• Title/Summary/Keyword: Internet Service Provider

Search Result 361, Processing Time 0.026 seconds

A study on the relevant market definition of online search advertising - Focusing on Naver, Korean Search & Portal service provider - (온라인검색광고시장의 시장획정에 관한 연구 - 검색포털사업자 네이버를 중심으로 -)

  • Cho, Dae-keun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.109-119
    • /
    • 2017
  • This paper is to analyse empirically using the data collected from Korea portal Naver's ad management system and show online ad platform may not be two-sided market. It is aim of this study to propose the appropriate approach to define the market, based on the empirical result. Here are two research questions to be reviewed. First, is there any consistency between business model of search advertising and definition of two-sided market which Rochet-Tirole proposed in 2006? Second, do indirect network externalities exist significantly in search advertising market? if so, this study is going to estimate the level of it through empirical measurement. Based on Luchetta's paper which suggested that google may be one-sided market, it performed the correlation & regression analysis to prove his suggestion. The result is that online search advertising costs increased by more than 50 won when advertisers increased by one unit. However, there was no significant correlation and regression between the search frequency and online search advertising cost. It means that there is little possibility to identify two-sidedness in online search advertising service(market) because of no(or little) indirect network externalities which are a necessary condition for two-sided market. This result has three implications, such as the availability to adapt traditional market definition tools to online search advertising market, the possibility enhancement to find the fundamental competition elements in defined market and promotion of the powers of persuasion in competitive market reality. It is significant that the gap between legal scholars including regulatory practitioners and economists can be overcome to some extent. who have shown the different perspective on the two-sided market.

IT Service Strategy on Development of Online Floral Distribution Service : A Typhoon Positioning Strategy (화훼소매점의 온라인 유통서비스 진화에 따른 정보기술서비스 전략 - A Typhoon Positioning Strategy를 중심으로 -)

  • Lee, Seung-chang;Ahn, Sung-hyuck;Lee, Soong
    • Journal of Distribution Science
    • /
    • v.7 no.4
    • /
    • pp.15-26
    • /
    • 2009
  • The internet has dramatically changed a way of business management and competition in the business environment. Especially, it stimulated not only to evolve online floral distribution service but also to change a phase of competition among floral retail stores in industry. And that also led to keen competition among IT service providers as well. This study is to examine how floral retail stores have been evolved and competed with the radical situation of the floral distribution industry through IT service in the aspect of business and information technology. In addition, the Typhoon Positioning Strategy(TPS), a strategy for the IT service positioning, is introduced from IT service provider's perspective. For IT service providers to create high business value and continuous service providing, IT service should be positioned on the customers' "core business" and developed to the level of "solution." The Typhoon Positioning Strategy(TPS) is a strategy for the IT service positioning, indicating that IT service should be positioned according to a Business Process-Service model with the consideration of business development direction, IT service trend, and user's IT capability. That is, IT service providers should find out customers' "core business" area first to provide a right IT service to the company, and the IT service provided should meet to the level of business solution. The capability of the IT solution users is also an important factor to be considered for the advanced IT service. There are four principles of the Typhoon Positioning Strategy(TPS). Principle 1) IT service provided should be an IT solution Map suitable for customer business processes. Principle 2) IT service provided should be able to support customer core business. Principle 3) IT service provided should be a business solution. Principle. 4) IT service provided should be applied differently according to the level of customer's IT capability.

  • PDF

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

Design and Implementation of MPEG-4 Streaming System with Prioritized Adaptive Transport (우선순위화 기반 적응형 전송 기능을 가진 MPEG-4 스트리밍 시스템의 설계 및 구현)

  • 박상훈;장혜영;권영우;김종원;유웅식;권오형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.859-867
    • /
    • 2004
  • To provide high-quality media streaming service over the best-effort Internet, a streaming methodology is required to response to the dynamic fluctuation of underlying networks. In this paper, we implement the MPEG-4 streaming system with adaptive transport based on priorities of media packets. The implemented system is composed of the common MPEG-4 streaming components such as elementary stream provider, sync and DMIF layer, and adaptive transport module including data prioritization and FEC control. More specifically, the prioritized sync layer packets (based on object level) are delivered to the transport module and then are encoded by an adaptive FEC encoder to help reliable transport. The FEC combination is dynamically adjusted by the feedback information from the receiver. In addition, low priority packets are selectively dropped to meet the limitation of available bandwidth. The experimental results over the emulation-based testbed show that the Proposed system can mitigate the impact of network fluctuation and thus improve the quality of streaming.

Mechanism of Windowing of Domestic Free TV Programs (국내 지상파 방송 콘텐츠의 창구화 메커니즘 분석)

  • Lee, Moon-Haeng
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.190-197
    • /
    • 2009
  • Domestic free TVs play roles as for contents provider and TV station : they need to acquire not only ad revenues but also distribution revenues from internet service, cable channel and DMB. It is however doubtful to keep the windowing of programs through the different windows due to recent decrease of ad revenues of the stations. Therefore, the purpose of this study is to search for the mechanism of windowing of free TV's programs and the strategy of the distribution. As a result, the life cycle of the broadcasting programs is so short to be distributed within 7 days, Regarding the windowing, there are at first the strategy increasing the accumulated revenue by the diversification of the windows ; secondly, the strategy focusing on the prospective window neglecting the holdback. It is necessary to choose to take the appropriate strategy by the particularity of each program and the market background.

A Study on The Improved Selection Method of Information Security Management System(ISMS) Certification Object Applying SMART Technic (SMART 평가법을 활용한 정보보호 관리체계(ISMS) 인증 의무대상자 선정 기준 개선 방안에 관한 연구)

  • Jang, Sang Soo
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.85-94
    • /
    • 2014
  • Information Security Check System was Introduced in 2004, higher than in 2013, the effectiveness of Information Security Management System(ISMS) certification scheme was to unification. This is incident to the Internet affecting people's lives telecommunications service provider to target accountability because, considering the subject's duty selection criteria need to be clarified. however, Obligations under the current legislation, subject selection criteria applying the law itself is ambiguous, the result being a significant problem. Moreover, the regulatory system of certification systems subjects, although selection criteria should be clear and objectively not the obligation not to distrust the system itself and the subject was raised many issues for you. In this study, with SMART Technic in order to improve this certification you can easily determine whether a medical person authorized to develop a model for selection of medical subjects, The developed model is verified through empirical ways to improve the system by presenting the system to help, to secure the effectiveness.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Design and Implementation of Mobile Device Description Repository System (모바일 단말정보 저장소 시스템 설계 및 구현)

  • Lee, Young-Il;In, Min-Kyo;Lee, Kang-Chan;Lee, Seung-Yun;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.320-323
    • /
    • 2008
  • Due to the improvement of mobile device capabilities, a demand for various contents service is increasing. But the differences from heterogeneous mobile devices force to develop contents which is dependent on a mobile. To solve this problem, adaptation course that reorganize contents by the device capability is needed. In this course, device description is described using device description language but there are some problems that is absence of device description repository and the way to get device description data. In this paper, I suggest device description acquisition module and define the interfaces to access device description repository that I designed and implemented.

  • PDF

The Consideration about an Electronic Medical Record Security Standardization (전자의무기록 보안표준화에 대한 고찰)

  • Park, Doo-Hee;Song, Jae-Young;Lee, Nam-Yong
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.125-154
    • /
    • 2005
  • Due to the development of Internet and the collection and usage of the individual information, the infringements of the personal data have been increased rapidly. Regarding the personal data protection in the medical industry, it is clearly described in 'Act on Promotion of Information and Communication Network Utilization and information Protection, etc.'. the law is ratified on the basis of the service provider, therefore, it has its own limitation to be applied to medical industry. Therefore, this paper is to set the security standard and to discuss the range of legal application and considerations on its basis for the domestic medical institution at the electronic medical record system. We exemplify specific applicable content of the electronic signature in the electronic medical record also, present a security assessment item in electronic medical system and set the criteria for the security standard in the medical industry.