• Title/Summary/Keyword: Resource Provider

Search Result 118, Processing Time 0.023 seconds

A Qualitative Study on the Experience and Future Job Recognition of Resource Provider in the Gig Economy (긱 경제 자원 공급자의 경험과 미래 일자리 인식에 대한 질적 연구)

  • Park, Soo Kyung;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.141-154
    • /
    • 2018
  • As the sharing economic market grows, the subject of sharing is expanding to intangible resources such as time, experience, and expertise. The phenomenon that an individual temporarily participates in the platform by utilizing own intangible resources is defined as a 'gig economy'. The gig economy has a positive expectation that can create new jobs, but also has negative warnings that it is only a temporary job based on low wages. The gig economy market is growing rapidly in Korea, however there are very few academic discussions. This study examines the experiences of resource providers in the Korean gig economic platform, and then explores future job changes based on the perception of resource providers. This study selected the subject of research as a talent sharing platform and conducted in-depth interviews with 16 resource providers. The results of the research were presented through content analysis, and their experiences and perceptions were classified into six themes. This study implies academic and practical significance in exploring in depth the overall experience of resource suppliers and in suggesting proposals for desirable successful market growth.

A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster

  • Kim, Changhyeon;Lee, Wonjoo;Jeon, Changho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1398-1417
    • /
    • 2013
  • A method is proposed to reduce excess resources from a virtual machine(VM) while avoiding subsequent migrations for a computer cluster that provides cloud service. The proposed scheme cuts down on the resources of a VM based on the probability that migration may occur after a reduction. First, it finds a VM that can be scaled down by analyzing the history of the resource usage. Then, the migration probability is calculated as a function of the VM resource usage trend and the trend error. Finally, the amount of resources needed to eliminate from an underutilized VM is determined such that the migration probability after the resource reduction is less than or equal to an acceptable migration probability. The acceptable migration probability, to be set by the cloud service provider, is a criterion to assign a weight to the resource reduction either to prevent VM migrations or to enhance VM utilization. The results of simulation show that the proposed scheme lowers migration frequency by 31.6~60.8% depending on the consistency of resource demand while losing VM utilization by 9.1~21.5% compared to other known approaches, such as the static and the prediction-based methods. It is also verified that the proposed scheme extends the elapsed time before the first occurrence of migration after resource reduction 1.1~2.3-fold. In addition, changes in migration frequency and VM utilization are analyzed with varying acceptable migration probabilities and the consistency of resource demand patterns. It is expected that the analysis results can help service providers choose a right value of the acceptable migration probability under various environments having different migration costs and operational costs.

A Resource Access Control Mechanism Considering Grid Accounting (그리드 어카운팅을 고려한 자원 접근 제어 메커니즘)

  • Hwang Ho-Joen;An Dong-Un;Chung Seung-Jong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.363-370
    • /
    • 2006
  • Currently, many people have been researching diverse mechansmims related to a resource access control in Grid environment. Mostly Grid user's resource access control was designed to authorize according to their attributes and roles. But, to provide Grid with resources continuously, a resource access based on utility computing must be controlled. So, in this paper we propose and implement mechanism that intergrates Grid accounting concept with resource access control. This mechanism calcuates costs of Grid service on the basis of accounting, and determines based on user's fund availibility whether they continue to make use of site resources or not. Grid jobs will be controlled according to a site resource access control policy only if the amount of available fund is less than its costs. If Grid job completed, resource consumer pays for the costs generated by using provider's idle resources. Therefore, this paper provides mechansim to be able to control user's resource access by Grid accounting, so that it is evaluated as the research to realize utility computing environment corresponding to economic principle.

Resource Availability-based Multi Auction Model for Cloud Service Reservation and Resource Brokering System (자원 가용성 기반 다중 경매 모델을 이용한 서비스 예약형 클라우드 자원 거래 시스템)

  • Lee, Seok Woo;Kim, Tae Young;Lee, Jong Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • A cloud computing is one of a parallel and distributed computing. The cloud computing provides some service for user with virtual resources. However, a user's service request does not show a time pattern. As a result, each resource also shows a different availability at the same time. This difference affects a quality of service (QoS) and a resource selection for users. Therefore, we propose the resource availability-based multi auction model for cloud service reservation and resource brokering system. The proposed system is to select the proper resource provider based on the users' request. The proposal adopts the multi phase of the auction to transact resources. The system evaluates the available factor of each resource on the auction phase, and finally reserves the service on the adaptive queue. The proposed model shows the better performance than other existing method.

A Resource Reservation Protocol and Packet Scheduling for Qos Provisioning in Hose-based VPNs (Hose 기반 VPN에서의 서비스품질 제공을 위한 자원예약 프로토콜과 패킷 스케줄링 기법)

  • Byun Hae-Sun;Woo Hyun-Je;Kim Kyoung-Min;Lee Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.247-256
    • /
    • 2006
  • Among the resource provisioning mechanisms for the hose based Virtual Private Network (VPN) Quality of Service (QoS ), VPN-specific state provisioning allows the service provider to obtain highest resource multiplexing gains. However, dynamic and automatic resource reservation for the VPN-specific state provisioning is difficult due to the lack of appropriate resource reservation protocol. Furthermore, users of a VPN may experience unfair usage of resources among themselves since the reserved resources of a VPN are shared by the VPN users in a similar way that the traditional LAN bandwidth is shared by the attached hosts. In this paper, we propose a resource reservation protocol and a traffic service mechanism, which not only enable dynamic and automatic resource reservation according to the VPN-specific state provisioning algorithm, but also enforce the fair usage of reserved resources among the users of a VPN in case of congestion.

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

Remote Resource Control System based on Web Environment (웹 환경을 기반으로 한 원격 자원제어 시스템)

  • Lee, Gi-Jun;Jeong, Guk-Yeong;Jeong, Chae-Yeong
    • The KIPS Transactions:PartA
    • /
    • v.8A no.2
    • /
    • pp.91-98
    • /
    • 2001
  • TCP/IP based remote system using internet presented the method to access and control all the types of resources connected to network system over time and space. In this paper, We studied a resource control method through a mutual communication of a system association composed of service user, provider, and manager of the network system for the web based remote control system. The service users require the resources, and its providers are a variety of devices and digital electronic products which can provide the services in a network system. The service manager who operates the whole system performs the role to interconnect its users with its providers. Through an experiment, an implemented system confirmed flexibility, stability, and extensibility of the method presented in this paper.

  • PDF

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

Resource Reservation for Hose model in Virtual Private Networks (VPN Hose 모델을 지원하기 위한 자원 예약 방안)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.328-330
    • /
    • 2005
  • 현재의 RSVP-TE는 VPN hose provisioning 메커니즘들을 고려하여 자원예약을 수행하지 못한다. 이 논문에서는 Provider Provisioned-Virtual Private Network(PP-VPN)에서 Quality of Service(QoS)를 제공하는 Hose 모델 기반의 provisioning 메커니즘들을 네트워크에 적용하여 자원예약을 수행하도록 하기 위해 Resource Reservation Protocol Traffic Engineering(RSVP-TE)의 확장방안에 대해 설명한다. 동일한 VPN을 서비스하는 LSP들 간 자원을 공유할 수 있게 함으로써 네트워크 상에 요구되는 자원을 최적화하였으며, VPN 고객을 서비스하기 위한 효율적이고 자동적인 자원예약이 가능하도록 하였다. 이 논문에서는 솔루션의 프로토콜 elements와 procedure에 대하여 설명한다.

  • PDF

Effects of Strategic Resources on Technology Commercialization (기술이전을 통한 기술사업화에 영향을 미치는 기업자원요인 탐색연구)

  • Kim, Kyong-Hwan;Hyun, Sun-Hae;Choi, Young-Jin
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.151-163
    • /
    • 2006
  • The purpose of this research was to examine the factors that affect colleges that play an important role in technology commercialization as technology provider, and enterprises as technology user engaging in technology transfer commercialization by dividing it into strategic resource factor. And this study was also intended to present a strategic meaning and perspective relative to colleges and enterprises as well. To do this, those factors that have influences on technology transfer commercialization were elicited through investigation of literatures, and classified into strategic resource factors to suit research purpose, and based on these information, research hypothesis and research model were established and designed. Research results improved that some enterprises among benefited from technology transfer.