• 제목/요약/키워드: 서비스 관리 프로세스

Search Result 532, Processing Time 0.027 seconds

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

A Methodology for Determining Cloud Deployment Model in Financial Companies (금융회사 클라우드 운영 모델 결정 방법론)

  • Yongho Kim;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • As cloud services and deployment models become diverse, there are a growing number of cloud computing selection options. Therefore, financial companies need a methodology to select the appropriated cloud for each financial computing system. This study adopted the Balanced Scorecard (BSC) framework to classify factors for the introduction of cloud computing in financial companies. Using Analytic Hierarchy Process (AHP), the evaluation items are layered into the performance perspective and the cloud consideration factor and a comprehensive decision model is proposed. To verify the proposed research model, a system of financial company is divided into three: account, information, and channel system, and the result of decision making by both financial business experts and technology experts from two financial companies were collected. The result shows that some common factors are important in all systems, but most of the factors considered are very different from system to system. We expect that our methodology contributes to the spread of cloud computing adoption.

Development of Activity Pattern Analysis and its Application to the Health Check-up Service Organization (활동패턴분석방법론의 개발과 적용 : 종합건강검진서비스 적용사례를 중심으로)

  • Moon, Jae Ung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.69-92
    • /
    • 2013
  • Activity Pattern Analysis(APA) is the methodology to Design the functions of information systems, to Estimate the monetary value of IS based on Activity Based Costing, to Acquire feasibility of IT Project. This study shows APA case in Health Check-up Service Organization (G-Center) and the Utility of APA. G-Center had acquired Five Outcomes through APA: (1) IT Strategy, (2) IT Project Goals, (3) Transformed Business Process, (4) Functional Blueprint of Information Systems, (5) IT Project budget and its feasibility. APA consists of three analysis processes; Activity Separation, Activity Rearrangement, Activity Costing. APA is flexible in determinating the range and the time of analysis, and is able to expand the Actors(as analysis objects) based on the purpose of analysis by researcher. Eventually APA can be used to do internal IT Management effectively.

IFC-based Data Structure Design for Web Visualization (IFC 기반 웹 가시화를 위한 데이터 구조 설계)

  • Lee, Daejin;Choi, Wonik
    • Journal of KIISE
    • /
    • v.44 no.3
    • /
    • pp.332-337
    • /
    • 2017
  • When using IFC data consisting of STEP schema based on the EXPRESS language, it is not easy for collaborating project stakeholders to share BIM modeling shape information. The IFC viewer application must be installed on the desktop PC to review the BIM modeling shape information defined within the IFC, because the IFC viewer application not only parse STEP structure information model but also process the 3D feature construction for a 3D visualization. Therefore, we propose a lightweight data structure design for web visualization by parsing IFC data and constructing 3D modeling data. Our experimental results show the weight reduction of IFC data is about 40% of original file size and the web visualization is able to see the same quality with all web browsers which support WebGL on PCs and smartphones. If applied research is conducted about the web visualization based on IFC data of the last construction phase, it could be utilized in various fields ranging from the facility maintenance to indoor location-based services.

A Study on Government Support for Logistics Security (물류보안 인증을 위한 정부지원 방안 연구)

  • Lee, DonHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.109-123
    • /
    • 2016
  • This study investigates the importance of government's support for logistics security assurance through certification programs. First, the study analyzed priorities among the requirements of logistics firms through Analytic Hierarchy Process(AHP) and Quality Function Deployment(QFD) approaches. For this process we invited 21 logistics experts to assess the relationships between logistic firms' requirements and government policies regarding logistics security using the house of quality, a set of matrices of QFD. The results of this phase of the study revealed the priorities of logistics firms' goals regarding the diffusion of the government security certification program as follows: integrated logistics security systems(40.3%), strengthening government support systems(32.4%), and operational effectiveness of logistics security certification(27.2%). Second, a relative weights applied QFD method based on AHP was applied to determined the expected outcome of the logistics security certification program. The results indicated as follows: productivity improvement(28.4%), improved level of service(26.7%), logistics cost reduction(21.6%), advanced information systems(19.7%), and improved environmental protection(3.6%). The results of this study provide new insights concerning logistics firms' requirements for supply chain security and the importance of government's support policies through logistics security certification programs.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Method for Establishment of Case-based Software Maintenance Maturity Model (사례기반의 소프트웨어 유지보수 성숙도 모델 수립 방안)

  • Kim, Ji-Hyeok;Kim, Chang-Jae;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.718-731
    • /
    • 2009
  • Software Maintenance needs to continually improve from corrective maintenance to operational management and service improvement. In this study, we propose a software maintenance maturity model and its evaluation criteria based on 4 maintenance projects of K organization. For the proposal, we derive 13 process areas and 64 evaluation criteria based on some references such as SMMM, ITSMM, ITIL. We evaluate the criteria using 5-point scale, and then establish the maturity model of K organization classified by levels of the maturity model based on the evaluation result. And, to verify and improve the maturity model of K organization, we propose improvements for evaluation criteria. In addition, we apply the maturity model to the 4 projects, evaluate the projects, and propose improvements for the projects based on the evaluation result to identify how the model shows software maintenance improvement.

The Component Design of a Diverse Sensing Data Recognition Trigger (다양한 센싱 데이터 인식 트리거 컴포넌트 설계)

  • Kim, KyeongOg;Ban, KyeongJin;Ryu, NamHoon;Jang, MoonSuk;Kim, EungKon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.770-775
    • /
    • 2009
  • Along with the advance of USN technology in a human-oriented informatization society these days, society is quickly changing into a ubiquitous computing society in which information even between objects can be organically combined and utilized. In order to successfully build such a ubiquitous computing society, it is indispensable to have core USN technologies such as USN sensor nodes, sensor networks, USN middleware, and USN applied services that efficiently manage sensing information collected from sensor nodes, and support the abstraction function for the composition of sensor networks. In order to process the transmission event of sensing values that are generated from various USN terminal devices, this study designs a process that performs the abstraction of data for the efficient process of diverse sensing values transferred from USN and RFID terminal devices.

  • PDF

ICT Utilization for Optimization of SME Decision Making (중소기업 의사결정 최적화를 위한 ICT 활용 방안)

  • Park, Ji-Young;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.275-280
    • /
    • 2018
  • Companies are now rapidly entering the realm of the realtime economy named 'Now Economy'. 'Now Economy' features the measurement and assessment, accelerating speed of decision making about business. According to this, companies intend to change their disposition to be able to make quick and accurate decision by gathering informations rapidly and correctly, and then by processing that. Applications of ICT can be possible to change the new decision system of companies. In this thesis, the new decision system through amalgamations of BPMS, Mobile, Cloud Service, Hadoop, BI and AI is presented. It will be able to make decision quickly and accurately by collecting all information between the most efficiently managed process and formal and informal data inside company through this, and then by combining changes with situations outside company.

The Study of the electronic Access Service Model for Supply Chain (공급망을 위한 전자적 접근 서비스 모델 연구)

  • Ahn, Kyeongrim;Lee, Suyoun
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.95-100
    • /
    • 2014
  • The trend of business work that is related to supply chain changed into e-business using the electronic document However, the small and medium enterprise organizations still use huge volume of paper document, especially in private sector. Recently, the need for eco-friendly and low cost logistics becomes increasing. For this, it has expanded to exchange or to use e-document rather than the paper or manual processing in supply chain business. Therefore, this paper proposed the electronic access system for supply chain by business process modeling. If it is using the proposed system, it can be saving the exchanged or the scanned document to system, and user can utilize that document on just accessing system whenever they need the document. We believe it might reduce the burden of each organization because they don't need to save large volume data to their system or place. Furthermore, the benefits will effect across the national as well as global.