• Title/Summary/Keyword: Client-centric

Search Result 27, Processing Time 0.026 seconds

Differentiated B2B Marketing Strategy of Dongwon Systems, the No.1 Packaging Solution Company in Korea

  • Jun, Mina;Kim, Sang Yong;Lee, Janghyuk;Koo, Kay Ryung
    • Asia Marketing Journal
    • /
    • v.20 no.3
    • /
    • pp.1-15
    • /
    • 2018
  • Dongwon Systems established in 1977 to exclusively supply Dongwon tuna cans, the parent company. Instead of its stable management and profits by relying on the parent company, the company was not complacent and started innovating and challenging new markets. Dongwon Systems decided to expand the business area and pioneer new markets so that it becomes the first domestic company to successfully expand into independent businesses other than parent company products. Such success of Dongwon Systems was driven by its differentiated B2B strategies. Unlike the characteristics of usual B2B companies, Dongwon Systems has been thinking both of its client companies and end-consumers. In this case-study, we will explore how Dongwon Systems became the No.1 packaging solution company in Korea through technology innovation in the aspects of unique B2B marketing strategy. The key success factor can be summarized in three ways; product and technology development with customer centric mind-set, systematically extending new markets through business diversification, and marking Southeast Asia as a bridgehead for its global strategy. It is expected that the current case study of Dongwon Systems will be able to provide implications for B2C companies as well as B2B companies that try to expand their business portfolio and global business areas through B2B marketing case analysis.

Performance Analysis of DDS for Distribution Network Management System Suitable for Satellite Communication (위성 통신 환경에 적합한 분산 망관리시스템을 위한 DDS의 성능 분석)

  • Song, Ye-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1179-1185
    • /
    • 2013
  • Trend of next generation satellite communication network is distribution and enlargement of network structure with increased network terminals, and traffic which use satellite communication is increasing and frequently occurring. Under specific satellite communication environment that various communication device dynamically forms a network domain and frequently exchanges the data, data-centric publish/subscribe data exchange is more suitable than server/client data exchange. So, this paper analyze DDS performance for application of DDS standard to distribution network management system which aims to efficiently manage limited satellite resource, and also this paper covers comparative study on DDS and SNMP(server/client data exchange). Study compares DDS and SNMP using OPNET, and result of study is analyzed from a network layer performance perspective.

A Review of Customer Satisfaction Factors in Libyan Housing Projects

  • Shebob, Abdulhamid;Shah, Raj;Mhalas, Amit
    • Journal of Construction Engineering and Project Management
    • /
    • v.3 no.4
    • /
    • pp.26-34
    • /
    • 2013
  • Customer satisfaction and customer relationship are crucial aspect in any enterprises including housing construction projects. In general, the housing developers are facing a number of new challenges in different countries including Libya. The construction industries/housing developers need to continuously improve their products and services to meet customers' satisfaction desires and to remain in the current competitive market. This paper focuses on analysing the satisfaction factors of customers including qualityaspects of products and services in the construction projects. A framework was developed to evaluate the dynamics relationship between customer satisfaction and quality products or services, aiming to help companies' managers and policy makers to understand the needs and points of view of their customers. Apragmatic analysis was conducted to explore and analyse the customer satisfaction factors in construction industry considering different aspect of customer groups in Libya. Results indicate that there is a high demand of improvements in the contractor's performance in terms of cost, time and quality of products. It was also found that Libyan construction companies have been forced to transform their policies after on Libyan war 2011 to focus on client and customer satisfactory policies, or say centric for the purpose of improving client requirements and turn the business into more advantageous for any company.

A Study of Secure Client System with HVA(High Value Asset) (HVA를 이용한 안전한 클라이언트 시스템 연구)

  • Park, Jae-kyung;Kim, Young-Ga;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.455-456
    • /
    • 2018
  • 본 논문에서는 기존의 클라이언트 서버 환경에서 해킹에 취약한 구조를 개선하고자 새로운 형태의 클라이언트 서버 환경을 제안한다. 서버 측에는 기존의 웹 서버를 클라이언트 측으로 내려서 클라이언트가 필요한 데이터 만을 전달하는 방식으로 서버에 웹 공격 자체가 이루어질 수 없는 구조를 제안한다. 이를 통해 기존의 서버가 해킹을 당해 악성코드를 유포하고 서버의 데이터를 해킹하는 문제를 완전히 차단할 수 있음은 물론 클라이언트 PC에 악성코드가 감염되어도 서버에는 여향을 미치지 않는 새로운 패러다임을 제시하고자 한다. 본 논문에서는 클라이언트 측에 USB형태의 BBS(Big Bad Stick) 하드웨어를 통하여 제안하는 환경을 검증하고 서버 측의 보안장비와의 암호화 통신을 통해 안전한 서비스가 제공됨을 증명하여 본 연구가 새로운 보안성을 갖춘 시스템임을 보인다.

  • PDF

Web System Development Process based on Domain Features : Content centric Domain and Data centric Domain (도메인 특성에 근거한 웹 시스템 개발 프로세스 : 컨텐트 중심 도메인 및 데이터 중심 도메인)

  • Park, Su-Yong;Im, Seong-Jae
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.111-126
    • /
    • 2002
  • As the technical aspect of the web system development is, unlike the existing main frame or client/server environment, greatly influenced by the dynamic and variable factors and carried out in a comparatively short period, practical and efficient process to which the developer may adapt with ease is very much required for the web system development. However, while the technological substitute, language and architecture composition have been much discussed, in connection with web system development growing rapidly, standardized development process and its deliverables have been rarely discussed. This thesis analyzes problems of the existing web system development processes and as the substitutes for them, proposes web system development process based on the domain features derived from the concepts of iteration and increment. For the classification of domains, five domains in total are set by interlocking web system factors and web site types and the workflows for two domains applied to projects are incorporated focused on work content and deliverables. The proposed process applies to the development of intranet system and is compared with the existing web development processes by the measure classified into components and elements.

Study on Philosophy and of counselor's Attitude of Solution Focused Counseling Approach (해결중심상담접근의 철학과 상담자태도에 관한 연구)

  • Rho, Myung-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.8
    • /
    • pp.3724-3731
    • /
    • 2013
  • The purpose of this study was to find philosophy and counselor's attitudes of solution focused counseling approach. Research methods was to analyze the target literature on 'solution focus / principle; value; philosophy; attitude' through data retrieval around the books, academic papers, master thesis, Phd thesis. The results of this study are as follows. The philosophy of solution focused counseling approach is to center clients, to focus on 'effect', to base on social constructivism and to base on positive psychology. In addition, the counselor' attitudes of solution focused counseling approach is to have 'not-knowing' stance about Clients, to take the attitude of observation with sincere curiosity, to compliment the clients, to become a partner and a coach to practice solution focused counseling approach in various fields.

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.

Implementation and Performance Measuring of Erasure Coding of Distributed File System (분산 파일시스템의 소거 코딩 구현 및 성능 비교)

  • Kim, Cheiyol;Kim, Youngchul;Kim, Dongoh;Kim, Hongyeon;Kim, Youngkyun;Seo, Daewha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1515-1527
    • /
    • 2016
  • With the growth of big data, machine learning, and cloud computing, the importance of storage that can store large amounts of unstructured data is growing recently. So the commodity hardware based distributed file systems such as MAHA-FS, GlusterFS, and Ceph file system have received a lot of attention because of their scale-out and low-cost property. For the data fault tolerance, most of these file systems uses replication in the beginning. But as storage size is growing to tens or hundreds of petabytes, the low space efficiency of the replication has been considered as a problem. This paper applied erasure coding data fault tolerance policy to MAHA-FS for high space efficiency and introduces VDelta technique to solve data consistency problem. In this paper, we compares the performance of two file systems, MAHA-FS and GlusterFS. They have different IO processing architecture, the former is server centric and the latter is client centric architecture. We found the erasure coding performance of MAHA-FS is better than GlusterFS.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.