• Title/Summary/Keyword: 컨퍼런스

Search Result 615, Processing Time 0.023 seconds

키코(KIKO) 손실 중소기업의 위기극복 사례연구: 월드클래스 300기업 (주)쎄믹스를 중심으로

  • 정미화
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2023.11a
    • /
    • pp.91-96
    • /
    • 2023
  • 글로벌로 핵심기술 경쟁 및 최상의 기술을 적용한 제품 제조를 실현해야 하는 ICT 분야의 수출 제조 중소기업은 내부, 외부적인 환경적 요인뿐 아니라 다양한 위기상황을 겪게 된다. 이러한 위기상황을 극복하고자 기업 자체적인 전략을 다방면으로 모색하고 실행하여 성공한 수출 제조 중소 벤처기업인 '(주)쎄믹스'가 있다. 2000년에 설립한 (주)쎄믹스는 반도체 검사장비 중 하나인 Wafer Prober 제조 전문기업으로, 'Simple Perfection'이라는 슬로건 아래 23년간 'OPUS' 및 'OPERA'를 생산, 판매에 전념하고 있는 글로벌 강소기업이며, 지속적인 핵심기술 연구개발을 통해 품질혁신에 성공하였고 글로벌 반도체 검사장비 시장에서 기술적 신뢰와 브랜드 명성을 인정받고 있는 벤처기업이다. 현재 (주)쎄믹스의 입지를 구축하기까지 수출 제조기업으로서 겪은 환율관리 실패인 키코손실에서 기인한 회사 위기를, 자체적으로 기술혁신, 조직혁신, 핵심인재 육성 등 전략적 기업혁신에 성공하여 회사의 존폐위기였던 상황을 극복하였다. 우선 키코손실을 떨쳐내고 새로이 시작하기 위한 S사와의 합병, 분할 후 조직 내부에 기업가정신을 고취하였고 핵심기술을 발굴하여 세계일류상품 인증, 월드클래스 300 선정 및 완수, 6개국에 7개의 자회사 설립 통한 조직혁신, 과감한 인재등용, 인재육성 위한 사내 컨퍼런스 제도 도입, TRIZ 등을 통한 과감한 교육혁신, 인재를 위한 특별한 복지정책 구현 등을 실천하였다. 본 연구는 '(주)쎄믹스'의 위기극복 사례를 통해 일본의 두 곳 대기업만이 누리고 있던 Wafer Prober 장비 시장에서 독자적인 글로벌 판로개척을 통한 자생적 성장시스템 구축과 창의적이고 자기 주도적인 혁신체제를 구축하는 계기를 제공하여 다양한 위기상황에 직면하였거나 위기를 미연에 방지하여야 할 중소기업인과 임직원들에게 성공 사례를 제공하고자 하였다.

  • PDF

An Analysis of Preservice Teachers' On-line Discussion Based on Social Constructivist Learning Theory (사회적 구성주의 학습이론에 기초한 예비 교사의 온라인 토론 분석)

  • Cha, Jeongho;Noh, Taehee
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.13-23
    • /
    • 2005
  • In this study, messages from on-line discussions of 28 preservice teachers were analyzed based on social constructivist learning theory. After preliminary discussion session for a week, small group discussions were conducted every single week with different topics during 4 weeks. One transcript with most frequent messages in each topic was selected, and a total of 72 messages were analyzed. Discussion topics were the issues related to the nature of science. The Interaction Analysis Model for Examing Social Construction of Knowledge in Computer Conferencing was used for the analysis. Analysis of the messages indicated that 'sharing information' was the most frequent, and that 'discovering/exploring dissonance' and 'negotiation of meaning/co-construction of knowledge' were the nex. However, messages of 'testing and modification of proposed synthesis' and 'testing and application of newly constructed meaning' were found to be rare. This result indicated that students' interaction through on-line discussion did not reach to the social construction of knowledge.

  • PDF

A Qualitative Study of Physicians' Use of Clinical Information Resources and Barriers (임상의사의 진료목적 정보원 이용과 장애요인에 관한 질적 연구)

  • Kim, Soon;Chung, EunKyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.4
    • /
    • pp.55-75
    • /
    • 2016
  • We analyzed the characteristics of the physicians preferred information sources and barriers through in-depth interviews. Information searches for patient treatment were subdivided into deciding patient treatment methods, understanding the latest treatment trends, and preparing presentation materials for conferences. The variables that affected the search behaviors were identified as being background knowledge on the topic, clinical experience, job title, search skills, user training, and familiarity with the library homepage. PubMed was the most preferred choice because of users' familiarity, reliability, and the vastness of information; Google was also used frequently for easy access and fast search result. The accuracy and the recentness of information were the most significant criteria. Easy interface and convenient access were also considered important due to physicians' time constraints. Searching obstacles were divided into difficulty of searching system, unfamiliar term, too vast resources, difficulty to get fulltext articles and complex advanced search features. The results of this study can be utilized as a basis for improving information service of library and curriculum development for physicians.

Global Collaborative Activities on GLORIAD (국제 협업 연구를 위한 글로리아드(GLORIAD) 활용)

  • Lee, Minsun;Oh, Choongsik;Lee, Hyungjin;Ryu, Jinseung;Jang, Haegjin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.586-588
    • /
    • 2007
  • The Moore's law states that the number of transistors on a chip doubles about every 18 months. And it was reported that the network speed has been doubled about every 9 months. This indicates that computing power and network is no longer the obstacles for the high performance applications requiring terabits networks. We believe that the application motivates the network and vice versa. This presentation will introduce the GLORIAD which is the first ring network connecting six countries around the world and provides scientists with advanced networking tools that improve a communications and data exchange. The GLORIAD trans-Pacific link started its service on August 1, 2005. Since then, there has been remarkable demonstrations were performed through major conferences like Supercomputing Conference. This paper will introduce the global collaborative works on demonstrations of VMT, high energy physics, SDSS and HD video transmission during SC'06 in Tampa, FL.

  • PDF

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

Watershed Modeling for Assessing Climate Change Impact on Stream Water Quality of Chungju Dam Watershed (<2009 SWAT-KOREA 컨퍼런스 특별호 논문> 기후변화가 충주댐 유역의 하천수질에 미치는 영향평가를 위한 유역 모델링)

  • Park, Jong-Yoon;Park, Min-Ji;Ahn, So-Ra;Kim, Seong-Joon
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.10
    • /
    • pp.877-889
    • /
    • 2009
  • This study is to assess the future potential impact of climate change on stream water quality for a 6,581.1 km$^2$ dam watershed using SWAT (Soil and Water Assessment Tool) model. The ECHAM5-OM climate data of IPCC (The Intergovernmental Panel on Climate Change) A2, A1B, and B1 emission scenarios were adopted and the future data (2007-2099) were corrected using 30 years (1977-2006, baseline period) weather data and downscaled by Change Factor (CF) method. After model calibration and validation using 6 years (1998-2003) observed daily streamflow and monthly water quality (SS, T-N, and T-P) data, the future (2020s, 2050s and 2080s) hydrological behavior and stream water quality were projected.

Room Acoustic Design in International Convention Center Jeju (제주국제컨벤션센터 컨퍼런스홀의 건축음향 설계)

  • 주현경;오양기;두세진;김하근
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.802-807
    • /
    • 2003
  • International Convention Center Jeju(ICCJ) was planed and built for accommodating a variety of conventional and exhibitional activities. For a better flexibility of operation, almost all rooms in ICCJ are designed to be subdivided Into a couple of small rooms with installation of movable partition walls. Architectural and acoustical design should be deliberatively and cooperatively undertaken to cope with such a complex condition. Conference hall, the largest room in ICCJ, has a capacity of 5000 seats who:1 used as a whole. It could be divided into 3 halls, one with 2000 pre-installed seats on slanted floor, up/down removable stage and its settings above, and the other 2 flat rooms with no seats installed. A devided hall with pre-installed seats and stage is designed for a multi-use auditorium. Almost all surfaces except ceilings adjacent to the stage are sound absorptively treated, in regard to extensive use of sound reinforcement systems. Its reverberation time 1.65 sec without audience, which is roughly correspond to 1.50 sec with fully occupied audience. When there is a need for a larger room, all the partition wail Is removed and the hall could be used as a whole. Exhibition hall is located in the first floor of ICCJ. Absorption and softness are needed for the hat 1 because exhibition behavior has something noisy features. Perforated MDF panels with porous materials and air space in the back groundare adopted for the walls. There are one large, two medium, and several small convention rooms in ICJJ. The room are also acoustically designed for maximum flexibility with no defects soundwisely.

  • PDF

Presentation for 15th Annual International Magnet Schools of America Conference - Alexis Park Resort & Spa, Las Vegas, Nevada, Thursday, May 1, 1997 (제15차 국제매그넷스쿨컨퍼런스참가/논문발표)

  • Rhyu, Hyang-San
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.4 no.2
    • /
    • pp.31-36
    • /
    • 1997
  • The Magnet Methodology is not the recording of knowledge, skills, techniques, and other information from the past, but creating a knowledge base using present issues of problems for students' and teachers' life-span development through the exploration of career choices and development. In short, it is the multi-cooperative information system for commensalism. It is the magnet program that connects various level of educational institutions under a certain theme and enables students to choose on their own. And this magnet program is being adminstered by the magnet school. And some regular schools provide magnet program as vocational educations and extra-curricular activities. Magnet program reflects the concept of desegregation which was proposed by the U.S. Federal Court decision against the racial conflict which had culminated in the 60s and 70s. Magnet program enables students to choose their own programs and schools, and gives teachers and students the opportunities to develop their teaching method and learning method. That's why magnet program is called continuous, future-oriented one. Teachers and students can also get fair judgement on their activities due to the voluntary magnet program. It mainly deals with practical issues, so it is very realistic to establish the multi cooperative information system including companies, homes, communities, or governments under these practical issues. The openness of magnet program is guaranteed not only by the characteristics of the program but also by the physical layout of the magnet schools. There are no doors and walls, and classrooms are facing one another and sharing all the opinions and information. This precisely corresponds to the concept of co-existence of eco-system and the interdisciplinary approach which is essential to solve our problems.

  • PDF

An Evaluation Study for APEC International Cooperation Projects : Focusing on the Perception of Participants (APEC 국제교육협력사업에 대한 성과평가 연구: 국제교육활동 참여자들의 인식을 중심으로)

  • Jang, Deok-Ho;Cha, Jungchan;Lee, Jeong-youn;Paik, Sunhee
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.9-19
    • /
    • 2019
  • This study conducted the international evaluation of the APEC educational cooperation projects initiated by the Korean government and drew out strategies and tasks for their sustainable implementation. To this end, eight projects implemented by the Institute of APEC Collaborative Education were selected for the evaluation which examined participants' awareness of and the degree of participation in the eight projects as well as contribution to the intended outcomes of the projects. An online survey was conducted to participants of the eight projects and 283 experts and participants from 18 economies responded. The descriptive analysis found that the participants of ALCoB Cooperation Project reported the most positive perception of the awareness while the participants of the ALCoB Internet Volunteers showed the lowest degree of participation in and contribution to the intended outcomes of the project. Based on the results, several suggestions for further progress in Korea's APEC educational cooperation were made.

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.