Data science

A Complete Tutorial to Learn Data Science with Python from Scratch
MACHINE LEARNING PANDAS PYTHON

KUNAL JAIN , JANUARY 14, 2016

http://www.talend.com/index.php
http://www.opcdatahub.com/Home.html

A Complete Tutorial to Learn Data Science with Python from Scratch

,

http://www.talend.com/index.php

http://www.opcdatahub.com/Home.html

IT service management

COBIT versus ITIL April 6, 2014 By Stephen.Ibaraki Microsoft MVP Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their … Continue reading “IT service management”

COBIT versus ITIL

Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their overall arrangements relating to governance and management of enterprise IT (GEIT). ITIL provides guidance and good practice for IT service providers for the execution of IT service management from the perspective of enabling business value.

COBIT 5 describes the principles and enablers that support an enterprise in meeting stakeholder needs, specifically those related to the use of IT assets and resources across the whole enterprise. ITIL describes in more detail those parts of enterprise IT that are the service management enablers (process activities, organizational structures, etc.).

Generally speaking:

· COBIT is broader than ITIL in its scope of coverage (GEIT). It is based on five principles (meeting stakeholder needs; covering the enterprise end to end; applying a single, integrated framework; enabling a holistic approach; and separating governance from management) and seven enablers (principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies).

· ITIL focuses on ITSM and provides much more in-depth guidance in this area, addressing five stages of the service life cycle: service strategy, service design, service transition, service operation and continual service improvement.

Also, COBIT and ITIL are well aligned in their approach to ITSM. The COBIT 5 Process Reference Model, as documented in COBIT 5: Enabling Processes, maps closely to the ITIL v3 2011 stages.

The distinction between the two is sometimes described as “COBIT provides the ‘why’; ITIL provides the ‘how.’” While catchy, that view is simplistic and seems to force a false “one or the other” choice. It is more accurate to state that enterprises and IT professionals who need to address business needs in the ITSM area would be well served to consider using both COBIT and ITIL guidance. Leveraging the strengths of both frameworks, and adapting them for their use as appropriate, will aid in solving business problems and supporting business goals achievement.

Root your Android 4.4 KitKat

How to Root your Android 4.4 KitKat device using TowelRoot Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app. Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root … Continue reading “Root your Android 4.4 KitKat”

How to Root your Android 4.4 KitKat device using TowelRoot

Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app.
Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root your phone.

installing-towelroot

Agile management

Agile management, or agile process management, or simply agile refer to an iterative, incremental method of managing the design and build activities for engineering, information technology, and other business areas that aims to provide new product or service development in a highly flexible and interactive manner; an example is its application in Scrum, an original … Continue reading “Agile management”

Agile management, or agile process management, or simply agile refer to an iterative, incremental method of managing the design and build activities for engineering, information technology, and other business areas that aims to provide new product or service development in a highly flexible and interactive manner; an example is its application in Scrum, an original form of agile software development.[1] It requires capable individuals from the relevant business, openness to consistent customer input, and management openness to non-hierarchical forms of leadership. Agile can in fact be viewed as a broadening and generalization of the principles of the earlier successful array of Scrum concepts and techniques to more diverse business activities. Agile also traces its evolution to a “consensus event”, the publication of the “Agile manifesto“, and it has conceptual links to lean techniques, kanban (????(??)?), and the Six Sigma area of business ideas.[1]

Agile X techniques may also be called extreme process management. It is a variant of iterative life cycle[2] where deliverables are submitted in stages. The main difference between agile and iterative development is that agile methods complete small portions of the deliverables in each delivery cycle (iteration)[3] while iterative methods evolve the entire set of deliverables over time, completing them near the end of the project. Both iterative and agile methods were developed as a reaction to various obstacles that developed in more sequential forms of project organization. For example, as technology projects grow in complexity, end users tend to have difficulty defining the long term requirements without being able to view progressive prototypes. Projects that develop in iterations can constantly gather feedback to help refine those requirements. According to Jean-Loup Richet (Research Fellow at ESSEC Institute for Strategic Innovation & Services) “this approach can be leveraged effectively for non-software products and for project management in general, especially in areas of innovation and uncertainty. The end result is a product or project that best meets current customer needs and is delivered with minimal costs, waste, and time, enabling companies to achieve bottom line gains earlier than via traditional approaches.[4] Agile management also offers a simple framework promoting communication and reflection on past work amongst team members.[5]

Agile methods are mentioned in the Guide to the Project Management Body of Knowledge (PMBOK Guide) under the Project Lifecycle definition:

Adaptive project life cycle, a project life cycle, also known as change-driven or agile methods, that is intended to facilitate change and require a high degree of ongoing stakeholder involvement. Adaptive life cycles are also iterative and incremental, but differ in that iterations are very rapid (usually 2-4 weeks in length) and are fixed in time and resources.[6]

OneDrive not connected to Internet

Turn off Office Upload If you’re having trouble syncing Office files, the Office Upload cache system may be interfering with OneDrive sync. Try turning off the related setting in OneDrive settings. Right-click the white OneDrive cloud icon in the notification area, at the far right of the taskbar. (You might need to click the Show … Continue reading “OneDrive not connected to Internet”

Turn off Office Upload

If you’re having trouble syncing Office files, the Office Upload cache system may be interfering with OneDrive sync. Try turning off the related setting in OneDrive settings.

  1. Right-click the white OneDrive cloud icon in the notification area, at the far right of the taskbar.OneDrive app in System Tray

    (You might need to click the Show hidden icons arrow next to the notification area to see the OneDrive icon.)

  2. Click Settings, and then clear the Use Office to work on files with other people at the same time check box.

IMPORTANT   When you turn off the Use Office to work on files with other people at the same time setting, any changes that you and other people make to Office files in your OneDrive will no longer merge together automatically.

The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit … Continue reading The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit and the impact of exploit. Scores range from 0 to 10, with 10 being the most severe. While many utilize only the CVSS Base score for determining severity, Temporal and Environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.

The current version of CVSS is CVSSv3.0, released in June 2015

Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s … Continue reading Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[10] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of anonion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[11] The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe,[12] and targets Tor users in general for close monitoring under its XKeyscore program.[13] Attacks against Tor are an active area of academic research,[14][15] which is welcomed by the Tor Project itself.[16]

ITIL

ITIL, formerly known as the Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published as a series of five core volumes, each of which covers a different … Continue reading ITIL

ITIL, formerly known as the Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published as a series of five core volumes, each of which covers a different ITSM lifecycle stage. Although ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, there are some differences between the ISO 20000 standard and the ITIL framework.

ITIL describes processes, procedures, tasks, and checklists which are not organization-specific, but can be applied by an organization for establishing integration with the organization’s strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement.

Since July 2013, ITIL has been owned by AXELOS Ltd, a joint venture between HM Cabinet Office and Capita Plc. AXELOS licenses organisations to use the ITIL intellectual property, accredits licensed Examination Institutes, and manages updates to the framework.