unintended empire, and whether it can be managed to allow the republic to survive. The US global military supports economic policy. Its President is always engaged in the art of war. This will move beyond recent fear of rising oil prices and Jihadist war and establish surrogates in each region. While democracy, human rights and social progress are still important, strategy becomes more of a concern than ideology. The issues are economic, geopolitical, demographic and technological. There is an aging population, contracting workforce, and lack of water. The state, in the form of the DoD, is more powerful than the market for long-term investment. On the American contents, Cuba is likely to be a target of influence, Latin America will include Brazil, Argentina and Mexico. The latter’s violence and corruption will be resisted at the border and cartels are expected to be in control there, while US hypocrisy will scapegoat members of its government staff during investigations. Canada is stable. In Asia, Korea, Australia and Singapore balance Chinese splintering and Japanese assertiveness. India surges economically, but is not a threat to China, and is balanced by Pakistan to keep its expenditures on Army and Air. In Europe, Brits’ interests are closer to US, and Poland is important to containment since Germany dominates economically, backed by France allied with Russian military which seeks to balance US with radical Islam. Denmark blocks Baltic sea exits. NATO is irrelevant. In the Middle East, US withdraws from Iraq, distances from Israel, and has detente with Iran. Sunni Turkey eventually rises and is important to Russian containment in Balkans and Caucasus. There are fourteen chapters.
Posted in Uncategorized | Tagged: android, books, encryption, energy, hardware, information, mobile, network, research, robotics, security, surveillance, technology, test | Leave a Comment »
Posted by cadsmith on January 23, 2011
Mobile is hot as Google’s priority this year, app market of 25B in several years, Bubbly has voice tweets, and PLX XWave is a brain monitor. Tablets replace Wintel. Travel includes an all-automated hotel. Vending machines recognize faces. Philosophy promotes testing. Accessibility can be validated using A-Prompt and Cynthia Says. TestFlight can be used for IOS betas. Security has warnings about attack toolkits, non-Windows systems, printers, resumes, and smartphone seizure, though it may have over-hyped cyberwar. Remote guide dogs announced. Robotics features a comedian and window cleaner. DIY gets alerts from physical mailbox. Internet TV offered by Roku. 3D digitization is exploited for medical visualization. FEMA is looking to adapt to social media. Touch Press displays data dynamically in books. Qwiki searches for information experiences. Firefox 4 released in beta. There were 37 recent links.
Design Driven Testing: Test Smarter, Not Harder, Stephens and Rosenberg, 2010
DDT goals are to fulfill requirements, validate design and verify code. The tests are derived and refactored from the code. This is contrasted to test driven-design. The authors have implemented a process using UML dubbed ICONIX. A conceptual design is positioned midway between the use cases and detailed design. Ten-step lists are each outlined for TDD, DDT, unit, controller, scenarios, requirements, antipatterns, design, integration and algorithm testing. Sequence diagrams are shown throughout. Mock objects and services are used, and unit tests included in builds. There is some discussion of automation, but metrics are not detailed. The style of the book uses allegorical narratives based on satires of alice in wonderland and the temple of doom. This includes some poetry. There are twelve chapters and an appendix from original presentation on subject of use cases. Tips interspersed in the text, as well as inline notes or footnotes that link to other sources. Code samples demonstrate the techniques for a mobile Palm Pilot mapplet to do travel GIS hotel search for a web site.
Posted in Uncategorized | Tagged: accessibility, books, disaster, intelligence, internet, medical, mobile, philosophy, publishing, robotics, search, security, test, travel | Leave a Comment »
Posted by cadsmith on January 16, 2011
Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.
Fundamentals of Information Systems Security, Kim and Solomon, 2010
Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.
Posted in Uncategorized | Tagged: answers, automotive, digital-libraries, economics, identity, investing, network, news, optical, robotics, science, security, test, touchscreen, training, travel, video | Leave a Comment »
Posted by cadsmith on December 26, 2010
Mechanical Turk provides pool of internet beta testers. Mass High Tech has feed on startups. Google converts wave to shared spaces. Electronic authentication built into banknotes. Smart grid gets smarter. Hydrogen and oxygen produced using solar energy. Bruce Sterling discusses Wikileaks. Surveillance on police. New Year’s security trends. Software requests made by sysadmins. EditPad has online text editor. Delicious does semantic analysis. Groupon trains journalists. Local gifts shown on eBay. Wall St. computers trade on news. Numenta AI apps discussed. Pen provides biofeedback. Developer makes prosthetic tentacle. Gostai Jazz telebot. Eclipse Phase has posthuman game. New ScienceFiction.com site. New Zealand put UFO data online. The Last of the Humans 2010 second edition technothriller about the rise and fall of machine-controlled civilization on Earth was revised and expanded to eight chapters on Amazon and Scribd. Twenty-three links added. (Photo: Boeing X-45 )
Posted in Uncategorized | Tagged: administration, ai, aviation, collaboration, editor, forensic, games, hacking, investing, journalism, ntest, prosthetic, retail, robotics, scifi, security, semantic, smartgrid, solar, space, startup, writing | Leave a Comment »