• 제목/요약/키워드: Information Systems Operations

검색결과 1,463건 처리시간 0.029초

정보시스템 관리에 있어서 최적 배치 조정 정책 (Optimal policies for batch control operations in Information Systems)

  • 김기수
    • 경영과학
    • /
    • 제11권1호
    • /
    • pp.145-163
    • /
    • 1994
  • For an Information System to be successful the continual control of the database system(DBS) is very important. In general, such control operations are performed periodically in batches, even in real time systems. We explain DBS related such control operations and describe the decision problem in each of them. Specifically, backup, checkpointing, reorganization, and batch update operations are considered. Then we develop a general model of the batch backup situation to determine the optimal backup timing. Other operations are considered as special cases of the general batch backup operation are derived and compared. We show that, in general, the control limit policy is superior to the fixed time interval policy in terms of the long-run average cost per unit time. Some practical considerations about the implementation of optimal policies are also mentioned.

  • PDF

정보시스템 도입에 따른 보안기능 컴포넌트 대체 수준 의사결정 (Decision on Replacing Security Components for Infer]nation Systems)

  • 최명길;김현우;김은혜;김세헌
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.147-157
    • /
    • 2004
  • Enterprises and governments currently utilize COTS based information systems which are a kind of component based systems. Especially, COTS are widely utilized as information security systems and information systems including information security functions. This paper suggests an appropriate adaptation level of security functional components and a cost effective priority among them. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

  • PDF

이동 IP 체계에 대한 군 정보체계 활용방안 연구 (A Study on Mobile IP Systems for Military Information Systems)

  • 이태종
    • 한국국방경영분석학회지
    • /
    • 제22권2호
    • /
    • pp.73-89
    • /
    • 1996
  • This paper suggests the new IP, SIMIP(Simple Mobile IP), which supports a continuous mobility between a static host and a mobile host in the static TCP/IP LAN environment where mobile hosts are overlayed with cells. For designing a mobile protocol, routing optimization is very important, and it is directly related to the management mechanism of a mobile host's location information. When the mobile hosts' location information are centralized, the network has high risk when a centralized device fails. On the other hand, when they are distributed, the above problems are solved. But it requires complicated techniques in order to search the encapsulated addresses. SIMP centralizes mobile hosts' location information, minimizes the risk by automatically substituting the failed default mobile router with one of the multiple general mobile routers, and supports the optimal routing path through "default mobile router path alternation" Then since SIMIP isn't reasonable the operations informations to the chief in military operations room.ions room.

  • PDF

고속 임베디드 저장 시스템을 위한 복제전환 기법 (Mirror-Switching Scheme for High-Speed Embedded Storage Systems)

  • 변시우;장석우
    • 정보저장시스템학회논문집
    • /
    • 제7권1호
    • /
    • pp.7-12
    • /
    • 2011
  • The flash memory has been remarked as the next generation media of portable and desktop computers' storage devices. Their features include non-volatility, low power consumption, and fast access time for read operations, which are sufficient to present flash memories as major data storage components for desktop and servers. The purpose of our study is to upgrade a traditional mirroring scheme based on SSD storages due to the relatively slow or freezing characteristics of write operations, as compared to fast read operations. For this work, we propose a new storage management scheme called Memory Mirror-Switching based on traditional mirroring scheme. Our Mirror-Switching scheme improves flash operation performance by switching write-workloads from flash memory to RAM and delaying write operations to avoid freezing. Our test results show that our scheme significantly reduces the write operation delay and storage freezing.

개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구 (The Priority of Internal Control Factors for Information Systems based on Individual Characteristics)

  • 박종은;이우형;이명호
    • 경영과학
    • /
    • 제21권1호
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.