IT service management

COBIT versus ITIL April 6, 2014 By Stephen.Ibaraki Microsoft MVP Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their … Continue reading «IT service management»

COBIT versus ITIL

Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their overall arrangements relating to governance and management of enterprise IT (GEIT). ITIL provides guidance and good practice for IT service providers for the execution of IT service management from the perspective of enabling business value.

COBIT 5 describes the principles and enablers that support an enterprise in meeting stakeholder needs, specifically those related to the use of IT assets and resources across the whole enterprise. ITIL describes in more detail those parts of enterprise IT that are the service management enablers (process activities, organizational structures, etc.).

Generally speaking:

· COBIT is broader than ITIL in its scope of coverage (GEIT). It is based on five principles (meeting stakeholder needs; covering the enterprise end to end; applying a single, integrated framework; enabling a holistic approach; and separating governance from management) and seven enablers (principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies).

· ITIL focuses on ITSM and provides much more in-depth guidance in this area, addressing five stages of the service life cycle: service strategy, service design, service transition, service operation and continual service improvement.

Also, COBIT and ITIL are well aligned in their approach to ITSM. The COBIT 5 Process Reference Model, as documented in COBIT 5: Enabling Processes, maps closely to the ITIL v3 2011 stages.

The distinction between the two is sometimes described as “COBIT provides the ‘why’; ITIL provides the ‘how.’” While catchy, that view is simplistic and seems to force a false “one or the other” choice. It is more accurate to state that enterprises and IT professionals who need to address business needs in the ITSM area would be well served to consider using both COBIT and ITIL guidance. Leveraging the strengths of both frameworks, and adapting them for their use as appropriate, will aid in solving business problems and supporting business goals achievement.

America’s neglected public water system

From the Great Lakes to the Puget Sound, America’s rivers, streams, and lakes provide us with a sufficient supply of drinking water. But the transport of this water through the American water system is simply unsafe. Flint, Michigan is using … Continue reading

From the Great Lakes to the Puget Sound, America’s rivers, streams, and lakes provide us with a sufficient supply of drinking water. But the transport of this water through the American water system is simply unsafe.

Flint, Michigan is using corroded lead pipes to transport its water, allowing dangerous chemicals to leach into the water — causing diseases that will plague this community for years. But this problem isn’t limited to one city.

Many of America’s water systems are more than 1OO years old. They’re due for a serious upgrade, but each year we’re falling $22 billion short in the funding the EPA needs to make these critical changes.

Demand Congress fix our nation’s water systems ? Sign the petition now!

The aging U.S. water infrastructure can no longer be ignored. If we don’t have federal support, our communities will continue to suffer.

Flint, Michigan shows us exactly what’s at stake. We need to take immediate action to protect the health of our citizens now and ensure safe drinking water services for years to come.

Citizens of the wealthiest nation on Earth should not be denied this basic human necessity. It’s unacceptable.

Sign your name telling Congress to fix our nation’s water systems:

http://leftaction.com/clean-water

America’s neglected public water system, which contains more than 3 million aging lead pipes, is the cause of this public health catastrophe. Many of these pipes are so decrepit that even small disruptions — an unintentional alteration in water chemistry or repair work — cause them to poison our water with toxic lead.

The result? Hundreds of thousands of Americans — many of them low income and people of color — are needlessly exposed to health risks from lead-contaminated water. And these risks are horrifying: even low levels of lead exposure can damage the brains of children, lower IQ, cause learning disabilities and contribute to behavioral problems.

Appallingly, the laws that regulate our tap water are as antiquated and weak as many of our lead pipes. But reforming the Safe Drinking Water Act and the Lead and Copper Rule is only part of the solution.

We also need a powerful commitment to rebuild America’s outdated drinking water infrastructure — pipes, water mains and treatment plants — wherever needed.

I’m sure you agree that failing to act now — leaving the door open for another Flint — is unthinkable. That’s why it’s imperative that we raise our voices in a massive public outcry and demand that everyone in the U.S. be protected from this long-ignored danger.

Safe drinking water is every American’s right: tell President Obama, EPA and Congress to get the lead out of America’s drinking water!

The disaster in Flint underscores our nation’s galling failure to deliver the most basic services to its citizens. This is an affront to the people of Flint and to those who care about justice everywhere — and it can’t be tolerated in this country.

NRDC is fighting back by suing Flint and Michigan officials to make sure they clean up Flint’s toxic water. But we need your voice now to take this public health battle to the next level.

Stand with me now to demand that lead be removed from America’s tap water once and for all — we owe it to our families, communities and children.

Sincerely,

Rhea
Rhea Suh
President, NRDC
Rhea Suh


Root your Android 4.4 KitKat

How to Root your Android 4.4 KitKat device using TowelRoot Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app. Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root … Continue reading «Root your Android 4.4 KitKat»

How to Root your Android 4.4 KitKat device using TowelRoot

Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app.
Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root your phone.

installing-towelroot

Amazon Prime Air

https://en.wikipedia.org/wiki/Amazon_Prime_Air http://www.amazon.com/b?node=8037720011 Amazon Prime Air is a conceptual drone-based delivery system currently in development by Amazon.com. On December 1, 2013, Amazon.com CEO Jeff Bezos revealed plans for Amazon Prime Air in an interview on 60 Minutes. Amazon Prime Air will use multirotor Miniature Unmanned Air Vehicle (Miniature UAV, otherwise known as drone) technology to autonomously … Continue reading «Amazon Prime Air»

https://en.wikipedia.org/wiki/Amazon_Prime_Air

http://www.amazon.com/b?node=8037720011

Amazon Prime Air is a conceptual drone-based delivery system currently in development by Amazon.com.

On December 1, 2013, Amazon.com CEO Jeff Bezos revealed plans for Amazon Prime Air in an interview on 60 Minutes. Amazon Prime Air will use multirotor Miniature Unmanned Air Vehicle (Miniature UAV, otherwise known as drone) technology to autonomously fly individual packages to customers’ doorsteps within 30 minutes of ordering.[1]To qualify for 30 minute delivery, the order must be less than five pounds (2.26 kg), must be small enough to fit in the cargo box that the craft will carry, and must have a delivery location within a ten-mile radius of a participating Amazon order fulfillment center.[1] 86% of packages sold by Amazon fit the weight qualification of the program.

Regulations

Presently, the biggest hurdle facing Amazon Prime Air is that commercial use of UAV technology is not yet legal in the United States.[2] In the FAA Modernization and Reform Act of 2012, Congress issued the Federal Aviation Administration a deadline of September 30, 2015 to accomplish a “safe integration of civil unmanned aircraft systems into the national airspace system.”[3]

In March 2015 the US Federal Aviation Administration (FAA) granted Amazon permission to begin US testing of a prototype. The company responded by claiming that the vehicle cleared for use was obsolete. In April 2015, the agency allowed the company to begin testing its current models. In the interim, the company had begun testing at a secret Canadian site 2,000 ft (610 m) from the US border.[4]

The agency mandated that Amazon’s drones fly no higher than 400 ft (122 m), no faster than 100 mph (161 km/h), and remain within the pilot’s line of sight. These rules are consistent with a proposed set of FAA guidelines. Ultimately, Amazon hopes to operate in a slice of airspace above 200 ft (61 m) and beneath 500 ft (152 m), with 500 ft being where general aviation begins. It plans to fly drones weighing a maximum of 55 lb (25 kg) within a 10 mi (16 km) radius of its warehouses, at speeds of up to 50 mph (80.5 km/h) with packages weighing up to 5 lb (2.26 kg) in tow.[5]

Public concerns

Public concerns regarding this technology include public safety, privacy, and package security issues.[2] Amazon states that “Safety will be our top priority, and our vehicles will be built with multiple redundancies and designed to commercial aviation standards.”[6] However, while privacy and security remain concerns, the FAA’s recently proposed rules for small UAS operations and certifications only provides provisions on its technical and functional aspects.[7]

The fact that the drone’s navigational airspace exists below 500 feet is a big step toward safety management.[8]

Privacy

Concerns over the constant connection of the drones to the internet raises concerns over personal privacy. The primary purpose of drone internet connection will be to manage flight controls and communication between drones.[9] However, the extent of Amazon’s data collection from the drones is unclear.[10] Some proposed data inputs include automated object detection, GPS surveillance, gigapixel cameras, and enhanced image resolution.[11] Because of this, Amazon’s operating center will collect unknown amounts of information, both intentionally and unintentionally, throughout the delivery process. Neither Amazon or the FAA has formed a clear policy on the management of this data.

The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit … Continue reading The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit and the impact of exploit. Scores range from 0 to 10, with 10 being the most severe. While many utilize only the CVSS Base score for determining severity, Temporal and Environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.

The current version of CVSS is CVSSv3.0, released in June 2015

Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s … Continue reading Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[10] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of anonion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[11] The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe,[12] and targets Tor users in general for close monitoring under its XKeyscore program.[13] Attacks against Tor are an active area of academic research,[14][15] which is welcomed by the Tor Project itself.[16]

cheap oil

Links: 1) http://www.xe.com/currencyconverter/c… 2) http://www.oil-price.net/ 3) http://beforeitsnews.com/opinion-cons… 4) Thumbnail imaage – Alberta Oil Sands – by Howl Arts Collective https://commons.wikimedia.org/wiki/Fi… 5) Music – Youtube Audio Library “Ambient Ambulance” https://www.youtube.com/audiolibrary/…




Links:
1) http://www.xe.com/currencyconverter/c…
2) http://www.oil-price.net/
3) http://beforeitsnews.com/opinion-cons…
4) Thumbnail imaage – Alberta Oil Sands – by Howl Arts Collective
https://commons.wikimedia.org/wiki/Fi…
5) Music – Youtube Audio Library
“Ambient Ambulance”
https://www.youtube.com/audiolibrary/…