sábado, 3 de setembro de 2022

Installing a Virtual Machine to open suspicious files

 ==== Installing a Virtual Machine to open suspicious files 20220904 ====
Firefox:
https://www.virtualbox.org/wiki/Linux_Downloads
Download: virtualbox-6.1_6.1.38-153438~Ubuntu~focal_amd64.deb | 96.2MB
https://lubuntu.me/
Download: lubuntu-22.04.1-desktop-amd64.iso | (Jammy Jellyfish) 2.7GB
https://proton.me/

Terminal:
f3l1p@VsTr:~$ lsb_release -a
No LSB modules are available.
Distributor ID:    Ubuntu
Description:    Ubuntu 20.04.4 LTS
Release:    20.04
Codename:    focal

VM:
Name: Lubuntu22.04.1desktopAmd64|20220904
Folder: /home/f3l1p/VirtualBox VMs
RAM allocated: 1850MB (recommended 1024 of 4096MB)
Create a virtual hard disk now. VDI (Virtual Disk Image)
Fixed size 10GB (Kingmax SSD 240GB — 188 GB free (21.5% full) /dev/sda1)

======            ======            ====== 


sexta-feira, 1 de julho de 2022

pavucontrol - Microphone capture problem in Ubuntu - Solved

 # apt-get install pavucontrol

# pavucontrol

 

When restarting sometimes the configuration is not saved, I have to redo.

sábado, 12 de fevereiro de 2022

remembering the tkinter course

 $ sudo apt-get install python3-tk
$ sudo apt-get install python3.6-tk

(Venv2) f3l1p@VsTr:~/Venv/tkinter$ lsb_release -a
No LSB modules are available.
Distributor ID:    Ubuntu
Description:    Ubuntu 18.04.6 LTS
Release:    18.04
Codename:    bionic
 

(Venv2) f3l1p@VsTr:~/Venv/tkinter$ sudo apt-get install python3-tk
[sudo] password for f3l1p:
Reading package lists... Done
Building dependency tree       
Reading state information... Done
python3-tk is already the newest version (3.6.9-1~18.04).
0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded.

List files intalled:
$ dpkg-query -L python3-tk

======================================================================
======================================================================
====    ====    Do not name the file as tkinter.py !!!    ====    ====
=================== File: tktkinter.py ===============================
from tkinter import * #1 first steps
mw = Tk() #2 main window (mw)
#4 root.mainloop() #3
class App():#5
    def __init__(self):#6
        self.mw = mw#12
        self.scrn()#11
        mw.mainloop()#7
    def scrn(self):#9
        self.mw.title('Customer Registration')#10
        self.mw.configure(background= '#888888')#13
        self.mw.geometry('800x400')#14 start size
        self.mw.resizable(True, True)#15 resize window
        self.mw.maxsize(width=1300, height=650)#16
        self.mw.minsize(width=400, height=400)#17
App()#8

''' 2022 0213 06:24
Curso Python Tkinter - Aula 1 - Criação e configuração da janela - Tutorial
https://youtu.be/RtrZcoVD1WM




'''
======================================================================
 

quarta-feira, 19 de janeiro de 2022

#Creating a virtual environment

 #Creating a virtual environment
"""
venv — Creation of virtual environments
Python.org: https://docs.python.org/3/library/venv.html

How to install virtualenv:
Source: https://gist.github.com/Geoyi/d9fab4f609e9f75941946be45000632b

f3l1p@VsTr:~$ sudo apt-get install python3-pip
f3l1p@VsTr:~$ sudo pip3 install virtualenv

Python Tutorial: VENV (Mac & Linux) - How to Use Virtual Environments with the Built-In venv Module: Source: https://youtu.be/Kg1Yvry_Ydk

Displays the packages installed by pip3:
f3l1p@VsTr:~$ pip3 list

Creation of virtual environments is done by executing the command venv:
f3l1p@VsTr:~$ python3 -m venv ~/Venv/venv1

==============   Notice of system   ========================
The virtual environment was not created successfully because ensurepip is not
available.  On Debian/Ubuntu systems, you need to install the python3-venv
package using the following command.

    apt-get install python3-venv

You may need to use sudo with that command.  After installing the python3-venv
package, recreate your virtual environment.

Failing command: ['/home/f3l1p/Venv/Venv1/bin/python3', '-Im', 'ensurepip', '--upgrade', '--default-pip']
============================================================

Here in Ubuntu it can also be used to create a new environment the command:
f3l1p@VsTr:~$ virtualenv ~/Venv/Venv1
created virtual environment CPython3.6.9.final.0-64 in 798ms
  creator CPython3Posix(dest=/home/f3l1p/Venv/Venv2, clear=False, no_vcs_ignore=False, global=False)
  seeder FromAppData(download=False, pip=bundle, setuptools=bundle, wheel=bundle, via=copy, app_data_dir=/home/f3l1p/.local/share/virtualenv)
    added seed packages: pip==21.3.1, setuptools==59.6.0, wheel==0.37.1
  activators BashActivator,CShellActivator,FishActivator,NushellActivator,PowerShellActivator,PythonActivator

Active your virtual environment:
f3l1p@VsTr:~$ source ~/Venv/Venv1/bin/activate
(Venv1) f3l1p@VsTr:~$
(The Venv name before the username in parentheses means that it is already inside the virtual environment.  (Venv1) f3l1p@VsTr:~$   )

To deactivate:
(Venv1) f3l1p@VsTr:~$ deactivate

"""

 


======

12. Virtual Environments and Packages
12.1. Introduction

Python applications will often use packages and modules that don’t come as part of the standard library. Applications will sometimes need a specific version of a library, because the application may require that a particular bug has been fixed or the application may be written using an obsolete version of the library’s interface.

This means it may not be possible for one Python installation to meet the requirements of every application. If application A needs version 1.0 of a particular module but application B needs version 2.0, then the requirements are in conflict and installing either version 1.0 or 2.0 will leave one application unable to run.

The solution for this problem is to create a virtual environment, a self-contained directory tree that contains a Python installation for a particular version of Python, plus a number of additional packages.

Different applications can then use different virtual environments. To resolve the earlier example of conflicting requirements, application A can have its own virtual environment with version 1.0 installed while application B has another virtual environment with version 2.0. If application B requires a library be upgraded to version 3.0, this will not affect application A’s environment.
Continue reading at:
https://docs.python.org/3/tutorial/venv.html?highlight=pip%20requests

# Pypi: Requests

"""
Python Requests Tutorial: Request Web Pages, Download Images, POST Data, Read JSON, and More
https://youtu.be/tb8gHvYlCFs

requests 2.27.1
https://pypi.org/project/requests/

Installing:
(Venv1) f3l1p@VsTr:~$ pip install requests

(Venv1) f3l1p@VsTr:~$ nano resquest.py

====== resquest.py ======
import requests

r = requests.get('https://marocero2016.blogspot.com/')

print(r.text)
======      ======

(Venv1) f3l1p@VsTr:~$ alias py="python3"

(Venv1) f3l1p@VsTr:~$ py request.py


"""


import requests

r = requests.get('https://marocero2016.blogspot.com/')

txt = r.text

c = 0
http = ""
lista = ""
print(len(txt))

while c < len(txt) - 4:
    if txt[c] + txt[c+1] + txt[c+2] + txt[c+3] + txt[c+4] == "http:":
        #print(c, txt[c] + txt[c+1] + txt[c+2] + txt[c+3] + txt[c+4])
        if txt[c+7] + txt[c+8] + txt[c+9] + txt[c+10] + txt[c+11] != "schem":

            while c < len(txt) -4:
                if txt[c] == "'" or txt[c] == '"':
                    break
                http += txt[c]
                c += 1
            lista += http + "\n"
            http = ""
            print(lista)
    c += 1

print(lista)




terça-feira, 30 de novembro de 2021

Python Map Project

 -----------------Python Map Project----------------
Track phone number location using python
Tutorial video: https://youtu.be/Geisa_ib5hs
---------------------------------------------------
StepByStep - create folder: Python Map Project
Create 2 files
1:-----------------file: myNumber.py---------------
number = "**************" # Phone number
---------------------------------------------------
2:---------------file: numberLocation.py-----------
import phonenumbers
import folium
from myNumber import number
from phonenumbers import geocoder
sanNumber = phonenumbers.parse(number)
yourLocation = geocoder.description_for_number(sanNumber, "en")
print(yourLocation)

## get service provider # online numbers no have service provider
from phonenumbers import carrier

Key = "*******************************" # sign up for key: https://opencagedata.com/

service_provider = phonenumbers.parse(number)
print(carrier.name_for_number(service_provider, "en"))

from opencage.geocoder import OpenCageGeocode
geocoder = OpenCageGeocode(Key)

query = str(yourLocation)
results = geocoder.geocode(query)
#print(results)
lat = results[0]['geometry']['lat']
lng = results[0]['geometry']['lng']
print(lat, lng)

myMap = folium.Map(location=[lat, lng], zoom_start = 9)
folium.Marker([lat, lng],popup= yourLocation).add_to((myMap))
## save map in html file
myMap.save("myLocation.html")
---------------------------------------------------
---------------Packages----------------------------
$ pip install phonenumbers
$ pip install opencage
$ pip install folium
---------------------------------------------------

quarta-feira, 6 de outubro de 2021

CORPORATE STRATEGIC PLANNING - Integrated Multidisciplinary Project (PIM VI)

 "This translation was done automatically by the web translator, disregarding possibles translation errors."

 UNIP EaD Integrated Multidisciplinary Project (PIM VI)
Technology Courses CORPORATE STRATEGIC PLANNING
Business and IT Strategic Plan, Information System Modeling and
Information Security Policy. Polo: Hamamatsu Japan Year: 2020
Name: Marcelo Felipe Tanii Course: Information Technology Management
Semester: 3/2020 Advisor: Antônio Palmeira de Araújo Neto
ABSTRACT
This project aims to integrate knowledge, concepts, methods and
techniques provided by UNIP (Universidade Paulista) in higher education
technological management of Information Technology, with the aim of enabling the
manager, in the implementation of an efficient strategic planning in the organization, will use a network of fictitious dental clinics created by the university to implement the projects.
Information Technology strategy in business administration. The project focuses on the implementation or renewal of planning methods in order to create and manage the corporate strategic plan, with standardized indicators that enable a better vision and control of the company to achieve its objectives, as well as the modeling of information systems for work efficiently: data, information and knowledge as today's valuable assets, and protect by defining information security policies. The project works with the Management and Management of Information Technology in the administration and aligned with the business to work on the critical success factors in the company.
Keywords: Strategy; Information; Modeling; Planning; Safety.

ABSTRACT
This project intends to integrate the knowledge, concepts, methods and techniques provided by UNIP (Universidade Paulista) in the technological course of Information Technology Management, in order to train the manager, in the implementation of an efficient strategic planning in the organization, he will use it in a network of fictitious dental clinics created by the university to implement the projects, this study has as a differential the alignment of the Information Technology strategy in business administration. The project focuses on the implementation or renewal of planning methods in order to create and manage the corporate strategic plan, with standardized indicators that enable a better view and control of the company to achieve its objectives, as well as the modeling of information systems for work efficiently: data, information and knowledge as valuable current assets, and protect, defining information security policies. The project works with the management and Information Technology Management in the administration and aligned with the business to work on the critical success factors in the company.
Keywords: Information; Modeling; Planning; Safety; Strategy.

SUMMARY
1. INTRODUCTION............................................... ........................................... 05
2. CASE PRESENTATION .................................................. .................................. 06
2.2 Gathering of requirements .................................................. ....................... 06
3. BUSINESS STRATEGIC PLAN ............................................... .............. 07
3.1 Company Analysis Document .................................................. ................. 07
3.2 Definition of the mission, vision of values ​​and key success factors. 07
3.3 Key Success Factors .................................................. .................................. 07
3.4 Strategic review document for internal and external environments.........08
3.5 Identification of strengths, weaknesses, opportunities and threats 09
3.6 Strategic formulation document .................................................. .........10
3.6.1 Porter's market analysis .................................................. ......................10
3.6.2 Strategic focus .................................................. ....................................................11
3.6.3 Relationship matrix ............................................... ................................11
3.6.4 Proposed solutions ............................................... ........................................12
3.6.5 Assessment and selection of business areas ............................................ .........13
3.6.6 Resource allocation and definition of criteria ......................................... .13
3.6.7 Identification of objectives and long-term action plans ..............14
4. IT STRATEGIC PLAN ............................................... ................................... 14
4.1 IT Principles................................................... ................14
4.2 Strategic analysis of the internal and external environments.
4.3 Business requirements that impact IT ............................................... ....15
4.4 Analysis of the current IT portfolio ............................................... ...................15
4.5 Identification of strengths, weaknesses, opportunities and threats.16
4.6 Strategic formulation document ............................................... ...........16
4.6.1 Critical Success Factors (FCS) ............................................ ..............17
4.6.2 Strategic focus .................................................. ...........................................17
4.6.3 Identification of objectives and long-term action plans ...........17
5. INFORMATION SYSTEM PROPOSAL ............................................... ...... 17
6. INFORMATION SECURITY .................................................. ............................ 19
7. CONCLUSION ..................................................... ........................................................ . 20
REFERENCES

1. INTRODUCTION
Faced with constant innovations and technological advances and growth
interrupting the already large amount of information, we guide ourselves through the
intense and continuous learning, using as a basis the knowledge acquired in the
university course in Information Technology Management (GTI) at UNIP (Universidade Paulista), good practices identify techniques to better perform a given task, for the use of standardized and tested tools and methods, thus ensuring their effectiveness.
Odontopalmeira a network of dental clinics with over 20 years
works with dental services with a focus on quality, certification, safety and comfort, as its target audience is the middle and upper classes of large urban centers in the state of São Paulo, with a total of 40 units and an exclusive matrix for administrative and Information Technology (IT) located in the neighborhood of Lapa. The network completed an IT Infrastructure, Strategic Human Resource Management, IT Finance, Economy and Market project. This restructuring enables the company to expand, and be updated in infrastructure resources. However, analyzing the situation of the business, they realized that there was a constant loss of market share (market share), verified the situations that harm the company, we concluded by applying a strategic planning process to decide the direction of the company, solutions to problems and plan for growth for the future, with the strategic participation of the IT director and the support of a consultancy specialized in strategic management. Applying the knowledge acquired in the disciplines of IT Strategic Planning, Information Systems Modeling and Information Security, in planning to design a business strategic plan and an IT strategic plan, modeling an information system that meets the needs of business and an adequate information security policy. The strategic planning process (PPE) methodology will be based
in the model of the book by Born et al. (2007), which enables the creation
of the strategic plan for different types of companies, and adaptations within the
peculiarities of each.

2. CASE PRESENTATION
Before the end of 2018, the company carried out a business analysis,
to assess the situations that led to the detected loss, in the degree of participation of the company in the market, already demonstrating the need for indicators that enable preventive action as a factor of “information opportunity” according to Stoner (1999 apud PRATES, 2003) ”[.. .] timeliness of information - for effective control, corrective action must be applied before a very large deviation from the plan or standard occurs, therefore, the information must be available to the right person at the right time;" cited in Zacariotto, Costa and Palmeira (2013, p 29)
Main points of the evaluation:
1. Decrease in the number of customers who performed basic services
dental;
2. Lack of an information system to automate the processes of
business;
3. Excessive employee turnover;
4. Decrease in subscriptions to Odontopalmeira's own health plan;
5. Drop in the quality of products offered by suppliers;
6. Growth of new entrants;
7. Great demand for pediatric dentistry services, without the units
were prepared for this audience, generating dissatisfaction;
8. Lack of accessibility for people with physical disabilities;
9. Lack of appreciation of issues related to sustainability;
10. Absence of a customer satisfaction survey.
2.2 Requirements Surveys
1. Periodically updated strategic planning process;
2. Solutions to the unfavorable situations raised in the analysis for
identify the decrease in the degree of market share;
3. Project splits into phases:
1. Presentation of the case;
2. Business strategic plan;
3. IT strategic plan;
4. Information system proposal;
5. Information Security Policy.
3. BUSINESS STRATEGIC PLAN
3.1 Company Analysis Document
Potentials
1. Experience, time in the market;
2. Know-how Procedural knowledge or know-how;
3. Willingness to change;
4. Provide quality services;
5. High level service, for target audience with greater purchasing power;
6. Updated infrastructure to support growth and new projects.
Weaknesses
1. Outdated strategic plan;
2. Loss of customers;
3. Delay in detecting problems;
4. High reaction time to unfavorable situations;
5. Lack of automation in systems;
6. Lack of feedback (Feedback).

current strategies
1. Quality and service as a differential to serve the target audience;
2. Product certification, standardize and maintain quality and safety;
3. Safety and comfort, in all corporate environments;
4. Excellence in service.
"First, to help me in consulting and also in courses and
classes, I developed a set of very objective forms to apply the
principles of the Hoshin Kanri methodology.” Cruz, Thaddeus (2017, p. 39).
3.2 Definition of mission, vision, values ​​and key success factors.
1- Mission: Offer quality dental services, with certified products
and with all the safety and comfort.
2- Vision: To be the best company in dental services in the state of São Paulo.
3- Values: Integrity, Leadership, Responsibility, Collaboration and Quality.
3.3 Key Success Factors
1. Management qualification;
2. IT Management;
3. Company image;
4. Financial strength;
5. Knowledge of the market;
6. Customer perspective.
3.4 Strategic analysis document for internal and external environments
Outdoor environments, Opportunities. Questionnaires by Zacariotto, Costa and Palmeira (2013)
1. What are the opportunities for the corporation in the market?
Launches of differentiated services, based on competition.
2. Where are these opportunities?
In market trends, pointing to consumption habits in the area of
services.
3. Are there new trends emerging in the market?
Yes, based on technological innovations, mainly in the customer link
services.
Threats
1. What threats (laws, regulations, competitors) can harm the
corporation?
Fines for lack of accessibility.
2. What are the strengths of competitors that pose a threat
for the corporation?
Better communication with the customer.
Indoor Environments, Forces.
1. What do we do well?
Provide quality services.
2. What do we have the best to offer the market?
Service and environment for target audience with greater purchasing power.
3. What are we better at compared to our competitors?
Know-how Procedural knowledge or know-how.
4. What, in our products and services, arouse the greatest interest of our
customers?
Service and environment for target audience with greater purchasing power.

Weaknesses
1. What don't we do well?
Lack of automation in systems.
2. What are our products and services that fall short of the expectations of the
Marketplace?
There is a lack of diversity, services for pediatric dentistry and accessibility.
3. What, within the indoor environment, diminishes our advantages
competitive?
Lack of automation in business systems.
3.5 Identification of strengths, weaknesses, opportunities and threats.
SWOT Analysis, Strengths:
1. Know-how Procedural knowledge or know-how;
2. Willingness to change;
3. Service and environment for target audience with greater purchasing power;
Weaknesses(Weaknesses):
1. Outdated strategic plan;
2. Lack of automation in business systems;
3. Diversity, services for pediatric dentistry and accessibility.
Opportunities:
1. Technological innovations;
2. Market trends, access and search for services by digital means;
3. Government tax incentives for accessibility;
Threats:
1. Increased competition, new entrants;
2. Customer dissatisfaction;
3. Loss of degree of market share.
Figure 1 - SWOT Matrix

 

Source: Marcelo Felipe Tanii.
Crossing information, strengths and opportunities: leverage, use
and offensive actions, example: 1x1 = Know-how and technological innovations.
1x1 IT action in creating an information system to dynamically act in business.
2x1 Use to adapt to new technologies and ways of working.
3x1 Taking advantage of the perception of value based on modernity for the
customers.
1x2 Marketing and IT Action to present the company's experience.
2x2 Use to adapt to new technologies and ways of working.
3x2 Marketing and IT Action in digital media;
1x3 HR action to adapt the services.
2x3 Action for Accessibility Project.
3x3 Action to adapt service and environment.
To delimit the work, focus on leverage, use and actions.
Weaknesses and opportunities: limitations, improvement and maintenance policies.
Forces and threats: vulnerability, confrontation and defensive actions.
Weaknesses and threats: issues, deactivation, exit policies.
3.6 Strategy formulation document
3.6.1 Porter's Market Analysis: (Porter's Five Forces)
1. Rivalry among competitors?
High competition, directly: dental clinic franchises, three
networks of dental clinics in São Paulo and a national one. the clinics
dental services and public services is a small portion in view of the
target Audience.
2. Bargaining power of suppliers?
Medium, due to the size of the network.
3. Customers' bargaining power?
Low.
4. What are the substitute products and services?
Small dental clinic, public services and services from competitors.
5. Actions against the entry of new competitors?
Campaigns with attractive values ​​for the adhesion of new customers, benefits
to build loyalty and “Benchmarking” the competition study process.
Competitive positioning of the company: study and analysis of partnership with
companies to work in the franchising area and also publicly traded for the expansion plan, development of a digital campaign for target audience, with data analysis of social networks, targeted advertising and "Benchmarking" competition study process, analysis of new suppliers for possible replacement and negotiation to mainly maintain quality.
Source: https://m.sebrae.com.br/sites/PortalSebrae/artigos/6-ferramentas-para-o-planejamento-estrategico-da-sua-empresa,281479e90d205510VgnVCM1000004c00210aRCRD
3.6.2 Strategic focus:
1. People: Customer service, partners and employees are the
main strategic focus of the business.
2. Processes: The operational efficiency exerted by people trained to
produce better.
3. Products: The quality of products and services must be monitored by the
quality control and achieved in these steps.
3. 6.3 Relationship matrix:
Figure 2 - Relationship Matrix

 

Source: Marcelo Felipe Tanii.
Preserve opportunities and partnerships, maintain convenience and reduce
scratchs. Attributed importance: by Partner = P, by Company = E.
Customers: 1-P75/E75= Partnership, 2-P25/E25= Convenience.
Suppliers: 1-P75/E25= Opportunity, 2-P75/E25= Risk.
Employees: 1-P100/E100= Partnership, 2-P50/E75= Risk Line.
Outsourcing: 1-P25/E50= Line of Risk, 2- 50/50= Convenient partnership.
3.6.4 Solution proposals:
For unfavorable situations, main points of the analysis evaluation,
to identify the factors that decrease the degree of market share.
1- Decrease in the number of clients who performed basic dental services.
Digital campaigns, satisfaction survey and attractive membership fees
of new customers, benefits for loyalty and Benchmarking a competition study.
2- Lack of an information system to automate business processes.
Proposal for an information system that meets business needs.
3- Excessive turnover of employees.
Career plan, with training and opportunities that accompany
future expansions.
4- Decrease in subscriptions to Odontopalmeira's own health plan.
Search for agreements that meet within the target audience, to capture
clients and presentation of the advantages of Odontopalmeira's health plan.
5- Fall in the quality of products offered by suppliers.
Analysis of new suppliers for possible replacement and negotiation for
mainly keep the quality.
6- Growth of new entrants.
Campaigns with attractive values ​​for the adhesion of new customers and benefits
to retain.
7- Great demand for pediatric dentistry services, without the units being prepared for this public, generating dissatisfaction.
Project to adapt the units and employees for services of
pediatric dentistry and accessibility for people with physical disabilities.
8- Lack of accessibility for people with physical disabilities.
Solution included in answer to question seven.

9- Lack of appreciation of issues related to sustainability;
Action for internal awareness and suggestions for social issues,
environmental and energy sources collected from all departments and units.
10- Absence of a customer satisfaction survey.
Informational totem project for use by customers, printed to harvest
research at the service desk, sending a form by e-mail and a link on the website.
3.6.5 Assessment and selection of business areas:
Administration, Information Technology and Communication, Legal Finance,
Human Resources, Production and Services, Commercial and Logistics.
Main points of the assessment of the business strategic plan:
1. Calculation of expenses, return and feasibility of the demands of the strategic plan,
solutions and projects.
2. Disseminate and update mission, vision and values ​​on the company's pages.
3. Action in digital media and social networks aimed at the target audience and
disseminating the company's experience.
4. Develop information system model to act dynamically
in business.
5. Campaigns with attractive values ​​for joining new customers, benefits
to build loyalty and “Benchmarking” the competition study process.
6. Project to adapt environments and services for pediatric dentistry and
accessibility.
7. Study and analysis of partnerships with companies to work in the area of ​​franchising and
also publicly traded for the expansion plan.
8. Analysis of new suppliers for possible replacement and negotiation for
mainly keep the quality.
9. Strategic focus.
10. Career plan, training and adaptation to new technologies and ways of working, opportunities that accompany future expansions.
11. Search for agreements that meet within the target audience, for capitation of
clients and presentation of the advantages of the own health plan.
12. Action for internal awareness and suggestions for social issues,
environmental and energy sources collected from all departments and units.
13. Design of an information totem for customers, printed to collect research at the service desk, sending a form by e-mail and a link on the website.
3.6.6 Resource allocation and definition of criteria
Strategic plan documents are confidential for exclusive access and
responsibility of department directors to carry out the developments based on the guidelines and demands of this document, respond with management plans to support the general plan and submit for approval, and from these develop tactical-operational plans and reports.
The information system model will be dynamic and participatory management,
including the need for the engagement of departmental managers and
local managers of the units, within access criteria, authority, form of
entry, navigation, hierarchical level and information security.
Department directors in synergy and diligence, after analysis for
action of the strategic plan, share the responsibility of establishing a
timetable for completing all key points of the business strategic plan assessment.
All employees must be informed and made aware of the mission,
vision, values ​​and work in pursuit of the corporation's goals.
3.6.7 Identification of long-term goals and action plans.
Balance of goals: short term and long term, of metrics: financial and
non-financial indicators: trends and occurrences, expectations:
internal and external.
Figure 4 BSC strategic map

 

Source: Marcelo Felipe Tanii
"[...] Annotate the data on notebook sheets without any structure
logic and that allows the entire team to speak the same language and understand the
same data to check the same results and, in my opinion,
counter-productive." Cruz, Thaddeus (2017, p. 39).
4. IT STRATEGIC PLAN
4.1 IT Principles
1. Integrity: truth, honesty and ethics;
2. Accountability: Understanding trust and consequences.
3. Leadership: positively influence, encourage;
4. Collaboration: mutually contributing and synchronizing efforts;
5. Quality: meeting expectations well.
4.2 Strategic analysis of internal and external environments
After analysis of the "Document for the strategic analysis of internal environments and
external" of the corporation and the entire corporate strategic plan, it is clear that the factors impact the corporation as a whole, so we work from the "Main points of the assessment of the corporate strategic plan", the participation of the IT director in formulating the plan business strategy already brings the characteristics of alignment and a bidirectional process, such as the use of digital media and social networks in campaigns, definition of the information system model as dynamic, demand for training HR to implement new technologies and systems, follow below are the requirements that impact IT more directly within the area of ​​operation, which is also very comprehensive.
4.3 Business requirements that impact IT
1. Develop information system model to act dynamically
in business.
2. Action together with marketing in digital media and social networks,
aimed at the target audience, disseminate the company's experience, mission, vision and
values ​​on the pages, research and analysis of "Benchmarking".
3. Training and adaptation of new technologies and ways of working.
4. Strategic focus.
5. Project of informational totem for customers, printed to collect research
at the service desk, sending a form by email and a link on the website.
The business structure is divided into six main areas, Administration,
Information and Communication Technology, Legal Finance, Human Resources, Production and Services, Commercial and Logistics. As for the strategic business objectives, the strategic plan defined 13 main points where five directly impact IT, the PPE defined six critical success factors, the main requirements for IT: IT Strategic Plan; Information system proposal; Information Security Policy.
4.4 Analysis of the current IT portfolio:
1. Services: Installation, maintenance and organization of computers;
Statistic; Communication applied to IT; Installation and implementation of systems;
Database; Network management; Modeling of processes and systems;
IT architecture; Infrastructure management; Strategic planning;
Information security; Application solutions; Analysis and development of systems and support.
2. Projects: Information Totem, IT Infrastructure Deployment, Modeling
processes, projects for process automation.
3. IT Outsourcing Services Management: Cloud Computing (Saas, Paas, Iaas)
Amazon, Google, Microsoft.
4. Backlog: IT Strategic Plan; Information system proposal; Policy
information security.
Analysis of the strategic business plan and IT portfolio facilitates the
understanding the dynamics of the business, the status of projects and IT services and helps in creating proposals for IT innovations for the business.
Current IT budget: R$1,500,000 based on the last project.
Analysis and definition of IT architecture: the main frameworks ITILV4 and COBIT5, methodologies in Agile and XP development, in offices and support Mac and MS Windows and Office, IOS and Android on mobile devices, Linux-based servers, virtualization and containerization, practices Devops, MYSQL and POSTGRESQL databases. Architecture's strategy is the conscious use of what best serves at the moment with planning for the future.
4.5 Identification of strengths, weaknesses, opportunities and threats.
Strengths: 1- Constant updating; 2- Strategy for
Outsourcing; 3- Systemic View;
Weaknesses (Weaknesses): 1- Lack of updated strategic plan; two-
Lack of automation in systems; 3- Delay in deliveries.
Opportunities: 1- Strategic alignment; 2- Trends
market, access and search for services by digital means; 3- Innovations
technological;
Threats: 1- Increased competition, new entrants; two-
Customer dissatisfaction; 3- Lack of time, schedule.
Crossing information, strengths and opportunities.

1x1 = Take advantage of the engagement in new technologies in actions to promote business objectives.
2x1 = Solutions for search and access to business services by digital means;
3x1 = Presenting innovations for the business.
To narrow down the work, focus on Leverage.
4.6 Strategic formulation document
As for the Strategic Impact of IT, the entry of new competitors can be
established by IT, mainly for the power of communication in digital media, making a difference in the basis of competition and bargaining in relationships with customers and suppliers, launching new services and products generated from IT, with
use of technological innovations. Thus in the “Strategic Grid” presented in the book by Zacariotto, Costa and Palmeira (2013, p 88) citing McFarlan (1984 apud Laurindo, 2008), IT impacts the company at a “Strategic” level. Today, IT is strategically positioned in the organization, bringing solutions and innovation through a bidirectional process, with the participation of the entire team through participative management and represented by the IT manager and director to forward proposals to the highest level of the company.
4.6.1 Critical Success Factors (FCS)
1- Knowledge: Updating, training and constant recycling of the IT team;
2- Information: Correct, at the right time, for the right person;
3- Data: Manage storage, integrity and availability.
4.6.2 Strategic focus:
"People": customer service, partners and employees,
processes: the operational efficiency exerted by people trained to
produce better, products: the quality of products and services must be monitored,
achieved in these steps.
4.6.3 Identification of objectives and long-term action plans
Figure 5 - BSC for IT

 

Source: Marcelo Felipe Tanii.
Figure 6 BSC cause and effect diagram

 

Source: Marcelo Felipe Tanii
5. INFORMATION SYSTEM PROPOSAL
For the company's information system, there is a need to
integration and due to the size of the corporation, choosing an ERP system
(Enterprise resource planning) Integrated business management system, was
The implementation process will always be a challenge, we have to train people to operate and consider the various modules to meet the business requirements, but it started to be implemented in the previous infrastructure project.
As mentioned in the previous project, the research had a comparison of the three
largest software on the market for managing dental clinics where
we got a good evaluation and chose the system that best suits the
company strategy for being a network of clinics. The system still works best UX practices that improve the user experience.
However, strategic information for the business must be in the company,
which prepared its infrastructure to train its employees, who must be qualified to meet the information technology requirements, being able to use outsourced services without being totally dependent on them.
Figure 7 - Information system model

F

Source: Marcelo Felipe Tanii.
"Any and any peculiar or specific information can be
personalized information call. Whether from the physical or legal "persona",
of a differentiated business, product or service. Also
can be related to a unique characteristic of a prospect, customer,
consumer or competitor and even a product or service.”
Rezende, Denis Alcides (2016, p. 37).
Figure 8 - Data Model

 

 Source: Marcelo Felipe Tanii
In the image just an example of the data to be worked, like this
We have an idea of ​​the importance of generating reliable information for the decisions that lead to the company's destiny.
"It is worth remembering that, like any system, it has this
initial definition and may change during its period of
existence in order to better meet the customer's needs.” clays,
Gislaine Stachissini (2012, p. 166).
6. INFORMATION SECURITY POLICY
“You might be surprised to find out how much information about the
your organization's security are easily and publicly available to
anyone who wants to look them up.” McClure, Stuart (2014, p. 30).
Information Security Policy Document
1. Guide in the management and support of information security, in accordance with the
laws, regulations and rules.
2. Organize and manage information security on the premises, in the
processing, communication and management by third parties.
3. Analyze and apply the level of protection based on the value of the information.
4. Control, monitor and test physical and logical access.
5. Make all employees aware of the responsibilities and consequences
in dealing with information security.
6. Encourage collaboration with communication and registration channels to report
problems, ask questions and make suggestions.
The main items of the information security policy will be
disclosed at all levels of the corporation, and cited briefly and periodically
within company meetings, followed by recent or famous cases that
involve the topic and annotation of suggestions. Specifications are detailed
in the norms, standards and procedures of each area.
"[...] in the most extreme cases where the risk may cause
more serious damage that could lead to the interruption of the activities of the
organization, it is necessary to draw up a business continuity plan that
is intended to keep the organization operating, whatever the situation of
disaster." Sewaybriker, Ricardo (2020 p. 164).
7. CONCLUSION
The alignment of IT in the business from the strategic, well-planned and
applied can return an increase in value and profit to the company, as well as a good investment.
We present the case with a very serious problem for any company,
the loss of the degree of market share, which after analysis was found to require not one, but a series of solutions for the various situations that caused this loss. We program a strategic planning process that is periodically updated to formulate a new business strategic plan and IT strategic plan, we formulate proposals for all proposed issues and situations, and also, to take advantage of the opportunities identified by the analysis tools, we complete the plans for action, we identify the critical success factors, with indicators to measure performance towards objectives, all aligned with the business, but within the characteristics of each area and the company, we present a strategic proposal for the company's information system model , and an objective information security policy, considering the value of data, information and knowledge.
The project concludes with the integration of acquired knowledge based
in the application of the concepts, methods and techniques of each discipline, while noting that the application of this project in the same case as the previous project was very timely, it brings more unity in the construction of knowledge, in order to understand how the different proposed solutions will relate, just as in reality, where countless variables interact with our goals. We emphasize the importance of knowledge in the use and application of technologies and in constant improvement.

REFERENCES
Cross, Thaddeus
Strategic planning manual: tools to develop, execute and
apply / Tadeu Cruz.- São Paulo: Atlas, 2017.
Rezende, Denis Alcides
Information and computer systems planning: guide to planning the
information technology integrated to the strategic planning of organizations/
Denis Alcides Rezende.- São Paulo: Atlas, 2016.
McClure, Stuart
Hackers exposed 7/ Stuart McClure, Joel Scambray and George Kurtz.- New York:
2012, Translation Bookman, 2014.
Zacariotto, William Antônio
IT Strategic Planning / Ivanir Costa, Antônio Palmeira. -
São Paulo: Editora Sol, 2013.136 p. ll.
Barros, Gislaine Stachissini.
Information systems modeling / Gislaine Stachissini Barros. -
São Paulo: Editora Sol, 2012.176 p. ll.
Sewaybriker, Ricardo
Information Security / Ricardo Sewaybriker. 2. ed. -
São Paulo: Editora Sol, 2020.
PRATES, G.A.
Information Technology in Small Businesses: Analyzing Companies from the Interior
São Paulo. Online Administration Magazine, São Paulo, vol. 4. n. 4, pp. 1-13, Dec. 2003.
Sites
cloudia
Available at: https://www.cloudia.com.br/melhores-softwares-odontologicos Accessed: 05/27/2020
ControlDONTO - Dental Software
Available at: https://www.controleodonto.com.br/
Accessed: 05/27/2020
Lucidchart: Online diagram and visual communication software
Available at: https://app.lucidchart.com
Accessed: 05/28/2020
Available at: https://serwiss.bib.hs-
hannover.de/frontdoor/deliver/index/docId/938/file/ISOIEC_27000_27001_and_2700
2_for_Information_Security_Management.pdf
Accessed: 05/29/2020
ISO (International Organization for Standardization)
Available at: https://www.iso.org/standard/42103.html ,
https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en
Accessed: 05/29/2020
Calder, Alan
Information Security Risk Management for ISO27001/ISO27002 / Alan Calder, Steve
G. Watkins
United Kingdom: IT Governance Publishing, 2007, 2010.
Available at: https://books.google.com.br/books?hl=pt-
PT&lr=&id=8Ffa1dOFgO4C&oi=fnd&pg=PA10&dq=iso+27001&ots=QS3xKstE7l&sig
=veSGbvNKeq0BPz1yKeSSJWlRg1o#v=onepage&q=iso%2027001&f=false
Accessed: 05/29/2020

Tips, questions and suggestions leave below in the comments. 👇

sábado, 19 de junho de 2021

Hello, I haven't posted anything for a while, today I went to move things and errors

The changes I made through the app on google drive on my smartphone are not updated when I access Firefox on my laptop.

?

===   ===

When I conected Iphone to Ubuntu laptop to transfer files, msg error:

Oops! Something went Wrong.
Unhanted error message: The name: 1.129 was not provide by .service files

?

===   ===


domingo, 18 de abril de 2021

NOTASPY.py

 # 3425310 2020 12 17 https://docs.python.org/3/library/operator.html operadores python3
nome = "  felipe  "; nome[-8]; type(nome) # String é uma lista
nome.upper(); nome.lower(); "15" + str(2) # Concatena str
print("Felipe 10 vezes!\n" * 10); nome.capitalize() #1a maiúscula
nome.replace("e", "3"); nome.center(50); nome.count("e") # ocorrências;
len(nome); nome.strip() # retira espaços no começo e fim
nome.upper().strip() #dois comandos
nome[3:] #tira os 3 primeiros = 'elipe  '
nome[:5] #pega os 5 primeiros = '  fel'
nome[3:5] #dos 5 primeiros tira 3 primeiros = 'el'
nome[2:-3] # tira os 2 primeiros e 3 ultimos = 'felip'
x, z = 3, 3; x is z; # mesmo conteúdo
ord("谷") # numero unicode 35895
nome > "a" # str ordem unicode  
def listAtrib(): # a, b, c = 0, 0, 0
    return 1, 2, 3
a, b, c = listAtrib() # Atribui retorno a lista de variáveis
a, b = b, a #troca valor das variáveis
def  fun(x, y = 10, z = 5): # valor padrão a ultima var
    print(z)
    x += 7 # atribuição aumentada
    assert x == y # asserção de invariantes
print("123",__name__, end="")    #nome da função
import mat    # terminal na mesma pasta importar função    
import sys
# ao invés da função main, se importar o módulo, testes não executa, a classe apenas)
if __name__ == "__main__":
    mat.fib(int(sys.argv[1])) # insere/REQUER parâmetro no terminal (como script)((( python3 NOTASPY.py 1000 )))
a  = []
for i in range(50, 100, 5): # comeca 50, até 10, de 5 em 5
    a.append(i)
print(a)
dir("txt"); dir(6)    # métodos existenttes
# help("345".isdigit) # ajuda "q" sai # isdigit() se todos carac sao num turn True
"6".isnumeric() # str e retorna se True se for num
"a".isalpha()   #para alfabeto
from datetime import datetime as dt
now = dt.now() # datetime.datetime(2021, 4, 9, 6, 3, 43, 327367)
now.strftime('%Y/%m/%d %H:%M:%S') # Imprimi data
now.strftime('%H:%M:%S %d/%m/%Y') #formato contrario
import time
time.sleep ( 0.1 )  # atrazo
c,r=2,0.5;print('1/%d = %r' %(c, r)) # r= num reais
print("Oi", end='\t') # tabulacao
print(f'Nome: {c} - Idade: {r}')    # var = variante
# import subprocess as s # importa do sistema como s
# s.Popen(['xdg-open', 'http:\\google.com'])   #abre página no sistema
sys.platform    #indica a plataforma em uso # import sys
lista = [6,5,3,4,5,6,1,2] # tupla(), list[]
tupla = (1,2) # sort só funciona em list, ordena a lista e retorna NONE
sorted(lista); print(lista)  #retorna lista ordenada
lista.reverse(); print(lista)   #inverte lista
lista.sort(reverse=True); print(lista)    #revert o sort
import random
n1 = int(random.random()*10+1); print(n1)   #numero aleatório
lista.insert(0, "y"); print(lista)
del(lista[0]); print(lista)
lista2 = lista[:]   #clonar lista    
# CTRL + ]  #Indenta   CTRL + [  #Edenta (no Idle)
def test():
    a=100
    return a
print(test, test()) # <function test at 0x7efec2a3e1f0> 100

'''
====================   Operadores   ======================
+    (Adição/positivo)
-     (Subtração/negativo)
*    (Multiplicação)
/     (Divisão)(divisão: D é o dividendo, d é o divisor, q é o quociente e r é o resto.)
//    (Divisão inteira)
%    (Módulo) Resto da divisão entre operandos (dividendo menor retorna ele mesmo 3%7=3)
**    (Exponenciação) Número elevado a potência de outro (cuidado: negativos (-3**2=-9) e (-3*-3=9))
base**expoente (base negativa e expoente positivo “par” o resultado positivo, “impar” negativo)
======   Ordem de Precedência :  parêntesis(), da esquerda para direita
Bool Table    True, False
exponenciação    **            
mul/div/unários    *, /, //, %
adição        +, -
relacional    == , !=, <=, >=, ><
logico        not
logico        and
logico        or
matemática    parêntesis(), colchetes[], chaves{}
=========================================
Porcentagem = 100*0.655 = 65.5 (porcentagem/100*valor)
Raiz = **0.5
Modulo |-1| = calcular modulo = *-1
Números Complexos (C): C= {√-4, √-3, √--2} (√-1 = unidade imaginaria)
Números Reais(R): conjunto de elementos que inclui:
    Números Naturais (N): N = {0, 1, 2, 3, 4, 5,...}
    Números Inteiros (Z): Z= {..., -3, -2, -1, 0, 1, 2, 3,...}
    Números Racionais (Q): Q = {...,1/2, 3/4, –5/4...}
    Números Irracionais (I ): I = {...,√2, √3,√7, 3,141592.…, π}
=========================================
NotasPyPart2.odt
Folha de Consulta: https://www.ime.usp.br/~vwsetzer/python-opers-funcoes.html
--------------
#range(de 3, ate 20, a cada 1)=17
#(3,20,2)=9 (2*9=18)   #(3,20,3)=6 (3*6=18)
#(20,3,-1)=17   #(20,-3,-1)=23
a=0
for i in range(20,-3,-1):
    a+=1
print(a)
-------------------
Busca Sequencial e Binária: https://panda.ime.usp.br/aulasPython/static/aulasPython/aula23.html
Algoritmos elementares de ordenação: https://panda.ime.usp.br/aulasPython/static/aulasPython/aula24.html
Falta resolver:
 Mais funções com números reais: https://panda.ime.usp.br/aulasPython/static/aulasPython/aula14.html
Mais funções com reais: https://panda.ime.usp.br/aulasPython/static/aulasPython/aula15.html
Exercícios: https://panda.ime.usp.br/aulasPython/static/aulasPython/aula16.html
===========================================================================
Attribution 4.0 International (CC BY 4.0)
https://creativecommons.org/licenses/by/4.0/
Você é livre para compartilhar, copiar e redistribuir o material, em qualquer meio ou formato, adaptar, remixar, transformar e construir sobre o material para qualquer finalidade, mesmo comercialmente. Esta licença é de uma Obra Cultural Livre.
O licenciante não irá revogar essas liberdades, desde que você siga os termos da licença:
1- Atribuição - você deve dar o crédito apropriado , um link para a licença e página do autor, de maneira razoável, mas não que sugira que o licenciante endossa você ou seu uso.
2- Sem restrições adicionais - Você não pode aplicar termos legais ou medidas tecnológicas que restrinjam legalmente outros de fazerem qualquer coisa que a licença permita.
Autor: Felipe Tanii         Página: https://marocero2016.blogspot.com/
===========================================================================
====== ERRORS ======
----------------------------------------------------
SyntaxError: unexpected EOF while parsing   ( falta parênteses, falta “pass” em funcao )
SyntaxError: invalid syntax   ( falta ":" dois pontos)
TypeError: apaga_repetidos() takes 1 positional argument but 2 were given   (
    falta "self" em funcao da classe, )
IndexError: list index out of range  (falta 1 parametro)
======      =======      ======
'''