• Title/Summary/Keyword: IP strategy

Search Result 108, Processing Time 0.026 seconds

A Competitiveness Analysis on Business Resources of 'TVING' in Korean OTT Market: Focusing on Resource-based Theory and VRIO Framework (국내 OTT 시장에서 '티빙' 경영자원의 경쟁력 분석: 자원준거이론(RBT) 및 VRIO 분석 모형을 기반으로)

  • Vickie Jinhee Yu;Ilhan Hong;Kenneth Chi Ho Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.147-172
    • /
    • 2023
  • This study aims to review the competitiveness of 'TVING', a Korean OTT player in Korean market. For this, this study extracts core business resources of TVING focusing on resource-based theory, and analyzes their competitiveness under VRIO framework. TVING has 4 tangible and intangible resources respectively and 1 human resource. Tangible resources of TVING are technology(recommendation, compression), content(original, exclusive, discriminative non-exclusive), production studio, and paid-subscribers. Intangible resources are content planing capability, distribution network(local, global), marketing promotion·PR, sales), brand preference. And human resource of TVING creates IP professionalism of the company. As a result of VRIO analysis, discriminative non-exclusive content, production studios, and domestic service channels are the most powerful resources of TVING to 'sustain competitive advantage'. Technology, original content, planning capability and IT professionalism bring 'temporary competitive advantage', while exclusive content, the number of paid-subscribers, global service network, and promotion capabilities are not core resources with staying in competitive rank stages. By the way, TVING has potential users for sales of KT and LGU+ thanks to partnership and M&A, but this is not effectively used at the organization level yet. The meaning of this study can be found in that this evaluated competitiveness by each resource of TVING and arranged its implications.

Distribution Remote Management System Design and Program Development Based on ADWHM(Advanced Digital Watt-Hour Meter) (차세대 디지털 적산전력계에 기반한 배전원격관리시스템 설계 및 프로그램 개발)

  • Ha Bok-Nam;Ko Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.4
    • /
    • pp.185-192
    • /
    • 2005
  • This paper proposes a DRMS(Distribution Remote Management System) which can enhance highly the economics of automatic metering system and the power quality supplied to the electric customer improving the efficiency of the meter reading, voltage management and load management work by realizing the remote meter reading, the remote voltage management and the remote load management based on the ADWHM(Advanced Digital Watt Hour Meter). The DRMS is designed so that the voltage management and load management work in remote site can be processed by collecting the voltage pattern and current pattern as well as watt hour data from all ADWHMs one time every month regularly or from special ADWHMS several time irregularly, A new on-line voltage and load management strategy based on the ADWHM is designed by analyzing the existing voltage management and load management process. Also, DRMS is designed so that watt-hour data, voltage pattern data, load pattern data and power factor data can be collected selectively according to the selection of user to assist effectively the methodology. Remote management program and database of the DRMS are implemented based on Visual C++, MFC and database library of MS. Also, DRMS is designed so as to communicate with the ADWHM using RS232C-TCP/IP converter and ADSL. The effectiveness of the remote metering function is proven by collecting and analyzing the data after ADWHMs installed in any site. The developed strategy and program also is verified through the simulation of voltage management and load management.

Korean Students' Perceptions of Free-talking and International Professors' Role Recognition

  • Kim, Nahk-Bohk
    • English Language & Literature Teaching
    • /
    • v.17 no.3
    • /
    • pp.119-139
    • /
    • 2011
  • Free-talking in Korea has recently been emphasized as a way of improving students' speaking ability outside of the classroom. The purpose of this study is to examine perceptions of free-talking, to understand what type of roles were played by or allotted between Korean students and international professors (IPs) and to look for effective speaking strategies for utilizing free-talking. Participants of this study were 68 university students and 23 IPs. The data collected through a survey type of questionnaire were analyzed by this researcher and the main findings indicate that students and IPs have somewhat different viewpoints about their concepts of free-talking. Students expressed varying viewpoints depending on their experience and class (year). In terms of the benefits, usefulness, and satisfaction of free-talking, students and IPs seem to be in more agreement with each other although the two groups have conflicting perceptions in the particular operation of free-talking, especially in terms of preparation and feedback. Students stated that they feel anxious, nervous, and that they struggle with peer pressure while free-talking. However, they feel that through free-talking they build up confidence and increase their speaking ability. Regarding roles, most professors play a helpful role as a guide or facilitator while students want professors to provide more suitable materials and to tutor them by means of appropriate feedback and strategies as well-prepared teachers like a prompter, participant or tutor in the timely manner. Finally, this paper proffers a few practical suggestions for activating free-talking and a discussion of the pedagogical implications.

  • PDF

A Efficient Strategy to Schedule Packets in Channel based Network (고속의 채널 기반 네트웍에서 효율적인 패킷 스케줄링 기법)

  • Kim, Young-Hwan;Go, Jae-Jin;Jeon, Ki-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11a
    • /
    • pp.455-458
    • /
    • 2003
  • 네트워크 사용자의 급속한 증가로 네트워크 내의 부하를 감당하기에는 많은 어려움을 가져왔다. 이와 같은 이유로 기존의 TCP/IP 에서 세션을 통하여 노드들 간의 통신을 연결하는 방식에서 현재는 하나의 채널을 통해 고속의 I/O 가 가능하도록 하는 기술의 많이 연구되고 있다. 그 대표적인 것으로 인피니밴드가 있다. 인피니밴드는 프로세싱 노드와 입출력 장치 사이의 통신, 프로세스간 통신에 대한 산업 표준이 되고 있고 프로세싱 노드와 입출력 장치를 연결하기 위해 스위치 기반의 상호 연결은 전통적인 버스 입출력을 대체하는 새로운 입출력 방식을 사용한다. 또한 인피니밴드는 서버 시스템에서 요구하는 여러 특징 중에서 어플리케이션에게 QoS (Quality of Service)을 보장할 수 있는 메커니즘을 포함하고 있다. 본 논문에서는 어플리케이션에서 요구하는 각 트레픽의 요구 대역폭 크기에 따라 구분하여 효율적인 중재 테이블의 구성을 통해 데이터 전송에 있어 QoS 에 합당하게 출력포트를 통해 나갈 수 있도록 중재 테이블을 관리하는 기법을 제안하고 이를 NS-2 (Network Simulator)을 이용하여 성능 평가를 했다. 특히 기존 인피니밴드에서의 중재 테이블을 이용한 패킷 처리량과 본 논문에서 제안한 중재 테이블 구성 방식을 이용한 패킷 처리량을 비교했으며 성능평가 결과는 기존의 인피니밴드에서의 패킷 처리량에 비해 약 19% 향상된 결과를 나타냈다.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Location Error Analysis of an Active RFID-Based RTLS in Multipath and AWGN Environments

  • Myong, Seung-Il;Mo, Sang-Hyun;Yang, Hoe-Sung;Cha, Jong-Sub;Lee, Heyung-Sub;Seo, Dong-Sun
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.528-536
    • /
    • 2011
  • In this paper, we analyze the location accuracy of real-time locating systems (RTLSs) in multipath environments in which the RTLSs comply with the ISO/IEC 24730-2 international standard. To analyze the location error of RTLS in multipath environments, we consider a direct path and indirect path, in which time and phase are delayed, and also white Gaussian noise is added. The location error depends strongly on both the noise level and phase difference under a low signal-to-noise ratio (SNR) regime, but only on the noise level under a high SNR regime. The phase difference effect can be minimized by matching it to the time delay difference at a ratio of 180 degrees per 1 chip time delay (Tc). At a relatively high SNR of 10 dB, a location error of less than 3 m is expected at any phase and time delay value of an indirect signal. At a low SNR regime, the location error range increases to 8.1 m at a 0.5 Tc, and to 7.3 m at a 1.5 Tc. However, if the correlation energy is accumulated for an 8-bit period, the location error can be reduced to 3.9 m and 2.5 m, respectively.

A Study on Preparation Plan against National Industrial Technology Outflow (국가 산업기술유출 대비 방안 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.55-62
    • /
    • 2009
  • Industrial Security is a management activity protecting industrial asset of enterprise by application of security elements(physical, IP, conversion security tools) and can be understood as a comprehensive term including software aspect(establishment of policy and strategy, maintenance operation, post- response act, etc.) as well as the operation of hardware elements. In this paper, after recognizing the definition and relative concept of industrial security, the role and its relative laws of the industrial security organizations, the management system and the reality, I will find some problems and submit a reform measure. Furthermore I would like to propose the policy direction to enhance the national competitiveness and to become one of the advanced nations in 21st industrial security through the effective industrial security activities of our enterprises.

  • PDF

A Study on the Brand-based Warehouse Management in Online Clothing Shops (온라인 쇼핑몰의 브랜드 중심 창고관리 기법에 대한 연구)

  • Song, Yong-Uk;Ahn, Byung-Hyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2011
  • As the sales volume of online shops increases, the job burden in the back-offices of the online shops also increases. Order picking is the most labor-intensive operation among the jobs in a back-office and mid-size pure click online shops are experiencing the time delay and complexity in order picking nowadays while fulfilling their customers' orders. Those warehouses of the mid-size shops are based on manual systems, and as order pickings are repeated, the warehouses get a mess and lots of products in those warehouses are getting missing, which results in severe delay in order picking. To overcome this kind of problem in online clothing shops, we research a methodology to locate warehousing products. When products arrive at a warehouse, they are packed into a box and located on a rack in the warehouse. At this point, the operator should determine the box to be put in and the location on the rack for the box to be put on. This problem could be formulated as an Integer Programming model, but the branch-and bound algorithm to solve the IP model requires enormous computation, and sometimes it is even impossible to get a solution in a proper time. So, we relaxed the problem, developed a set of heuristics as a methodology to get a semi-optimum in an acceptable time, and proved by an experiment that the solutions by our methodology are satisfactory and acceptable by field managers.

Study on the Prevention of Patent Disputes through Network Analysis - Focusing on NPEs in Smart Car Industry - (스마트카 특허분쟁 네트워크분석을 통한 특허분쟁예방에 관한 연구)

  • Ryu, ChangHan;Suh, Minsuk
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.23 no.3
    • /
    • pp.315-325
    • /
    • 2015
  • Smart Car market has been experiencing continuous growth to drive leading companies in automotive and IT industries to focus on advancing related technologies. As the IT technologies fuse into automotive technologies, the patent litigation has been showing changes. One of the prominent changes in patent litigation pattern of Smart Car field is the increased activities of the Non-Practicing Entities (NPEs), whose main field has been the IT area. However, the automotive companies have been mainly focusing on preventing patent disputes against competitors through trend analysis, which caused them to become relatively vulnerable to the attacks from NPEs. In this study, we developed a methodology for monitoring and analyzing the activities of NPEs using network analysis tools to suggest effective strategies for manufacturing companies to fortify their ability to respond against unanticipated attacks. Our methodology, which is developed for the Smart Car field, can also be useful for other fields such as IT and electronics.

A Novel Methodology for Extracting Core Technology and Patents by IP Mining (핵심 기술 및 특허 추출을 위한 IP 마이닝에 관한 연구)

  • Kim, Hyun Woo;Kim, Jongchan;Lee, Joonhyuck;Park, Sangsung;Jang, Dongsik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.392-397
    • /
    • 2015
  • Society has been developed through analogue, digital, and smart era. Every technology is going through consistent changes and rapid developments. In this competitive society, R&D strategy establishment is significantly useful and helpful for improving technology competitiveness. A patent document includes technical and legal rights information such as title, abstract, description, claim, and patent classification code. From the patent document, a lot of people can understand and collect legal and technical information. This unique feature of patent can be quantitatively applied for technology analysis. This research paper proposes a methodology for extracting core technology and patents based on quantitative methods. Statistical analysis and social network analysis are applied to IPC codes in order to extract core technologies with active R&D and high centralities. Then, core patents are also extracted by analyzing citation and family information.