Continuous improvement with PDCA

As a QA an important part of your tasks consists of continuous improvement of your Test and delivery process. Being a key member of your organisation you will have to participate in different workshops, meetings and trainings in order to figure out the best balance you and your team can achieve within the classic challenges of Cost Time and Scope What is PDCA ? SQA ? According to Wikipedia : PDCA (plan–do–check–act or plan–do–check–adjust) is an iterative four-step management method used in business for the control and continual improvement of processes and products. It is also known as the Deming circle/cycle/wheel, control circle/cycle, or plan–do–study–act (PDSA). Software quality assurance (SQA) consists of a means of monitoring the software engineering processes and methods used to ensure quality.[citation needed] The methods by which this is accomplished are many and varied, and may include ensuring conformance to one or more standards, such as ISO 9000 or a model such as CMMI. Based on the definitions above it is obvious that the PDCA method is — regardless of your organisation strategy — a good fit for your overall quality assurance approach to improve the delivered products. PDCA Cycles Below each cycle Plan — Do — Check — Adjust will be explained Plan The first thing to do is to collect and analyse data by collecting information from multiple projects in order to identify the positive and negative points of each project at every phase ( design, development, testing…). For each negative point, a root… Read more



SE and 7816 Protocol: The Core of Smart Card Technology

Smart cards have become an indispensable part of our daily lives, used in various applications such as finance, transportation, and identity verification. At the heart of smart card technology lies the Secure Element (SE) and the 7816 protocol, which together form the foundation of security and reliability. In this blog post, we will delve into the history, application scenarios, technical details, and implementation methods of SE and 7816 protocol. Secure Element (SE) Definition A Secure Element (SE) is a microprocessor chip specifically designed for security applications, used in smart cards, mobile devices, and other electronic devices. The primary function of an SE is to provide secure storage, computation, and encryption services, protecting sensitive user information from unauthorized access or leakage. History The history of SE dates back to the 1980s, when smart cards were first emerging, and there was a need for a secure microprocessor to protect user information. As smart card technology advanced, SEs evolved to become more secure, faster, and reliable. Application Scenarios The application scenarios of SEs are diverse and widespread, including: Smart cards: SEs are the core component of smart cards, responsible for storing and processing user information.Mobile devices: SEs are used to protect user information related to mobile payments, identity verification, and other sensitive data.Tablets and laptops: SEs are used to protect user information and commercial secrets. 7816 Protocol Definition The 7816 protocol is a standard protocol in the smart card industry, defining the communication protocol between smart cards and readers. The protocol was first… Read more



The History of Bluetooth: From Concept to Ubiquity

In the 1990s, the world was on the cusp of a wireless revolution. The rise of mobile phones, laptops, and personal digital assistants (PDAs) had created a demand for a technology that could connect these devices without the need for cables. This was the genesis of Bluetooth, a wireless personal area network (PAN) technology that has since become ubiquitous in modern life. The Conceptual Phase (1994-1997) In 1994, a team of engineers at Intel, led by Dr. Jaap Haartsen, began exploring the concept of a wireless technology that could connect devices over short distances. They were joined by engineers from IBM, Toshiba, and Nokia, and together they formed the Bluetooth Special Interest Group (SIG). The name “Bluetooth” was chosen in honor of a 10th-century Danish king, Harald Blåtand, who united warring factions in Denmark – a fitting moniker for a technology that aimed to unite disparate devices. The First Specification (1998) In 1998, the Bluetooth SIG released the first public specification, version 1.0. This initial release defined the core principles of Bluetooth, including the use of radio frequency (RF) signals to transmit data between devices, and the concept of device discovery and pairing. The specification also outlined the various profiles, or use cases, that Bluetooth would support, such as headset and file transfer. Early Adoption (1999-2002) The first Bluetooth devices began appearing in 1999, with the introduction of Bluetooth-enabled headsets and adapters. However, early adoption was slow, due in part to the limited range and speed of the technology. It… Read more



Making an iBeacon App

First things first Beacon technology provides location data much like GPS. But beacons are not a replacement for GPS technology. While the actual workings of the two technologies vary drastically, the end result is similar. The main selling point of beacons is their ability to provide a user’s location at a more granular level and in areas that GPS can’t reach. iBeacon apps actually benefit greatly from integrating GPS functionality, more on that later.I recently finished working on “The Manifest Experience”, an iBeacon app for the digital agency I work at. The app’s purpose centers around welcoming guests to our office. It also gives them access to location specific details about our space. We built the app as a way to explore the technology and become more familiar with it’s strengths and weaknesses. During the development process I was able to freely experiment with iBeacons. We experimented with new ways to utilize the technology and ended up providing a pretty unique end-user experience. You can find the app on the AppStore here: https://itunes.apple.com/us/app/manifest-experience-st.-louis/id929868569?mt=8 NOTE: I’m linking to provide additional context, no need to download it. The app isn’t useful to people that aren’t around our STL office. Quick Look into The Manifest Experience After downloading the app, the user enters some basic information, setting up a small profile of sorts. When a user walks into the office, the app detects the iBeacon at the entrance. The app then sends the users name and photo up to a web service. That web service… Read more



Bluetooth Categories: Understanding Classic and Low Energy Bluetooth

Bluetooth technology has become extremely popular in recent years as a wireless personal area network technology, widely used for data exchange and communication between various devices. Bluetooth technology can be categorized into two main types: Classic Bluetooth and Bluetooth Low Energy (BLE). Classic Bluetooth Classic Bluetooth is the early version of Bluetooth technology, released in 1998. Its primary features include high-speed data transfer and real-time voice transmission, making it suitable for applications that require high-speed data transfer and real-time communication. Classic Bluetooth’s maximum data transfer rate can reach up to 723KB/s, making it ideal for audio and video streaming. The applications of Classic Bluetooth are diverse, including: Wireless headsets and speakers: Classic Bluetooth provides high-quality audio transmission, making it suitable for wireless headsets and speakers. File transfer between mobile phones and computers: Classic Bluetooth enables fast file transfer, making it ideal for transferring large files between mobile phones and computers. Game controllers: Classic Bluetooth provides real-time data transmission, making it suitable for game controllers and game consoles. However, Classic Bluetooth also has some drawbacks, including: High power consumption: Classic Bluetooth requires relatively high power consumption, which can affect the battery life of devices. Complex connection process: The connection process of Classic Bluetooth is relatively complex, requiring devices to undergo complex authentication and encryption. Bluetooth Low Energy (BLE) Bluetooth Low Energy is the latest version of Bluetooth technology, released in 2010. Its primary features include low power consumption and low cost, making it suitable for applications that require low power consumption… Read more



Bluetooth: The Wireless Technology That Connects Our Lives

Bluetooth is a wireless personal area network (PAN) technology that has become an essential component of our daily lives. From smart home devices to medical equipment, Bluetooth is used in a wide range of applications that make our lives more convenient, efficient, and connected. In this article, we’ll explore the various applications and use cases of Bluetooth, and examine how this technology is transforming industries and improving lives. Smart Home Devices One of the most popular applications of Bluetooth is in smart home devices. From thermostats to lighting systems, Bluetooth-enabled devices allow homeowners to control and monitor their homes remotely using their smartphones or tablets. For example, Philips Hue smart light bulbs use Bluetooth to connect to a user’s smartphone, allowing them to control the lighting in their home from anywhere. Wearables and Fitness Trackers Bluetooth is also widely used in wearables and fitness trackers. Devices such as smartwatches and fitness trackers use Bluetooth to connect to a user’s smartphone, allowing them to track their fitness goals, receive notifications, and control their music playlists. For example, Apple Watch uses Bluetooth to connect to an iPhone, allowing users to receive notifications, track their fitness goals, and control their music playlists. Audio and Music Bluetooth is a popular technology in the audio industry, allowing users to stream music wirelessly from their devices to speakers, headphones, and earbuds. For example, wireless headphones such as Beats and Bose use Bluetooth to connect to a user’s smartphone, allowing them to stream music wirelessly. Healthcare Bluetooth… Read more



Emulating USB Protocol over BLE for Data Transfer

As the Internet of Things (IoT) continues to grow, the need for efficient and reliable data transfer between devices has become increasingly important. One approach to achieve this is by emulating the Universal Serial Bus (USB) protocol over Bluetooth Low Energy (BLE) technology. In this blog, we will explore the concept of emulating USB protocol over BLE and provide a detailed implementation guide for computer enthusiasts. Introduction to BLE and USB BLE is a wireless personal area network technology that allows devices to communicate with each other over short distances. It is commonly used in IoT devices, wearables, and other low-power applications. USB, on the other hand, is a widely used interface standard for connecting devices to a computer. Emulating USB Protocol over BLE To emulate the USB protocol over BLE, we need to create a virtual USB device on the BLE device and configure it to communicate with the computer as if it were a physical USB device. This involves creating a BLE service that mimics the USB device’s behavior, including its interface, endpoints, and device class. Hardware and Software Requirements To implement this project, you will need the following hardware and software components: A BLE module (e.g., nRF52832 or CC2541)A microcontroller (e.g., STM32 or Arduino)A USB device (e.g., USB storage device or USB serial device)BLE module’s SDK (e.g., nRF5 SDK or CC2541 SDK)Microcontroller’s development environment (e.g., Keil µVision or Arduino IDE)USB device’s driver program (e.g., USB storage device driver or USB serial device driver) Implementation StepsStep 1: Create… Read more



Feeling bad and sad

As I sat in my office, staring blankly at the computer screen in front of me, I couldn’t help but feel a sense of disappointment and frustration wash over me. It had been a month since I was passed over for the position of R&D Director, a role I had been gunning for years. The memory of that day still lingered vividly in my mind, like an open wound that refused to heal. I had worked tirelessly as an R&D engineer for years, pouring my heart and soul into every project I took on. I had always been driven by a passion for innovation and a desire to make a meaningful impact on the industry. My hard work and dedication had paid off, earning me a reputation as one of the most skilled and respected engineers in the company. So, when the opportunity to become the R&D Director arose, I knew I had to go for it. I spent countless hours preparing for the interview, rehearsing my answers, and fine-tuning my presentation. I was confident that I had the skills, experience, and vision to lead the R&D team to new heights. But when the news came that I didn’t get the job, I was devastated. It felt like a punch to the gut, leaving me breathless and disbelieving. How could they not see my value? Hadn’t I proven myself time and time again? The questions swirled in my head like a vortex, pulling me down into a dark abyss of… Read more



Key2.0: Open Source Bluetooth IoT Door Lock

What is Key 2.0? Key 2.0 (or Key20 for short) is a Bluetooth IoT Door Lock controller. It turns a conventional electric door lock into a smart door lock that can be opened using a smartphone without the need for a physical key. Thus, Key20 is the modern version of a physical key, or, as the name suggests, the key version 2.0 for the Internet of Things (IoT) era. Key20 consists of two parts: Key20 door lock controller device, which is physically connected to the electric door lock and wirelessly via BLE to the mobile app. Key20 mobile app implementing the user interface to unlock the door and communicating with the door lock controller through BLE. [ Mobile Phone w/ ] [ Key20 App ] | | Bluetooth Low Energy (BLE) Connection | |—[ Key20 Door Lock Controller ]—[ Electric Door Lock ]—| | [ Device ] | | | | | | | |———————-(Voltage Source)———————–| ( 12 VAC ) The following image shows the Key20 door lock controller device and the Key20 app running on a smartphone. You can get a quick impression on how Key20 works watching the following video: Key 2.0 Video The main features of Key20 are: Using state-of-the-art security mechanisms (Elliptic Curve Diffie-Hellman Key Exchange (ECDH), HMAC) to protect against attacks. Open-source software and hardware, including an open implementation of the security mechanisms. No security by obscurity! Source code for the app and door lock controller as well as Eagle files (schematic and board layout)… Read more



My Frustrating Experience with Ghost’s Blog Editor

It’s hard to believe it’s been over six months since I started using Ghost as my blogging platform of choice. At first, I was thrilled with its simplicity and ease of use. The minimalistic design and user-friendly interface made it a breeze to create and publish blog posts. However, as time went on, I began to notice that the shine was wearing off. Specifically, I found myself growing increasingly frustrated with Ghost’s blog editing functionality. At first, it was the little things. The inability to easily format text, the lack of a decent spell-checker, and the clunky image upload process. But as I continued to use Ghost, these minor annoyances snowballed into major headaches. I found myself spending more and more time wrestling with the editor, trying to get my posts to look the way I wanted them to. One of the biggest issues I have is with the title editing feature. It’s surprisingly finicky, and I often find myself having to re-enter the title multiple times before it sticks. And don’t even get me started on the auto-save feature, which seems to have a mind of its own. I’ve lost count of how many times I’ve accidentally overwritten a post because the auto-save kicked in at the wrong moment. But the real deal-breaker for me is the lack of a decent WYSIWYG editor. I’m not a coder, and I shouldn’t have to be one to create a decent-looking blog post. The fact that I have to switch back and… Read more