-
Quality 4.0: Let's Get Digital - The many ways the fourth industrial revolution is resha** the way we think about quality
Authors:
Nicole M. Radziwill
Abstract:
The technology landscape is richer and more promising than ever before. In many ways, cloud computing, big data, virtual reality (VR), augmented reality (AR), blockchain, additive manufacturing, artificial intelligence (AI), machine learning (ML), Internet Protocol Version 6 (IPv6), cyber-physical systems and the Internet of Things (IoT) all represent new frontiers. These technologies can help imp…
▽ More
The technology landscape is richer and more promising than ever before. In many ways, cloud computing, big data, virtual reality (VR), augmented reality (AR), blockchain, additive manufacturing, artificial intelligence (AI), machine learning (ML), Internet Protocol Version 6 (IPv6), cyber-physical systems and the Internet of Things (IoT) all represent new frontiers. These technologies can help improve product and service quality, and organizational performance. In many regions, the internet is now as ubiquitous as electricity. Components are relatively cheap. A robust ecosystem of open-source software libraries means that engineers can solve problems 100 times faster than just two decades ago. This digital transformation is leading us toward connected intelligent automation: smart, hyperconnected agents deployed in environments where humans and machines cooperate, and leverage data, to achieve shared goals. This is not the worlds first industrial revolution. In fact, it is its fourth, and the disruptive changes it will bring suggest we will need a fresh perspective on quality to adapt to it.
△ Less
Submitted 17 October, 2018;
originally announced October 2018.
-
Quality and Innovation with Blockchain Technology
Authors:
Morgan C. Benton,
Nicole M. Radziwill
Abstract:
In recent years, hype surrounding the proliferation of blockchain-based technology has been significant. Apart from the creation of bitcoin and other cryptocurrencies, it has been difficult to determine what practical utility might lie in the adoption of blockchain, mainly because there are so few in existence at present. Even so, interest in the technology has increased tremendously. This paper i…
▽ More
In recent years, hype surrounding the proliferation of blockchain-based technology has been significant. Apart from the creation of bitcoin and other cryptocurrencies, it has been difficult to determine what practical utility might lie in the adoption of blockchain, mainly because there are so few in existence at present. Even so, interest in the technology has increased tremendously. This paper is a primer for software quality professionals. It briefly describes the history of blockchain technology, attempts to define and disambiguate terminology, fosters a general understanding of how blockchain works, and discusses how and why software quality professionals might want to invest time and energy in learning about, implementing, or using blockchain-based technologies in their own organizations -- or alternatively, improving the quality of blockchain technology itself.
△ Less
Submitted 5 October, 2017;
originally announced October 2017.
-
Design for X (DfX) in the Internet of Things (IoT)
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
Designing quality in is a cornerstone of modern quality management philosophies. Design for X (DfX) techniques provide guidelines, heuristics, and metrics to ensure that a particular quality attribute exists in a design. Although hundreds of papers have been published on DfX approaches, few researchers have explored systematically applying multiple DfX in a particular problem context. As the Inter…
▽ More
Designing quality in is a cornerstone of modern quality management philosophies. Design for X (DfX) techniques provide guidelines, heuristics, and metrics to ensure that a particular quality attribute exists in a design. Although hundreds of papers have been published on DfX approaches, few researchers have explored systematically applying multiple DfX in a particular problem context. As the Internet of Things (IoT) evolves, boundaries between people, computers, and objects will become less distinct, underscoring the need for more holistic design. Using mixed methods, this paper examines the utility of DfX in the emerging IoT ecosystem. We identify DfX that are applicable to IoT-related design, and find gaps that demand further research and development. The results from this study can be used to help designers and quality managers select or develop appropriate DfX to use in designing components for the Internet of Things (IoT), supporting actionable strategies for quality and customer satisfaction.
△ Less
Submitted 8 July, 2017;
originally announced July 2017.
-
Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a map** using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity Enh…
▽ More
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a map** using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity Enhancement Act of 2014. This map** can be easily adopted by organizations that are already using the NIST CSF for cybersecurity risk management to plan, manage, and continually improve cybersecurity operations. If an organization is not using the NIST CSF, this map** may still be useful for linking elements in accounting systems that are associated with cybersecurity operations and risk management to a quality cost model.
△ Less
Submitted 9 July, 2017;
originally announced July 2017.
-
Evaluating Quality of Chatbots and Intelligent Conversational Agents
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both). They provide conversational output in response, and if commanded, can sometimes also execute tasks. Although chatbot technologies have existed since the 1960s and have influenced user interface development in games since the early 1980s, chat…
▽ More
Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both). They provide conversational output in response, and if commanded, can sometimes also execute tasks. Although chatbot technologies have existed since the 1960s and have influenced user interface development in games since the early 1980s, chatbots are now easier to train and implement. This is due to plentiful open source code, widely available development platforms, and implementation options via Software as a Service (SaaS). In addition to enhancing customer experiences and supporting learning, chatbots can also be used to engineer social harm - that is, to spread rumors and misinformation, or attack people for posting their thoughts and opinions online. This paper presents a literature review of quality issues and attributes as they relate to the contemporary issue of chatbot development and implementation. Finally, quality assessment approaches are reviewed, and a quality assessment method based on these attributes and the Analytic Hierarchy Process (AHP) is proposed and examined.
△ Less
Submitted 15 April, 2017;
originally announced April 2017.
-
Improving Testability and Reuse by Transitioning to Functional Programming
Authors:
Morgan C. Benton,
Nicole M. Radziwill
Abstract:
Declarative styles such as functional programming (FP) are rapidly gaining ground on their imperative cousins, including procedural and object-oriented programming. The shift is subtle because it is happening within the context of multiparadigm programming languages such as JavaScript. FP is better suited to modern processes like test-driven development (TDD), and architectures like massively para…
▽ More
Declarative styles such as functional programming (FP) are rapidly gaining ground on their imperative cousins, including procedural and object-oriented programming. The shift is subtle because it is happening within the context of multiparadigm programming languages such as JavaScript. FP is better suited to modern processes like test-driven development (TDD), and architectures like massively parallel, cloud-based computing. This article describes the technical details that characterize the shift from imperative to FP and implications for software quality management, particularly reuse and testability.
△ Less
Submitted 21 June, 2016;
originally announced June 2016.
-
Bot or Not? Deciphering Time Maps for Tweet Interarrivals
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans who u…
▽ More
This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans who use scheduling services like TweetDeck and HootSuite, and non-human (bot) users. The results indicate that there are differences between the tweet interarrival patterns across these categories of users, and that time maps could potentially be used to automate the detection of bot accounts on Twitter. This could enhance social media intelligence capabilities, help bot developers build more human-like Twitter bots to avoid detection, or both.
△ Less
Submitted 20 May, 2016;
originally announced May 2016.
-
Counting arithmetic formulas
Authors:
Edinah K. Gnang,
Maksym Radziwill,
Carlo Sanna
Abstract:
An arithmetic formula is an expression involving only the constant $1$, and the binary operations of addition and multiplication, with multiplication by $1$ not allowed. We obtain an asymptotic formula for the number of arithmetic formulas evaluating to $n$ as $n$ goes to infinity, solving a conjecture of E. K. Gnang and D. Zeilberger. We give also an asymptotic formula for the number of arithmeti…
▽ More
An arithmetic formula is an expression involving only the constant $1$, and the binary operations of addition and multiplication, with multiplication by $1$ not allowed. We obtain an asymptotic formula for the number of arithmetic formulas evaluating to $n$ as $n$ goes to infinity, solving a conjecture of E. K. Gnang and D. Zeilberger. We give also an asymptotic formula for the number of arithmetic formulas evaluating to $n$ and using exactly $k$ multiplications. Finally we analyze three specific encodings for producing arithmetic formulas. For almost all integers $n$, we compare the lengths of the arithmetic formulas for $n$ that each encoding produces with the length of the shortest formula for $n$ (which we estimate from below). We briefly discuss the time-space tradeoff offered by each.
△ Less
Submitted 6 June, 2014;
originally announced June 2014.