Posts

Showing posts from 2015

Things do not exist in the world...

Things do not exist in the world... First one is :  A dirty soap. ... ... ... ... ... ... The last one is :  A stupid question. TRUST ME.

Data Analysis with Python

Image
How to analyze Data with Python? If you are a software developer then it can be felt some tricky how to use Python for Data Analysis. Unless you had an experiences on Data Analysis with Python yourself, it can be an unknown world. - Data Analysis Recently we have been told many times about terms of 'Big Data' and 'Growth Hacking'. IOT(Internet Of Thing) term indeed came from 'Ubiquitous' world. As same as this way Big Data and Growth Hacking are also actually came from 'Data Warehouse' to make it familiar with to people. So now how these terms can be applied to which area and how to be. There are many processes to make huge data valuable. Data collection, Extraction, Clustering, Analyzing and Reporting...we call the person as Data Scientist doing those processes. Data Scientist should have the domain knowledge and the technology to manipulate those different types of data and know how to use it. The collected or extracted data can be called Big Da...

RansomWare awareness

Image
What is RansomWare? RansomWare is a malicious code that encrypts all your documents(Excel, Word, PPT, PDF etc.) and pictures(jpg, bmp, pic etc.) etc. and extorts a money from infected users for decryption of them. What is the impact? All documents and pictures etc. are forcefully encrypted so is impossible to be opened unless RansomWare decryption software are given after the money payment to a cyber-criminal. What should you do? 1. Backup Make sure all your important data is backed up where space is isolated. Network drives and USB external storage can also be forcefully encrypted by RansomWare. The backup space must be isolated. 2. Windows Update Please make sure your Windows Update setting is active as below. 3. Don’t open Spam email Please even do not open a suspicious emails. RansomWare installation scripts can be launched. 4. Use Chrome Low version of Internet Explorer(IE) is vulnerable where lets RansomWare installation launched on in...

Useful sites for Data Science

Useful sites for Data Science The followings introduces Data Science, Analysis, Visualization etc. you may get helps from. Home | Power BI http://www.microsoft.com/en-us/powerbi/default.aspx#fbid=4RsX5tX5QCP PowerBI - Site Home - MSDN Blogs http://blogs.msdn.com/b/powerbi/ Kaggle: Go from Big Data to Big Analytics http://www.kaggle.com/ Insight Maker | Free Simulation and Modeling in your Browser https://insightmaker.com/ 20 free data visualisation tools | Infographic | Creative Bloq http://www.creativebloq.com/infographic/20-free-data-visualisation-tools-5133780 The Open Source Data Science Masters http://datasciencemasters.org/ Jsresearch.net http://jsresearch.net/ Online R tutorials and Data Science Courses - DataCamp https://www.datacamp.com/ Visualization and Data Mining Software http://www.kdnuggets.com/software/visualization.html#free Choosing the right visualization tool for your task http://ngio.co.kr/2118 CS109 Data Science http://cs109.githu...

The Simplex Method - Terminology

The Simplex Method - Terminology the simplex method : The method to solve the simplex problem. the optimal solution : The values or methodology of optimal solution slack variables : Functioning as a slack to find the variables in the equations. Simplex tableau : Table summary with variables including a slack the simplex formulation : Formulating the problem into the equations mathmatically. the set of equations : Can be a set of constraints in the context of given problem

How to secretly learn about their lives...from Leil Lowndes

Image
FROM Leil Lowndes Title: How to talk to anyone One trick of 62 tricks: How to secretly learn about their lives  Let's say your paper carrier has just hurled the newspaper from his bike to your front door. You pour a cup of coffee and get comfotable to catch up on what's happening in the world. Your world, that is. Do you flip first to the international news? The fashion section? The sports page? The entertainment section? Maybe the comics?  Whichever sectino yo usually flip to first, tomorrow DON'T. Turn to any other section, perferably one you hardly ever read. Why? Because it will familiarize you with other worlds so that you have in common.  How about the real estate section? Yawn. Maybe you don't find real estate especially engrossing. However, sooner or later you're going to find yourself with a group of people who are discussing properties, deals, and today's market. Scanning the real estate sectino just once every few weeks will keep yo au...

Development with Secure coding

Image
Popular being high ranked for the vulnerability of source codes of software, Fortyfisoftware Co (CEO John Jack) displayed 'Integrated Suit 'Fortyfi 360' a new product producing the security of Software Development lifecycle and 'BSA(Business Software Assurance)' for customer services. CEO John Jack of Fortyfisoftware Co emphasized "Product Testing Steps and the security management cycles must be adopted for the protection from threats or risks for softwares and applications from the development step" at the interview. CEO Jack first stressed out the thinkings of "it would be long time for the software complete with the secure coding" and "Just for the duration of the development of software, it may avoid the security management" are definately wrong. At plus he claimed the first steps for the development of softwares, 'CERT, Hacking Test someting and Riverse Engineering like the options should be operated at the last durat...

windbg installation (assembly)

A tool to be used for the analysis of memory dump, file download address following... win32: http://www.microsoft.com/whdc/devtools/debugging/installx86.mspx win64: http://www.microsoft.com/whdc/devtools/debugging/install64bit.mspx

F.I.R.E forensic tool

Image
It would be a successful tool needed for the cyber forensic process. I provide the website link following address over here to help download directly on my blog ^^ ~~ Anyonw who wants some technical experiences and simple works of cyber crime protection proceeds...just click under address and 'YES' which allow F.I.R.E downloading. =================== -->  CLICK~!!!     http://prdownloads.sourceforge.net/biatchux/fire-0.3.5b.iso?download =================== Have special ~

AES & SES (Adaptive Exponential Smoothing method & Simple Exponential Smoothing method

Image
AES and SES can be carried out to forecast the future sales demand based on the last collected information. AES stands for Adaptive Exponential Smoothing and SES stands for Simple Exponential Smoothing method. Which calculations can be different a little but the performance can be also be vary. As known that SES method is the simplest method to forecast by using the fixed simple smoothing coefficient, this is used to compare the differences between SES and AES. Adaptive exponential smoothing (AES) methods allow a smoothing parameter to change over time, in order to adapt to changes in the characteristics of the time series.

Exponential Smoothing

Exponential Smoothing 이란 ( Wiki ) 한국어로 '지수 평활법' 이라고 한다. In 'Exponential Smoothing' formula, we have 'Smooth constraint' called 'a' [alpha]. Condition 1: 0<a<1 Ft = a*Dt-1 + (1-a)Ft-1 Dt-1  : 직전 판매 실적 Ft-1 : 직전 수요 예측값 '직전 판매 실적' 에서 '직전 수요 예측값' 을 빼면 상수 'e'가 됨. Dt-1  - Ft-1 = et-1