Posted by cadsmith on October 31, 2010
The internet adds Everest and loses Tehran as US boosts broadband. WiFi direct protocol groups devices. Cell doubles as remote. Semantic web publishes R2RML and MathML 3. China boasts supercomputer lead. Computers used for emotion meter. Intel has press site. HealthTap individualizes care. Knight funds media contest. Security weaves code and judges cyberwar while Iranian hackers trade botnets. No math word problems, but some tips on stories versus statistics. Google does spreadsheet visualization and random street view. AutoBot links car to web. Traffic lights save gas. Digital museums open to public and print 3D. Nook adds color reader. NASA introduces A-Train and tests flight deck. Robots plug into brain and use beanbag hands.
User Stories Applied, Mike Cohn, 2004
This approach is from Agile User-Centered Design. Stories can also be added to Scrum. Extreme programming, XP, centers on testing, automated and acceptance. The testing is for usability, performance and stress rather than code coverage. There are various techniques used for developing the stories. They are modular for estimation and testability. A case is shown for a workshop having user role cards and story cards. A story card is a reminder of features to discuss. Each bug report is considered its own story. The planning game customer prioritizes their user story cards for the next iteration after developers have indicated the effort estimations for each. Tests are prepared prior to the code. Stories are grouped. A paper prototype is created and refined before programming begins. The UI is postponed for as long as possible. User goals can be listed from which stories will be derived. Burndown charts are used to track iteration hours. Another measure of momentum is the number of story points over time where each is an estimate for an ideal workday. The term smells is used for problems between participants, e.g. customer won’t do the stories, for which solutions are proposed. There are four parts beside an appendix on extreme programming. Each has a chapter summary, responsibilities of the developer and customer, and questions.
Previous links (of about thirty-four):
The Poetry of Science: Richard Dawkins and Neil deGrasse Tyson – K21st Essential 21st Century Knowledge
YouTube – R.A. Mashelkar: Breakthrough designs for ultra-low-cost products
The Future of Money on Vimeo
Digg – Deadly Memory Card Testing: Overkill Edition [Video]
Posted in Uncategorized | Tagged: 3D, automotive, aviation, books, computer, contest, digital-museum, health, internet, maps, mobile, news, robotics, satellite, security, semantic web, spreadsheet, standards, statistics, video, wireless, writing | 1 Comment »
Posted by cadsmith on September 27, 2010
There are signs of life swimming against the tidal forces. One may wonder how to test determinism itself, outside of philosophical scenarios. IT permeates most, if not all, domains. The fact that the volume of data exceeds comprehension invites advanced methods. Some of these preserve values. The inherent ideology affects conclusions. It is not clear how to prevent this. It is also a challenge to characterize it, but there seems to be a growing awareness of its significance going forward. In order to prevent narrow-minded short-sightedness, there are proposed diversities which mimic nature, however these can be bypassed through clever systemic exploitation of knowledge gaps or compartmentalization. This also occurs in analysis and operations. The security that defends also biases. Historically, things which are not protected tend to be plundered. Software is considered a work-around for bureaucracy, science a progression toward truth. Setting them at logger heads may have spectacular effects, as hardware can attest. If this is necessary, then a perceptive observer of the resultant chaos may discover an approach that surpasses the past. The next trick is to show the math.
Recent links (twenty-one):
JFK and the Unspeakable, James Douglass, 2008
This narrative covers the background to the fateful day. The thesis is that the protagonist, following the missile crisis, threw himself in the way of a nuclear bullet headed for the country. His predecessor had warned of a mil-industrial complex. The antagonist is a then Cold War organization, portrayed as acting like a separate state after he decapitated it, who saw withdrawal from the proxy war in Vietnam as a defeat. The title uses a phrase from theologian Thomas Merton. There are six chapters and an appendix speech. The author reportedly intended it as the start of a series which would also include MLK, MX and RFK.
zero history, William Gibson, 2010
The book describes a quest for military fashion. It is a character-driven continuation from the previous two novels which includes recent economic context. They have distinct manners and voices and are each chasing their own cultural trends. The title is about a character who has no credit record and the news assumes a death spiral. There is a lot of depth. Cool is yet unadvertised. Expert at their tradecraft, the players tend to go rogue. The setting is described in detail, London is like an “intricate antique toy … bought at auction”. Brand images from realworld things are compared like apps made from root code or true worth. It includes authentic samples of elite terminology. Locative art became augmented reality. Tracking is ubiquitous. The big ant figurine symbol shows up in luggage. There are eighty-seven chapters. Point-of-view changes among the major characters other than Big End. The audiobook lends it a voiceover quality.
YouTube – Steven Johnson: Where good ideas come from
Reconstructing Minds from Software Mindfiles Â« K21st â€“ Essential 21st Century Knowledge
Posted in Uncategorized | Tagged: ai, blog, books, calendar, climate, energy, geospatial, government, profile, quantum, robotics, security, space, test, video, voice, wireless, women | Leave a Comment »