• Title/Summary/Keyword: Software as Service

Search Result 1,438, Processing Time 0.024 seconds

Intents of Acquisitions in Information Technology Industrie (정보기술 산업에서의 인수 유형별 인수 의도 분석)

  • Cho, Wooje;Chang, Young Bong;Kwon, Youngok
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.123-138
    • /
    • 2016
  • This study investigates intents of acquisitions in information technology industries. Mergers and acquisitions are a strategic decision at corporate-level and have been an important tool for a firm to grow. Plenty of firms in information technology industries have acquired startups to increase production efficiency, expand customer base, or improve quality over the last decades. For example, Google has made about 200 acquisitions since 2001, Cisco has acquired about 210 firms since 1993, Oracle has made about 125 acquisitions since 1994, and Microsoft has acquired about 200 firms since 1987. Although there have been many existing papers that theoretically study intents or motivations of acquisitions, there are limited papers that empirically investigate them mainly because it is challenging to measure and quantify intents of M&As. This study examines the intent of acquisitions by measuring specific intents for M&A transactions. Using our measures of acquisition intents, we compare the intents by four acquisition types: (1) the acquisition where a hardware firm acquires a hardware firm, (2) the acquisition where a hardware firm acquires a software/IT service firm, (3) the acquisition where a software/IT service firm acquires a hardware firm, and (4) the acquisition where a software /IT service firm acquires a software/IT service firm. We presume that there are difference in reasons why a hardware firm acquires another hardware firm, why a hardware firm acquires a software firm, why a software/IT service firm acquires a hardware firm, and why a software/IT service firm acquires another software/IT service firm. Using data of the M&As in US IT industries, we identified major intents of the M&As. The acquisition intents are identified based on the press release of M&A announcements and measured with four categories. First, an acquirer may have intents of cost saving in operations by sharing common resources between the acquirer and the target. The cost saving can accrue from economies of scope and scale. Second, an acquirer may have intents of product enhancement/development. Knowledge and skills transferred from the target may enable the acquirer to enhance the product quality or to expand product lines. Third, an acquirer may have intents of gain additional customer base to expand the market, to penetrate the market, or to enter a foreign market. Fourth, a firm may acquire a target with intents of expanding customer channels. By complementing existing channel to the customer, the firm can increase its revenue. Our results show that acquirers have had intents of cost saving more in acquisitions between hardware companies than in acquisitions between software companies. Hardware firms are more likely to acquire with intents of product enhancement or development than software firms. Overall, the intent of product enhancement/development is the most frequent intent in all of the four acquisition types, and the intent of customer base expansion is the second. We also analyze our data with the classification of production-side intents and customer-side intents, which is based on activities of the value chain of a firm. Intents of cost saving operations and those of product enhancement/development can be viewed as production-side intents and intents of customer base expansion and those of expanding customer channels can be viewed as customer-side intents. Our analysis shows that the ratio between the number of customer-side intents and that of production-side intents is higher in acquisitions where a software firm is an acquirer than in the acquisitions where a hardware firm is an acquirer. This study can contribute to IS literature. First, this study provides insights in understanding M&As in IT industries by answering for question of why an IT firm intends to another IT firm. Second, this study also provides distribution of acquisition intents for acquisition types.

An Aspect-based Testing Framework for Performance Evaluation of Composite Service (조합된 서비스의 성능 평가를 위한 Aspect 기반 테스팅 프레임워크)

  • Kim, Jong-Phil;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.149-158
    • /
    • 2012
  • As service-oriented software is considered as one of solutions to fulfill the users' needs in internet service environment, it has been increased the demands of reliable service development by the composition of internet services. However a critical issue in the service development approach is to satisfy the performance requirement as well as the functional correctness for the developing services, because impatient user multiply clicks the request-button of service without a short waiting. This paper proposes a framework to examine the performance of composite service. Our testing framework provides the data of service response time to service developer by measuring the service execution time. We develope an Aspect-based timer service, and weave the service with existing services to measure the execution time. Additionally, we perform some experiments to confirm the usefulness of performance test for composite service. This framework can support to develop a good performance service by substitution of the dragging service with another new service that will be a component of composite service.

Process Improvement in Software Companies: A Live Study at Motorola

  • Kumari, Neeraj
    • The Journal of Industrial Distribution & Business
    • /
    • v.7 no.1
    • /
    • pp.11-14
    • /
    • 2016
  • Purpose - The study aims to show the successful application of Six Sigma in software companies for process improvement. Research design, data and methodology - A mixed methodology has been used which include both qualitative and quantitative research. In the qualitative research methodology part, a detailed and comprehensive literature study have been carried out. The literature study consists of articles, books, web materials, discussion forms and others. In the quantitative research methodology part, interviews have been conducted. Results - Six sigma is the practical application of a theoretical statistical measurement that equates to 3.4 defects per million opportunities -a position of practically zero defects for any process or service. Initially originating in Motorola Inc. in 1985 as a response to drastic quality improvement pressures from the threat of Japanese competition, it quickly gained many followers particularly G.E., Allied Signal, Ford Motor Company etc. and more recently attentions have shifted to service environments. There are still some problems and misconceptions existed about the applicability of Six Sigma in software companies. Conclusions - The paper concludes that Six Sigma can bring large benefits for software companies too. Furthermore, software companies have already started to implement Six Sigma approach, like Ericsson, Tata Consultancy Service, etc.

Analysis on the Sleep Patterns and Design of System for Customized Deep Sleep Service in Motion Bed Environments (모션 베드 환경에서 맞춤형 숙면 서비스를 위한 시스템 설계 및 수면 패턴 분석)

  • Kang, Hyeon Jun;Lee, Seok Cheol;Jeong, Jun Seo;Cho, Sung Beom;Lee, Won Jin;Lee, Jae Dong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1109-1121
    • /
    • 2022
  • As the demand for quality sleep increases in modern society, the importance of sleep technology has increased. Recently, development of sleep environment improvement products and research on the user's sleep improvement have been activated. Representatively, user sleep pattern analysis research is being conducted through the existing polysomnography, but it is difficult to use it in the sleep environment of daily life. Therefore, in this paper, we propose a system design that can provide a customized deep sleep service to users by detecting sleep disturbance factors in a motion bed environment. In order to improve the user's sleep satisfaction, a logistic regression-based sleep pattern analysis model is proposed and accuracy and significance are verified through experiments. And to improve user's sleep satisfaction, we propose a logistic regression-based sleep pattern analysis model and verify accuracy and significance through experiments. The proposed system is expected to improve the user's sleep quality and effectively prevent and manage sleep disorders.

Computer-aided approach of parameters influencing concrete service life and field validation

  • Papadakis, V.G.;Efstathiou, M.P.;Apostolopoulos, C.A.
    • Computers and Concrete
    • /
    • v.4 no.1
    • /
    • pp.1-18
    • /
    • 2007
  • Over the past decades, an enormous amount of effort has been expended in laboratory and field studies on concrete durability estimation. The results of this research are still either widely scattered in the journal literature or mentioned briefly in the standard textbooks. Moreover, the theoretical approaches of deterioration mechanisms with a predictive character are limited to some complicated mathematical models not widespread in practice. A significant step forward could be the development of appropriate software for computer-based estimation of concrete service life, including reliable mathematical models and adequate experimental data. In the present work, the basis for the development of a computer estimation of the concrete service life is presented. After the definition of concrete mix design and structure characteristics, as well as the consideration regarding the environmental conditions where the structure will be found, the concrete service life can be reliably predicted using fundamental mathematical models that simulate the deterioration mechanisms. The prediction is focused on the basic deterioration phenomena of reinforced concrete, such as carbonation and chloride penetration, that initiate the reinforcing bars corrosion. Aspects on concrete strength and the production cost are also considered. Field observations and data collection from existing structures are compared with predictions of service life using the above model. A first attempt to develop a database of service lives of different types of reinforced concrete structure exposed to varying environments is finally included.

Development and application of online physical computing curriculum for pre-service teachers (예비교사를 위한 온라인 피지컬 컴퓨팅 교육과정 개발과 적용)

  • Kim, Tae-ryeong;Han, Sun-gwan
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.4
    • /
    • pp.621-632
    • /
    • 2021
  • This study is about development and application of a curriculum to implement physical computing education in an online environment for pre-service teachers. First, a 15-week software and physical computing curriculum was designed according to the ADDIE instructional design model. As a tool that can be used online, education was conducted on a program using various sensors using Pocket Code, an EPL based on a smartphone. As a result of the application of the program, Personal efficacy, Pedagogical knowledge, Technology teaching content knowledge, Result expectation, and Student belief were all significantly improved. In the software attitude part, Software interest and Software value part increased significantly, and the Perception of software engineers did not change. In general, in the case of physical computing, it is difficult to execute in an online environment because it involves a lot of manipulation activity. Through various studies that can continue education in a non-face-to-face environment or a blended environment in the post-corona era, it is hoped that it will be possible to provide a high-quality curriculum to pre-service teachers in charge of future education.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

Business Models Proposal for Korean Open Source GIS Software Companies (국내 오픈소스 공간정보 소프트웨어 관련 기업의 비즈니스 모델 제안)

  • Son, Se-Rin;Kang, Youngok
    • Journal of Cadastre & Land InformatiX
    • /
    • v.48 no.1
    • /
    • pp.187-199
    • /
    • 2018
  • The purpose of this study is to propose an open source GIS software business model for the revitalization of Korean open source GIS software industry. In this study, we categorized the types of open source software business models and developed an open source software business strategy suitable for GIS companies in Korea. To propose a business model, we applied the business model canvas which is often used in the area of business studies to analyze new business models. We tried to develop the open source GIS business model through both interviews and case studies with Korean open source GIS software companies. We propose three different types of open source GIS software business models such as distributor model, producer model, and 3rd party service provider model as follows: first, the companies which belong to distributor model can carry out business by providing professional services in the market of open source software. Second, the companies which belong to producer model can sell their products to the global market as well as the domestic market. Lastly, given the growing interest in domestic open source software, the number of third-party service providers is likely to continue to increase in the future. Therefore, it is expected that the companies which belong to the third party service provider model will be able to develop various business models by securing the technology.

New Distributed SDN Framework for Mitigating DDoS Attacks (DDoS 공격 완화를 위한 새로운 분산 SDN 프레임워크)

  • Alshehhi, Ahmed;Yeun, Chan Yeob;Damiani, Ernesto
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1913-1920
    • /
    • 2017
  • Software Defined Networking creates totally new concept of networking and its applications which is based on separating the application and control layer from the networking infrastructure as a result it yields new opportunities in improving the network security and making it more automated in robust way, one of these applications is Denial of Service attack mitigation but due to the dynamic nature of Denial of Service attack it would require dynamic response which can mitigate the attack with the minimum false positive. In this paper we will propose a new mitigation Framework for DDoS attacks using Software Defined Networking technology to protect online services e.g. websites, DNS and email services against DoS and DDoS attacks.

A Study of Customer's Activities for Continuous Improvement of Railway Customer Satisfaction Service (철도 고객만족서비스 향상을 위한 이용자 행동에 관한 연구)

  • Kim, Seong-Nam
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.8-13
    • /
    • 2003
  • For continuous improvement of the railway customer satisfaction service, more objective evaluation and development system for software and hardware shall be built. The entire activity of railway customer is the interface between the customer and software/hardware services. Customer's activity was investigated by participating observation and objective observation, and considering the connection of all the activities, it was divided into 9 categories and 43 items. Although the detailed activity of customer would vary per item, they show more than 430 different activities under general condition. Also, the customer's activity varies according to the numerous variants such as physical, mental, environmental and cultural features. Especially, as lots of changes, diversification and high-quality of railway industry are expected according to the middle and long term plan on railway industry development, it is necessary for experts in various fields to perform cooperative research aggressively to improve the customer satisfaction service continuously based on continuous customer activity research.

  • PDF