• Title/Summary/Keyword: Enterprise Cloud Computing

Search Result 54, Processing Time 0.033 seconds

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Microservice construction method based on UML design assets of monolithic applications (모놀리식 애플리케이션의 UML 설계 자료에 기반한 마이크로서비스 구성 방법)

  • Kim, Daeho;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.5
    • /
    • pp.7-18
    • /
    • 2018
  • Recently, serverless computing is spotlighted. Because it supports the development of application based on micro-service. Micro-service means a small-scale service that can operate independently. Applications with micro-service units have the advantage of enabling individual updates, easy and fast deployment. In addition, it has the advantage of supporting various languages and platforms for each service. Therefore many enterprise are trying to change from monolithic architecture to micro-service based architecture. However, there is a lack of research on methods and baseline for micro-service construction. In this paper, a method is proposed to construct the micro-service unit by analyzing UML design in monolithic application. It also shows the proposed approach can reconstruct monolithic application into micro-service based unit by implementing the constructed micro-services in a real serverless platform environment. In addition, the results of the comparative evaluation with the related studies are presented.

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

Investigating the Determinants of Major IT Incident Tickets: A Case Study of an IT Service Provider Firm for Logistics and Distribution Industry

  • Ro, Mohamad Izham Che;Lau, Wee-Yeap
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.61-69
    • /
    • 2016
  • Purpose - This study investigates the determinants that affect the number of IT Incident tickets of an IT Service Provider ("ITSP") to logistics industry in order to improve its management process by reducing the incident tickets. Research design, data, and Methodology - This study uses weekly data of IT incident tickets from September 2012 to June 2015. Correlation and regression analyses are conducted. Six identified determinants i.e., IT Change, User Errors, Shipment Volume, Network, Hardware and Software Issues are used as the explanatory variables. Results - Our findings show as following. First, our analysis indicates that IT Change is not a significant determinant as opposed to what commonly believed by many as the most important factor. Second, Software issue is the highest contributor to the Major IT incident tickets, followed by User Error, Network and Hardware issues. Third, it seems there is lead-lag relationship between IT Change and Major IT Incidents tickets as indicated by earlier studies. Fourth, the relationship between IT Change and Major IT tickets is also affected by shipment volume. Conclusions - As policy recommendation, all identified determinants should be treated according to priority. In addition, improving the way IT Changes are implemented will definitely reduce the IT incident tickets.

Trend analysis and Classification of Linux distributions (리눅스 배포판의 분류 및 동향 분석)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.357-363
    • /
    • 2017
  • The Linux operating system, considered to be a subset of the UNIX operating system, is becoming the backbone of the enterprise server market and is seen as the key to building cloud computing and big data infrastructures. Linux has a variety of Linux distributions due to the fact that the source is open and anyone can freely modify and distribute it. First of all, Linux dominated the server market, the emergence of various distributions dominates the desktop and mobile operating system markets. In this paper, we examine the birth and history of Linux and classify and characterize various Linux distributions. The emergence of various Linux distributions will play a pivotal role in the Internet of Things and will further expand their power.

Performance Evaluation and Optimization of Journaling File Systems with Multicores and High-Performance Flash SSDs (멀티코어 및 고성능 플래시 SSD 환경에서 저널링 파일 시스템의 성능 평가 및 최적화)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.178-185
    • /
    • 2018
  • Recently, demands for computer systems with multicore CPUs and high-performance flash-based storage devices (i.e., flash SSD) have rapidly grown in cloud computing, surer-computing, and enterprise storage/database systems. Journaling file systems running on high-performance systems do not exploit the full I/O bandwidth of high-performance SSDs. In this article, we evaluate and analyze the performance of the Linux EXT4 file system with high-performance SSDs and multicore CPUs. The system used in this study has 72 cores and Intel NVMe SSD, and the flash SSD has performance up to 2800/1900 MB/s for sequential read/write operations. Our experimental results show that checkpointing in the EXT4 file system is a major overhead. Furthermore, we optimize the checkpointing procedure and our optimized EXT4 file system shows up to 92% better performance than the original EXT4 file system.

A Study on the Technological Priorities of Manufacturing and Service Companies for Response to the 4th Industrial Revolution and Transformation into a Smart Company (4차 산업혁명 대응과 스마트 기업으로의 변화를 위한 제조 및 서비스 기업의 기술적용 우선순위에 대한 연구)

  • Park, Chan-Kwon;Seo, Yeong-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.83-101
    • /
    • 2021
  • This study is to investigate, using AHP, what technologies should be applied first to Korean SMEs in order to respond to the 4th industrial revolution and change to a smart enterprise. To this end, technologies related to the 4th industrial revolution and smart factory are synthesized, and the classification criteria of Dae-Hoon Kim et al. (2019) are applied, but additional opinions of experts are collected and related technologies are converted to artificial intelligence (AI), Big Data, and Cloud Computing. As a base technology, mobile, Internet of Things (IoT), block chain as hyper-connected technology, unmanned transportation (autonomous driving), robot, 3D printing, drone as a convergence technology, smart manufacturing and logistics, smart healthcare, smart transportation and smart finance were classified as smart industrial technologies. As a result of confirming the priorities for technical use by AHP analysis and calculating the total weight, manufacturing companies have a high ranking in mobile, artificial intelligence (AI), big data, and robots, while service companies are in big data and robots, artificial intelligence (AI), and smart healthcare are ranked high, and in all companies, it is in the order of big data, artificial intelligence (AI), robot, and mobile. Through this study, it was clearly identified which technologies should be applied first in order to respond to the 4th industrial revolution and change to a smart company.