Thursday, December 20, 2007

Get Together (Thu. Dec 20, 2007)

Well, I guess everyone was very busy today since nobody showed up. In case you would like to try another date, let me know... Best.
jhm

Monday, December 17, 2007

Data Mining as a form of convergence

Data mining for unknown knowledge and new technologies is most promising reseach area.
Especially, it will be the key technology to open convergence era which is composed of several fundamental disciplines for the future common goal. Most of global issues can be solved not by single discipline but by convergence or fusion technologies.
Due to the flood of all kinds of information, data mining is prerequisite for gathering, processing, extracting and creating new and high level knowledge. Its application will do good in most of the future R&D.
Areas such as biology, genetics, and new material cannot be explored without data mining.
Even in distant autonomous recognizer of events (DARE) as a data mining and discovery tool says the same story as follows (Gor.Victoria, JPL).
Labor-intense and mathematically onerous computations are often necessary to analyze data and search for interesting events. One of such interesting phenomenon is the presence of a previously undiscovered celestial body in image data sets. Such a body is expected to be very small and hidden among the multitude of cosmic ray noise hits in large image databases. Discovering such bodies requires intensive mathematical computations on millions of cases of possible objects. We describe the automatic process DARE, which is capable of discovering new celestial bodies. This process has already been applied by scientists. DARE rapidly sifts through image sequences, looking for the temporal persistence of small segmented regions, tremendously speeding up examination of image data sets in search for new discoveries.

Sunday, December 16, 2007

Where do IT vendors think business’s focus should be?

IT vendors should think what they can to reduce company’s costs. The costs can be discussed in two ways – system investment & maintenance costs, and improving business practices.

Since transactions grows very fast, needs for bigger and less-power-consuming system grows together, causing power & space issues. Vendors should device a system should occupy less space and power-consumption.

But more critically, the system should contribute in reducing costs by business practice innovation. For example, supporting good telecommunication, it reduces costs for traveling and meeting. Virtualization is a new trend for cyber business where companies meet, communicate and even sells their products. For this, they need good graphic processing capabilities, easy software for building 3D, etc. This sure gives IT vendors new business opportunities, I think.

Security matters

This article shows how an individual's good-intended social activities on cyber network can harm a company’s security seriously. As the author insists, even the strongest firewall would be useless if a hacker can find an employee’s id and password. And most internet-users are willingly giving plentiful of hints about password for the underlying hackers.

In Korea - which is one of the most web-linked countries in the world – it’s easy to search personnel information through a lot of social networking sites such as cyworld, naver/yahoo/daum blog, etc. Also sometimes, you can just google someone’s preferred internet nickname to get lots of identity information.

In spite of this serious situation, I’d like to argue that personnel activities itself on cyber network cannot be prohibited by any organizational force. It is up to whom uses internet for their identity whether it is stolen or not. But, from the view point of management, company should focus on breaking the link between the personnel information and the accessibility to the company information system.

Most easy and passive approach that company can take is to educate employees to use password most unrelated from their identity as often as possible. Second, more active approach is to develop a sophisticated algorithm which prevents employees from creating easy-trackable password. This system uses a database which contains full identity information, and produces a list in which every possible combination for the password candidate is written. So if someone creates a password based on his/her identity, the system will check if it belongs to the list and alarm the user to change password.

Data mining

" Data mining is the process of discovering meaningful new
correlations, patterns and trends by sifting through large
amounts of data stored in repositories, using pattern
recognition technologies as well as statistical and
mathematical techniques. " (Gartner Group)

" Data mining is a knowledge discovery process of extracting
previously unknown, actionable information from very large
databases. " (Aaron Zornes, The META Group)

There are many different definitions of data mining, but almost
all involve finding or discovering useful relationships in large
databases.

What is the technique and how to find information about a specific
meaning, it is not only the technology itself, the business problem
to solve these problems in order to understand and apply
information technology to a comprehensive process of means.
In other words, the methodology for the extraction of useful
information that can be made. Therefore, in order to perform
efficient data mining and statistical techniques, such as time series
analysis, and database technology as well as industrial engineering,
neural network and artificial intelligence, expert systems, fuzzy logic,
pattern recognition, machine learning, and reasonging with incertainty,
ranging from a variety of information technology and information
retrieval techniques are used. In addition, management strategy,
marketing techniques, such as the use of the latest management
techniques need to do.

These data mining giant through a strategy of hiding information
in a database and you can find this information is the key business
process improvements can be used in the most primitive stages.

Data mining is commonly known as Knowledge Discoverty in Database,
Knowledge Extraction, Information Havesting, Data Archeology, and
Data Pattern Processing.

Data Mining to say a word, huge amounts of data easily hidden in the
process, he could find useful information. For example, "The window
is a home to many, many thieves," said a word may sound obvious,
but everyone's insurance rates to be applied to these facts is not to be
able to think about it. A British insurance company is actually using
these facts by applying discriminatory insurance rates, the
establishment of more effective policies and the companies which
causes a large increase in profit contribution was to find the relationship
between changmungwa thieves, and this is Data Mining. The company
holds the Daily transaction data, customer data, product data, or the
reaction of customers and marketing activities in addition to other data,
such as external data sources to include all the data available based on
the hidden knowledge. Not expected or new trends and the actual
business decision-making rules were found by useful information,
and it is right to take advantage of the Data Mining.

System Integration

In the past, when building information systems users are planning to design
and build the system itself, individual hardware and software to one trillion
months, it is common to order. Recently, however, a wealth of information
devices and, in addition, the information required and the system is huge
and complicated for users to choose any equipment, and software, which
needs to be quantitatively how often unknown.

In other words, systems integration, SI come directly from the need for such
a service, that service to the system's design, in order for optimal selection
and procurement of hardware, development of software applications tailored
to the needs of users, including system maintenance. Such systems integrators
and service providers to provide a (system Integrator). SI carriers are mainly
computer manufacturers, and information processing services company,
the software development company, the value-added network providers,
consultants and corporate market.

Above all, the user's system integration business is to accurately identify the
needs of securing superior talent, and technology to a variety of factors have
secured the cooperation of companies dependent on the success and failure.

Do you know ITIL? ^^;

the concept of ITIL v3 explained very well in wikipedia.

The Information Technology Infrastructure Library (ITIL) is a customisable framework of best practices designed to promote quality computing services in the information technology (IT) sector. As an IT Service Management (ITSM) framework, ITIL provides a systematic approach to the provisioning and management of IT services, from inception through design, implementation, operation and continual improvement.
The processes identified and described within ITIL are supplier and platform independent and apply to all aspects of IT infrastructure. Since the mid 1990s, ITIL has been generally considered a de facto international
standard for IT Service Management.[1]
The names ITIL and IT Infrastructure Library are Registered Trade Marks of the Office of Government Commerce (OGC), which is an Office of the United Kingdom's Treasury. The content of the books is protected by Crown Copyright.
As part of the overall OGC suite of publications, ITIL does not provide guidance or best practices on project or program management. It does, however, recognize that they are key to a successful ITIL implementation.
ITIL has recently undergone a refresh, and this page presents information about the newly published version 3 (ITIL v3), the core books for which were published on 30 June 2007. The major difference between v3 and its predecessor
v2, is that v3 has adopted an integrated service lifecycle approach to IT Service Management, as opposed to organising itself around the concepts of IT Service Delivery and Support.


ITIL v3 core volumes

Service Strategy focuses on the identification of market opportunities for which services could be developed in order to meet a requirement on the part of internal or external customers. The output is a strategy for the design, implementation, maintenance and continual improvement of the service as an organizational capability and a strategic asset. Key areas of this volume are Service Portfolio Management and Financial Management.
Service Design focuses on the activities that take place in order to develop the strategy into a design document which addresses all aspects of the proposed service, as well as the processes intended to support it. Key areas of this volume are Availability Management, Capacity Management, Continuity Management and Security Management.
Service Transition focuses on the implementation of the output of the service design activities and the creation of a production service or modification of an existing service. There is an area of overlap between Service Transition and Service Operation. Key areas of this volume are Change Management, Release Management, Configuration Management and Service Knowledge Management.
Service Operation focuses on the activities required to operate the services and maintain their functionality as defined in the Service Level Agreements with the customers. Key areas of this volume are Incident Management, Problem Management and Request Fulfillment.
Continual Service Improvement focuses on the ability to deliver
continual improvement to the quality of the services that the IT organization delivers to the business. Key areas of this volume are Service Reporting, Service Measurement and Service Level Management.
ITIL v3 uses the word "continual" as opposed to ITIL v2's references to "continuous" service improvement (CSIP). Continual implies an activity that is undertaken on a phased, regular basis as part of a process. Continuous is more suitable for the definition of activities intended to operate without pause, such as the ultimate goal of
availability.

Saturday, December 15, 2007

Microsoft Surface Computing

I saw moving picture at class relating to MS surface computing.
wow! interesting. I think that technique perhaps utilize a kind of wireless communication technique -bluetooth-. The needs of Consumer consist of 3 category-
functional, experiential, symbolic needs. I think the product or service to apply this technique will satisfy functional & experiential needs simultaneously.

Photonic textiles that turn fabric into intelligent displays

September 2, 2005

Philips demonstrates photonic textiles that turn fabric into intelligent displays

Berlin, Germany -- At the Internationale Funkausstellung (IFA) 2005, Philips is demonstrating photonic textiles—fabrics that contain lighting systems and can therefore serve as displays. With the development of this new and unusual technology, Philips Research is pointing the way toward a new age in the long history of textiles. At first glance, objects such as clothing, towels, upholstery, and drapes would seem unlikely places on which to place intelligent and interactive systems. Yet these low-tech objects figure prominently in our lives. By integrating flexible arrays of multicolored light-emitting diodes (LEDs) into fabrics—and doing so without compromising the softness of the cloth—Philips Research is bringing these inert objects to life.To meet the challenge of creating light-emitting cloth objects that retain their softness, Philips Research and textile institute TITV Greiz have developed an interconnecting substrate made entirely of cloth. Researchers from Philips have also created flexible and drapable substrates from plastics and films.On these substrates, the researchers have placed passive matrices of compact RGB LED packages. The pixelated luminaires with relatively large distance between the RGB pixels have been embedded in such everyday objects as cushions, backpacks, and floor mats. Since the fabric material covering the miniature light sources naturally diffuses light, each pixel seems bigger than it actually is. The LEDs, therefore, remain small and unobtrusive, while the fabric retains its soft look and feel.Photonic textiles can also be made interactive. Philips has achieved interactivity by incorporating sensors (such as orientation and pressure sensors) and communication devices (such as Bluetooth, GSM) into the fabric.The results of these innovations are as various and promising as they are novel. Photonic textiles open up a wide range of applications in the fields of ambient lighting, communication, and personal health care. Photonic textiles are still a young business. Even at this early stage, however, Philips envisions partnerships with interior and apparel brands that see the potential of photonic textiles to revolutionize the very concept of fabric. The demonstration at IFA is also meant to show the opportunities offered by this technology and to gain customers’ and visitors’ feedback on these options. An interconnecting, flexible substrate with a matrix of red, green and blue LEDs is the fundamental building block of application prototypes of photonic textiles. Applied in soft fabric, the light from the small pixels diffuses, resulting in more or less continuous light-emitting soft surface.

More information:+ Video on Photonic Textiles

Download high-resolution pictures: + Pictures on Photonic Textiles

For more information, please go to: + www.lumalive.com

Thin film-like display which bends

Mr.Morin introduced many links to us in last class. One of them is the following article and the related video.The thin film-like display which Sony developed bends even while showing full-color video.Sony said plans for a commercial product using the technology were still undecided. I think it is worthwhile to commercialize it because it is very light,unbreakable and portable.
innovator like Sony is giving us unlimited dream and chance.How about paying attention to this display?

===========================================
Thursday, May 24, 2007Sony develops film-thin display that bends in full colorBy Associated PressTOKYO (AP) -- In the race for ever thinner displays for TVs, cell phones and other gadgets, Sony may have developed one to beat them all -- a razor-thin display that bends like paper while showing full-color video.
Sony Corp. posted video of the new 2.5 inch display on its Web page Friday. In the video, a hand squeezes the 0.3 millimeter (0.01 inch)-thick display, which shows color video of a bicyclist stuntman, a picturesque lake and other images.
Sony will present the research and video at an academic symposium in Long Beach, California, for the Society for Information Display this week, the Japanese electronics and entertainment company said in a release.
The display combines Sony's organic thin film transistor, or TFT, technology, which is required to make flexible displays, with another kind of technology called organic electroluminescent display, it said.
The latter technology is not as widespread for gadgets as the two main display technologies now on the market -- liquid crystal displays and plasma display panels.Although flat-panel TVs are getting slimmer, a display that's so thin it bends in a human hand marks a breakthrough.
Sony said plans for a commercial product using the technology were still undecided.''In the future, it could get wrapped around a lamppost or a person's wrist, even worn as clothing,'' said Sony spokesman Chisato Kitsukawa. ''Perhaps it can be put up like wallpaper.''Tatsuo Mori, professor at Nagoya University's Department of Electrical Engineering and Computer Science, said some hurdles remained, including making the display bigger, ensuring durability and cutting costs.
But the display's pliancy is extremely difficult to imitate with LCD and plasma screens, he said.''To come up with a flexible screen at that image quality is groundbreaking,'' Mori said in a telephone interview. ''You can drop it, and it won't break because it's as thin as paper.''Other companies, including LG. Philips LCD Co. and Seiko Epson Corp. are also working on a different kind of ''electronic paper'' technology, but Sony said its technology using the organic electroluminescent display delivers better color images and is more suited for video.Sony President Ryoji Chubachi has said a film-like display is a major technology his company is working on to boost its status as a technological powerhouse.
In a meeting with reporters more than a year ago, he boasted Sony was working on a technology for displays so thin it could be rolled up like paper, and that the world would stand up and take notice.Some analysts have said Sony, which makes Walkman portable players and PlayStation 3 video game machines, had fallen behind rivals in flat-panel technology, including Samsung Electronics Co. of South Korea and Sharp Corp. of Japan.
But Sony has been marking a turnaround under Chubachi and Chief Executive Howard Stringer, the first foreigner to head Sony, including reducing jobs, shuttering unprofitable businesses and strengthening its flat TV offerings.

On the Net:
Video of Sony's new display:

mms://station.streaming-tv.net/sonypr/OLED070524_750kbps.wmv

Friday, December 14, 2007

Domestic DRM solution corporate list

I think DRM is core of ubiquotous contents business.
So, I search for some of relating domestic corporate. i wish be a good reference.


fasoo.com(www.fasoo.com)- stated by professor
Markany(www.markany.co.kr) - stated by professor and a classmate(inwon)
Softcamp (www.softcamp.co.kr)
Hanmaro (www.hanmaro.com)
Teruten (www.teruten.com)
Digicap (www.digicaps.com)
Metarights (www.metarights.com)
M3technology (www.m3tech.co.kr)

Fairly realistic flying car offered for 2009 delivery

One of our favourite notions here at Vulture Central is that of the flying car. Ideally this would be a true sci-fi-style job, backed up by an equally puissant automated air-traffic infrastructure. In such a machine you could simply jump into your car outside your house, quietly lift off vertically, fly somewhere even in bad visibility and congested airspace, and set down again equally vertically. Then you could drive/taxi your astounding hover vehicle into the garage, underground carpark or wherever - or simply park it on the street.Sadly, the nearest approach offered by current technology is the helicopter. Whirlybirds are noisy, dangerous, expensive and difficult to fly. They take up a hell of a lot of room, too, in the contexts both of airspace and manoeuvres near/on the ground. They aren't going to turn into flying cars any time soon.'But honey, your mom doesn't have a runway'- it won't wash any more. Credit: Benjamin SchweighartJump-jets like the Harrier are even worse, in that they can't at present get airborne vertically with a useful load. Ducted fans sometimes seem to offer hope, but the idea has been around for a long time without much in the way of credible kit appearing. The large thrust-disc diameter which a rotorcraft can offer - which is what makes helicopters and tiltrotors a going proposition - doesn't seem feasible for ducted fans, and in any case leads to an undesirably large ground footprint.Even once you've dealt with all that, there are still the inevitable safety and certification issues that would come with a many-orders-of-magnitude increase in numbers of aircraft over densely-populated areas.So we probably aren't getting a real flying car any time soon. Current technology could, however, offer something a bit more exciting than the ordinary light aircraft which have been flying almost unchanged since the 1950s. In fact, various inventors and engineers have been working on so-called "roadable" aeroplanes for a long time.The idea here is that you still have your trusty flying vehicle parked in your driveway or garage, taking up no more room than a regular motor. You stroll out, fire it up and drive it away to a nearby airstrip. Here you extend/attach the wings, prop etc., and it's up, up and away. When you get to your destination strip, you land, convert back to roadgoing configuration, and trundle along to where you're going.Under NASA's Personal Air Vehicle (PAV) concept, this relatively realistic idea gets some hard-to-achieve bells and whistles added on. A proper NASA PAV is also very quiet and can take off from very short runways, which could permit handy little airstrip-laybys to be scattered all over the place: at shopping-mall carparks, suburban housing estates, major road junctions etc. Better still, the PAV's amazing "synthetic vision" autopilot would be able to interface with a super-duper airtraffic network of the future so as to handle the plane nigh-on autonomously. This would mean that learning to fly a PAV would be no more demanding than getting a regular driver's licence. The PAV could laugh at bad weather and controlled airspace too.These tough tech hurdles have meant that the NASA PAV doesn't exist, and probably won't in the foreseeable future. But that doesn't necessarily mean that more basic roadable aeroplanes can't be built.One such notion is the Terrafugia Transition®, reported on today by the MIT Tech Review. Terrafugia Inc is a startup founded by a group of MIT engineers and flying enthusiasts in 2006. It completed an initial funding round in December.The Transition isn't a PAV; it's a normal light aircraft which can fold its wings at the touch of a button and become a car, and which runs on unleaded. That's pretty much it. The only extra touch is that a Transition® is intended to qualify as an FAA "Light-Sport Aircraft", which means a somewhat less onerous regulatory regime. A "Sport pilot" licence is easier and cheaper to get than an ordinary private pilot's licence, requiring only 20 hours logged; and there are breaks on maintenance, medical checks etc. An existing pilot's licence is also fine.The Transition® in bad-weather mode. Credit: Benjamin Schweighart.The Terrafugia people reckon that the advent of the Light-Sport category, combined with recent advances in materials and aero engines, mean that an airworthy and road-legal plane can now be built affordably. They say the market for it is there, with 600,000 licenced pilots who could already fly the Transition® in the States."The Transition® is for pilots," says the company."It is not intended for use by short-distance commuters, by people running errands, or for any trip through city traffic or under 100 miles. Instead... if you travel between 100 and 500 miles at a stretch, particularly if your trip is either starting or ending in a more suburban or rural area, then the Transition® is for you. If you don't already have a pilot's license, you will need to get one... The Transition® is for pilots, businesspeople [and] weekend travelers..."Most of the target market pilots don't have instrument qualifications allowing them to operate in bad weather. This means that they often fly somewhere, then get trapped on the ground by poor conditions. They also find the hassle of getting to and from airstrips a problem, according to Terrafugia; not to mention the faff attendant on aviation fuelling, tiedown places and so forth.None of that applies to the Transition. You drive it to the airport from home, filling up at an ordinary petrol station. You fly wherever you're going. Once there, you aren't bothered about a place to tie down, or about a ride onward to the ultimate destination. You simply fold wings and drive away. If the weather closes in before your return flight, no hassle about hire cars or getting the plane back home again - just drive back home on the ground. It'll take a bit longer, but you'll get there. Likewise, if your flight runs into bad weather and you can't carry on, divert to an open airfield and drive from there.All in all, this sounds a lot more realistic than a ducted-fan flying saucer from the endlessly written-up Dr Paul Moller (who was busted by the SEC in 2003 for flogging fraudulent "Skycar" stock on the internet and other financial misdeeds). It also sounds a lot more feasible than a silent, super-efficient short-takeoff NASA PAV with accompanying automatic air-traffic miracles.Terrafugia reckons there are two main tech hurdles to jump before the Transition is ready to fly and drive. The first of these is the one-touch folding wings, which the company believes it has cracked. A demonstration wing has been built and tested successfully.The remaining trick is not the engine - the Terrafugia mob reckon an existing Rotax job can do everything they need - but the transmission, which must be able to switch easily between driving the propeller and the wheels. It also has to be light, in order to keep the Transition within the FAA limit of 1320 pounds for a light-sport aircraft.Anna Mracek Dietrich, Terrafugia engineer and COO, spoke to Tech Review."Going into this, we knew our two biggest design challenges to make it practical would be the wings and the power train," she said."By validating the durability of the wing's construction and engineering, we've checked one major design challenge off of the list, and now our focus is on the second."One might also suspect that there will also be major challenges in getting the Transition certified as road-legal. This is traditionally a big stumbling block for flying-car inventors, who are often FAA-savvy but less well acquainted with the National Highway and Traffic Safety Administration (NHTSA)."We've made inroads with both [regulators], especially the FAA," says Dietrich.The company expects to begin flight testing next year, and deliveries from "late 2009". The business plan calls for production of between 50 and 200 Transitions annually, selling for $148,000 a pop. Terrafugia says that all its anticipated production through Q2 of 2010 has been reserved already (the refundable reservation deposit is $7,400, held in escrow) though it won't say exactly how many that is. However, the investor sheet (pdf) quotes customer number 29, so presumably at least that many orders have been placed.For your $148k you get two seats, cruising speed of 115mph in the air (or normal motorway performance on the ground), 25 miles per gallon flying on super unleaded, and 460 miles flight range.One of the weaker stats on the spec sheet (pdf) is the useful load - just 550lb. Up to 120lb of that will be taken up by fuel, so the Transition won't get airborne freshly topped up with two heavyish people. It certainly won't carry much baggage, unless flown solo or with very little fuel.Budding secret agents or master criminals should also note that you can't just pop the wings out during a high-speed chase and take off: the button will only work with the vehicle stationary. There's no air-con, either.Despite these limitations, the Transition looks very wantable indeed to your correspondent*. Regrettably, the Vulture Central scriven-remuneration package doesn't permit the purchase of £74-grandonveyances

http://www.theregister.co.uk/2007/10/10/transition_flying_car_quite_realistic/page3.html

Flying cars are here. Wondeful! http://www.youtube.com/watch?v=2bdd4Jt_rBE

Amazing magic applications of iPhone

Wow~! Georgeous! Apple's iPhone provides amazing magic applications. I want to have that one.
How about going and experiencing fantastic features?

http://www.youtube.com/watch?v=lcB8CKa73B0

Deliver the best Mobile WiMAX solution to the world

POSDATA supplies Mobile WiMAX Terminal to KT. POSDATA FLYVO(CEO Yoo Byung-chang), which is developing and supplying system equipment such as base stations and ASN-gateways based on core Mobile WiMAX technologies, concluded a contract to supply USB-type Mobile WiMAX terminal (model KWP-U1600) that is connected to a notebook computer to enable access to Mobile WiMAX.POSDATA FLYVO completed a terminal certification test with Korea Telecom last month and is ready to supply the USB-type terminal to KT. KWP-U1600 is a USB-type modem that has a sleek exterior with an internal antenna. A 45-degree hinge allows for free movement of the terminal for better signal reception when it is weak. Two LED indicators have been applied to the exterior, enabling the user to frequently check the unit’s operation status.POSDATA FLYVO reached an agreement with KT during the second half of this year on mutual cooperation on the Mobile WiMAX terminal business. Both companies are jointly carrying out marketing activities, such as Mobile WiMAX terminal planning and shared distribution networks.In addition to the USB dongle, POSDATA FLYVO is developing various types of terminals, including a specialized terminal for games and a gateway modem. The company is planning to expand sales in the domestic market as well as overseas markets, where the company is now moving forward with exporting system equipment. Also, the company is building and improving relations with various content providers to be supplied with portal, game, video, music, and educational content, to boost usage of the terminals.

http://www.flyvo.com/WiMAX/about/news_view.jsp?searchKey=title&searchWord=&onPage=1&press_seq=112

Cracker...?

Intruder (intruder), or also known as the attacker (invader), and the software
to distribute illegal copies of the people who used to refer to prayer.
Others maliciously or unintentionally illegally invaded by computer data or
computer programs such as a spy or alter crime to commit acts of criminal
intelligence indicates.

The dissemination and use of the computer network expands, and emerged
as a social issue. In Korea, these crimes against computer hackers and crackers
are sometimes confused. Specifically, hackers, computer criminals is a much
more meaningful if used as a criminal hackers and hacker separated build LLC.

Hackers are sharing information, however, argues that the computer expert
as a sophisticated computer program to the development of positive aspects,
while contributing to the malicious cracker of a crime by means of hacking
techniques to take advantage of that difference. Because of this, hackers,
crackers, who distinguishes himself with the 'dangerous hackers' meaning
that after the English characters ' decker ' also called.

Crackers will also try to pursue profits, but the evil was the reason or purpose,
especially in the security system as a challenge to jahaeng a tort cases.

These are power plants, airports and runways of the operation of information
systems for intrusion stopped, military satellites to penetrate them. The food
company's manufacturing process by changing the modulation of the poisons
in the food gardens, the development of competitive companies to penetrate
the secret information belonging to sell stole them. The Internet home banking
related materials obtained by secretly created a fictitious bank account, and
put money in other funds example.

Hacking, cracking, and this is a distinction between the original software now
used almost the same terms being used.

Thursday, December 13, 2007

Cyberterror

A product of the information age, using computers been a military database,
administration, human resources and information leading to the destruction
of that country. The 21st century terrorism is increasingly concentrated in
the destruction of these computers is expected to war, military facilities for
the future, rather than a direct blow military communications, and financial
aspects of destroying about cyber terrorism, it is highly likely spot.

The kind of e-mail bombs, and cyber-terrorism and the logic bomb. E-mail
bomb to the goal of a computer that e-mails sent by mail, I received the
computer capability to prevent. A logic bomb is a kind of computer virus,
the capabilities of computer systems intrusions paralysis.

New national security, emerging threats around the world to respond to
cyber-terrorism response plans in the freight. In the United States, since
1995, the Ministry of Defense and related agencies around cyber hacking
team to configure and 2002, a 32 billion dollar budget for the assignment,
including in the national level and preparing for cyber-terrorism, computer
hacking in 1999 by the end of the response to configure plans to operate.

Computer crime

Computer informatization of society or simply say there is some degree, the computer
business activities, as well as civic life and play an important role in many areas, and
the future Increasingly, this trend is expected to grow. Cache card crime in the United
States (CD crime) is increasing every year, and the unique computer antisocial acts,
but also slowly growing trend. Computer data about the antisocial acts, even the negative manipulation (negative input distribution, etc.), data obtained by the negative (or secret information to the media to steal activity, etc.), unauthorized use of a computer, computer (hardware software), including the destruction of several form, which is also expected to
be infringing on the new future.

But computer crimes are not listed for a definitive definition year. Computer and information communication lines to connect communications system is usually associated with 'criminal network' as a calling. In addition, electronic calculators, such as theft, the computer can not
exist unless there is no criminal or fraudulent advertising on the electronic bulletin board through the computer, such as selling CDs amount to a crime, even though the variations
are possible, a crime that can not be called until the cheating, included in the scope of
computer crime, such as whether the opinions are divided about yet.

However, the CD mentioned earlier crimes, including acts on them, property damage and
the work of law enforcement, including munseowijojoe enough to deal with it. You can not sufficiently cover parts of the law, however, is facing homicide is too if you think you can
not deny that. That is why the United States and Britain led, on the antisocial behavior of certain computer acts yuhyeongjeok only for special legislation to punish this assumption,
South Korea is also pushing for legislation.

However, computer crime is also flexible about the same time, the possibility of applying
the law and other measures available to it prior review requirements, so the state should
be careful opinion.

Security technology

Generalizations of the computer with various computer crime also increased rapidly,
even in one period, the nation's information networks on the enormous harm coated
In some cases, these security technologies to prevent computer crimes for the purpose
of pre-developed technology or security system (security) Street. In particular, the development of the Internet, along with concerns about security for the safe use of
the Internet increased, and the increasing importance of technology in increasing security.

Computer crime is a negative data manipulation and cheating ups, and the destruction
of unauthorized use of computer, such as banking network hacking vary, and the resulting damage is also serious. Because of this, the IETF (Internet Engineering Task Force), the International Organization for Standardization (ISO) and other international organizations
also are pushing for standardization of information and communication network security. However, Internet security technology to speed the development of technology to speed
the standardization of the issue of intellectual promoting standardization so much now.

Therefore, countries in the development of security technologies, as well as measures for establishing it, which is a security technology companies worldwide trend of product
solutions for the various security features to further enclose the form of integrated security solutions. For example, integrated security solutions for the enterprise, the firewall and
private network (VPN) through the egress of data security surveillance. Personal
computers based on the development of integrated solutions in vaccine technology
companies according to the authoritative source of personal firewall, encryption programs, content filtering, and data recovery programs combined to take the form of cases.

Along with the data processing speed of the latest security breach unable to effectively
deal with the drawbacks of existing products to complement the Gigabit firewall, intrusion detection systems have been upgraded, and the development of a vaccine shortage, and released.

Specialist for Information Security

Korea Information Security Agency (KISA) and the Korean Information and
Communication University Bridge (ICU), conducted jointly by the National
Certification shooting.

The security of information communications networks and information systems
in the various invasions of information leaks and damage, destruction of the system,
viruses and other security threats from a system to protect the information and communications technology activities. Protection of information protection and
information security professionals in related fields of knowledge and information
that needs protection is an important task to perform in a variety of fields.

E-government, Internet banking, e-commerce and Internet-based information
society is firmly in the heart of individuals, businesses and government information
for the protection of the work performed. Security policies and the establishment of
technical support and security, hacking or cracking, viruses, and any personal
information stored in government and corporate forgery and unauthorized distribution
and fix things such as cyber terrorism prevention. In addition, important information
about the transaction and quality assurance roles to them.

Knowledge of the future information society as a promising careers information protection specialist businesses, and security systems development firms, e-commerce security
specialist consulting firms, companies or government agencies, research institutes, and
Internet shopping mall.

Executive Information System

EIS is the organization's executive management and to perform management functions necessary to achieve the purpose of accurate and important information so that you can
quickly look up information systems that support. The computer is able to do well in
computer executive is not interested in my organization at the same time. External
information needed to effectively use the organization's information filtration Therefore,
the manipulation of information requirements are housed executives want practical tool
called think. EIS is the latest information about an organization's internal operations, the financial information, news or outside of the news, a variety of features, such as e-mail to executives. By providing information on the performance of each department and each
of the parts of the organization to facilitate control can be made. EIS provides information
that the company is focused on the most critical information to be compressed so that the information can only be viewed easily glance.

While entering into full-fledged information society knowledge, the company's competitive business environment has changed, and the deepening of the faster speeds are increasing uncertainties. Accordingly, rapid and accurate decision-making that affects the survival of businesses growing, large companies or small and medium-sized enterprises with good
quality information, whether executive information systems that provide more keenly.
These executives to meet their information needs sufficient existing transaction processing systems, management information systems, decision support systems have several limitations in terms of revealing. Mintzberg [1973] is the type of strategic information with the corporate executives kept mostly remembered because of the strategic thinking in the present work load information to navigate the eight employees would hate it. Because of their social status is an important strategic information will be forwarded directly. These executives attribute the information to consider when executives gather information about their direct control and information systems need to have a language that has been the emergence of the EIS.

[Lee Hyoung Gun] Ubiquitous..?

Ubiquitous means, anytime, anywhere that there is short for the Latin as ubiquitous
computing. What he means is that whenever and wherever they use online services
on the network where the receiving environment / space means.

Ubiquitous's proposition : all things in the chip kicks. We see all the things that bring
the chip. Books, beds, chairs, boilers, vehicles, refrigerators, lights, all things design
of the greens are ubiquitous in all things that have chips. He called RFID chips, and
a thinner, less than the size of a low-power chip is created. Both computer chip and
the things that bring us live in a computer.

Ubiquitous means : the ubiquitous information communication from the perspective
of all social sectors to create a new paradigm. It all needs to be ubiquitous, from the
perspective of the new interpretation. Those areas are areas that are not specific to
the existing society, which consists of all sectors. And all of the computer when the
computer is applied in the field, when you think will be similar.

The current ubiquitous : South Korea introduced in 2002 to four border crossing
through the introduction of electronic newspapers. But the 89-year mark and the
first time that the announcement by the paper. 84 in Japan's Osaka Dr. gen-mura
has already created the concept in Japan, the first person they called story.
IBM Pervasive computing is to create a similar concept, he said.
Furthermore, he is now just an academic system and all possible IT, BT, NT industry,
the ultimate goal being reported they paid to the 16th. This year, on April 16, 2007,
the country's first seminar was ubiquitous Forum founding. However, interest in
the material conditions and the poor level.

How to proceed? : 1-2 months after the commercialization of smart cards, complete
Centrino wireless mobile phones and the Internet as a stunning ubiquitous in the
initial implementation. Internet anytime, anywhere, it can be made to the initial state
of the ubiquitous means by 2007 ubiquitous digital home environment is implemented
in 1000 only created in 2010, before the country is to hold a distinctive place.

[Lee Hyoung Gun] The definition of MIS

Typically, the MIS (Management Information Systems), the definition is as follows.
"MIS is a business enterprise to achieve this purpose, management, and strategic
decision-making businesses around the information reasonably necessary to
efficiently provide organizational system." Speaking of the decision-making data
easier to collect the information needed to calculate all the information collection,
management can be defined as a system. In other words, the management
companies are required to provide information to collect data that can be handled
by an organization that stands for aggregation. Meanwhile, the management
decision-making systems that are used to perform the main chain management
manager, materials, and information for decision-making management, management information to calculate how, procedures, and models such as the three elements
that are important in defining the role of MIS. The three elements are used as a means
to narrow the definition like as the MIS management information systems administrator
can dor the efficient and effective management decisions and necessary information,
so that you can calculate a set of methods and procedures can be called.

[Lee Hyoung Gun] The importance of information

Recent information is a critical resource as a value initiatives. Details of the value of these resources, as a member of our society, individuals, corporations, public institutions, society
as a whole dimension in the analysis of it.
1) Personal dimension Human behavior, which is basically a good time quickly and accurately and effectively fulfill desires you want to take. However, individuals have the knowledge and skills to the limit, and also exposing the uncertainties of the future. As a result of rapid changes in the external environment and adapt themselves to promoting the development of fast and accurate information is essential. The development of several recent communication to prove them.
2) enterprise-wide The organization is also facing a changing business environment requires continuous change. Diversifying the consumer's desire to meet the date and future demand
for a third-party to identify with the endless competition in order to survive the situation is unclear for the market is important to take advantage of information emerges. For example, personalized marketing (mass customization), which companies are increasingly seeking.
3) community-wide dimension Today, we live in a society of social activities as an information resource for the creation, management, distribution, dependence on the state that gradually deepens as the information is considered an important resource, and the effective management of these information resources to benefit all members of society through you should be able to return.

Violin Playing Robot

Toyota shows off a violin playing robot and a two-wheeled human transporter -- the latest products of its robots program that seeks to develop a practical human assistance robot by the early part of the 2010s.

http://www.pcworld.com/video/id,651-page,1-bid,0/video.html

Surface Computing

When we saw the video of surface computing at first,all the same reaction was "Wow~!". After the last class was over,the very surface computing was the focus of conversation.Who in the world has thought of that gorgeous technology? I don't know the limit of innovation.Here is an introduction to the surface computing.


Microsoft
Surface Fact Sheet
May 2007

Name of Product: Microsoft Surface™
Category: Surface computing

ProductOverview: Surface is the first commercially available surface computer from Microsoft Corp. It turns an ordinary tabletop into a vibrant, interactive surface. The product provides effortless interaction with digital content through natural gestures, touch and physical objects. In essence, it’s a surface that comes to life for exploring, learning, sharing, creating, buying and much more. Soon to be available in restaurants, hotels, retail establishments and public entertainment venues, this experience will transform the way people shop, dine, entertain and live.

Description: Surface is a 30-inch display in a table-like form factor that’s easy for individuals or small groups to interact with in a way that feels familiar, just like in the real world. Surface can simultaneously recognize dozens and dozens of movements such as touch, gestures and actual unique objects that have identification tags similar to bar codes. Surface will ship to partners with a portfolio of basic applications, including photos, music, virtual concierge and games, that can be customized to provide their customers with unique experiences.

Surface Computing: Surface computing breaks down traditional barriers between people and technology, changing the way people interact with all kinds of everyday content, from photos to maps to menus. The intuitive user interface works without a traditional mouse or keyboard, allowing people to interact with content and information by using their hands and natural movements. Users are able to access information either on their own or collaboratively with their friends and families, unlike any experience available today. Surface computing features four key attributes:· Direct interaction. Users can actually “grab” digital information with their hands and interact with content through touch and gesture, without the use of a mouse or keyboard.· Multi-touch contact. Surface computing recognizes many points of contact simultaneously, not just from one finger as with a typical touch screen, but up to dozens and dozens of items at once. · Multi-user experience. The horizontal form factor makes it easy for several people to gather around surface computers together, providing a collaborative, face-to-face computing experience.· Object recognition. Users can place physical objects on the surface to trigger different types of digital responses, including the transfer of digital content.

Features: Multi-touch display. The Surface display is capable of multi-touch interaction, recognizing dozens and dozens of touches simultaneously, including fingers, hands, gestures and objects placed on the surface. Horizontal orientation. The 30-inch display in a table-sized form factor allows users to share, explore and create experiences together, enabling a truly collaborative computing experience. Dimensions. Surface is 22 inches high, 21 inches deep and 42 inches wide. Materials. The Surface tabletop is acrylic, and its interior frame is powder-coated steel.

Requirements: Standard American 110–120V power

System: The Surface custom software platform runs on Windows Vista™ and has wired Ethernet 10/100 and wireless 802.11 b/g and Bluetooth 2.0 connectivity.

Availability: Beginning at the end of this year, consumers will be able to interact with Surface in hotels, restaurants, retail establishments and public entertainment venues.

RMS (Rights Management Services )

"Microsoft RMS" was recited when we studied in Security class and I found some in formation about RMS.

One of the touchstones of trustworthy computing is the availability of technology that can reliably protect content and help keep digital information private. RMS represents a milestone in this regard, offering a new kind of protection for vital information. Microsoft will continue to invest in this important field and work to develop simple ways to help protect sensitive information. Microsoft envisions strong business-to-business and business-to-consumer scenarios that will provide better privacy, security and confidentiality for all customers.

Here is about RMS overview
---------------------------------------------------------------

Overview
Rights Management Services includes the server technology that handles certificates and licensing, a desktop update, and the software development kit (SDK). Combining Windows Server 2003 features, developer tools, and industry security technologies—including encryption, certificates, and authentication—RMS helps organizations create reliable information protection solutions.

Safeguard sensitive information. Applications such as word processors, e-mail clients, and line-of-business applications can be RMS-enabled to help safeguard sensitive information. Information workers can choose from a variety of usage rights to define exactly how the recipient can use the information and for how long. Users can define who can open, modify, print, forward and/or take other actions with the information. Organizations can create custom usage policy templates such as "confidential - read only" that can be applied directly to the information.

Persistent protection. RMS augments existing perimeter-based security solutions, such as firewalls and access control lists (ACLs), for better information protection by locking the usage rights within the document itself, controlling how information is used even after it has been opened by intended recipients.

Flexible and customizable technology. Independent software vendors (ISVs) and developers can RMS-enable any application or enable other servers, such as content management systems or portal servers running on Windows or other platforms, to work with RMS to help safeguard sensitive information. With RMS SP1, the range of possible RMS solutions is extended to include server applications—enabling ISVs to integrate information protection into server-based solutions such as document and records management, e-mail gateways and archival systems, automated workflows, and content inspection.
Benefit Scenarios

A company manager has access to the online sales system. She pulls up sales information about last quarter's unit sales using her browser. Because the information is sensitive, specific restrictions have been applied to the report: She cannot print, copy, or paste the data. RMS helps the company protect its sensitive quarterly sales data from accidental or deliberate leaks before its official earnings announcement.

A CEO needs to send an e-mail message that contains confidential information about an upcoming reorganization to his executive staff. In Microsoft Office Outlook 2003, he selects a template to specify that recipients can only read the e-mail message, and that they cannot copy, paste, edit, or forward the information. The recipients receive the e-mail message in Outlook 2003, with the usage policies automatically applied to the message. The CEO has a new level of confidence that this sensitive information will be viewed only by his executive staff.

Wednesday, December 12, 2007

Google = Energy Company?

I'm work for Energy Company(SK energy). My company tried to develope new energy source
like bioethanol. Recently I heard Google hopes to spawn world-wide renewable energy movement. It's interesting to me. Intangible Company to tangible non-realted divesification?
Google's Bill Weihl says the company is commited to finding a cheaper way to use renewable energy resource.
I searched the news. and share with this blog.


Mountain View (CA) - Google announced a new initiative yesterday called RE C (Renewable Energy less than Coal), one designed to speed up the development pace on clean, renewable energy sources. They'd like to bring forth a 1 Gigawatt capacity clean, renewable energy generation system, one producing energy which costs less than coal, enough to power a city the size of San Francisco.
Larry Page, Google Co-Founder and president of Products, said, "I believe that solar thermal technology provides a plausible path to generating cheaper electricity. By combining talented technologists, great partners and large investments, we have an opportunity to quickly push this technology forward." Today, coal provides 40% of the world's electricity. Concerns over greenhouse gas emissions and their impact on global warming are of growing concern. Google believes clean energy sources will be good for future business, as well as mankind.TimeframePage believes the technology and implementation are possible within years, not decades. Google is looking to assemble a "world-class team," pulling in a wide array of scientists from many disciplines. They'll get together to discuss and work out problems facing these technologies today. Page believes everything can be coordinated, including the physics, chemistry, mechanical and electrical engineering, land acquisition and management, power transmission and substations, construction and, of course, regulatory issues.ProgressGoogle is already hiring engineers and energy experts for this project. These include significant efforts toward solar thermal technology and a type of enhanced geothermal system, as well as other efforts. In 2008, Google expects to invest millions on research and development related investments in renewable energy. In addition, they anticipate investing "hundreds of millions of dollars in breakthrough renewable energy projects" in the hopes of generating positive returns.Existing effortsPage indicated there are several efforts which have moved forward in these areas. He cited eSolar, Inc., a company specializing in solar thermal power. Another is Makani Power, Inc., that has been developing high-altitude wind energy extraction technologies, where the most powerful wind resources reside. According to Page, high-altitude wind energy has enough potential by itself to satisfy a significant portion of global electricity needs.Clean FutureGoogle's announcement comes with a long-term commitment toward a greener Google. This ongoing effort will include increased energy efficiency in their data centers, a 1.6 Megawatt corporate solar panel installation, which will be one of the largest in the United States, the use of RechargeIT plug-in vehicles, their ongoing Climate Savers Computing Initiative, as well as new corporate policies which encourage the development and deployment of renewable energy.More informationA replay of the company's conference call can be heard tonight at 11:30pm ET at 1-888-203-1112, or 1-719-457-0820 if calling from outside the U.S. Confirmation code for replay is 2205214. Read more on Google's press release.

Second Life - extracting human mind?

The meaning of Second life can be different to many people. Some may like to have pleasure there, some may look for the social networking for opinion leadership, some may regard it as the shelter, and some may use it as desperate tool to overcome their handicap. For some, it also give chances to commit crime.

So it would be very hard to tell whether it is good or bad.
We may just admit that it exist now and many people love to be belong to that world.
We should prepare for the effects of consequences of its penatration to our real world and mental world.

Then what will it like to be in near future?
Can we distinguish real world and virtual world as professor mentioned?
Or is it necessary to tell real world from virtual?

I still remember that what we realize is only electrical phenomena in our brain. - in Matrix, movie.

Choosing the appropriate ERP Vendor

Most korean big companies have chosen ERP system as a main system already.
There's still opportunity for the middle-size or small compamies in the ERP market.

I think the success of an ERP lies in choosing the vendor and using it. Hence the process of choosing ERP software vendors is an equally important task.


There's useful tips for choose the appropriate ERP Vendor here
========================================

ERP software vendors are innumerable in terms of service and efficiency. Choosing the right ERP vendor for the company is not an easy decision.
The company has to choose a person who fits well in all the parameters. All the criteria from service to cost have to be satisfied.
The following are the points that have to be taken into consideration.
Practical DemonstrationsThe company has to witness the proceedings directly. It is not possible for them to have an idea of his services unless they experience it. The decision making authority should even be willing to travel to the vendor's premises in order to expect the standards, norms and similar features. The company must initially choose few players from ERP vendors list.
Competitive EdgeAs told in the beginning ERP vendors are far in number. The company has to look for the extra feature of one vendor when compared with the other. This will not only help him in deciding the right person but also lead to competition among vendors and the resultant improvement in terms of the quality in products and services. Both ways will only result in the expansion of ERP vendors list.
On the basis of studyThe company usually makes a study to determine the choice of the ERP vendor. This Study is a major deciding factor though the fact remains that the results of these studies will be applicable only if they are done properly. The company must make the use of the results in choosing the ERP vendor because it will not be proper to go for the Market leader (among ERP vendors) if the studies proves otherwise or they don't meet the requirements of the company. The popularity of ERP software vendors does not necessarily speak for service in relation to the needs and business of the company. The top service provider in ERP vendor list need not necessarily be the apt person for your company.
Vendors CredibilityThe company must have a fair idea of the vendor's stake in the market. This will come in handy to know the pros and cons in choosing that particular vendor .A look at his background, previous experiences, clientele will enable them to decide if that particular vendor is suitable and apt to offer services to them. His credibility will have a say on the fortune of ERP supposedly to be implemented in the company. At the same time it is not advisable to go for the best vendor in the market as said earlier for his services might not be the apt one for the company. It is very important to analyze the vendor's credibility with respect to the area of service where the company desires to implement ERP. Such an evaluation will add value and meaning in terms of making the decision of choosing the ERP vendor.
Flexibility of the vendorIt is very important for the company to choose a vendor who will hear and implement their suggestions. It is not possible to expect them to dance to the whims and fancies of the ERP vendor. The company should heed to the words of the ERP vendor in terms of technical aspects and expertise. They have to work in coordination and draft solutions. It will help them to achieve mutual benefits. On the other hand the Vendor also must extend cooperation in terms of accepting the views of the company and clarifying issues.

Tuesday, December 11, 2007

RFID vs. RF enabled smart card

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart CardsMany applications are now using radio frequency (RF) technology to automatically identify objects or verify the identity of people. These RF-enabled applications range from tracking animals and tagging goods for inventory control to enabling secure payment and identification. While these applications all use radio waves to communicate information, the RF technology used for each has different operational parameters, frequencies, read ranges and capabilities to support security and privacy features. For example:RFID tags and labels are used to add value in manufacturing, shipping and object-related tracking. They operate over short to long ranges (e.g., from inches to 25 feet), were designed for that purpose alone and have minimal built-in support for security and privacy.RF-enabled smart cards, on the other hand, use RF technology, but, by design, operate at a short range (less than 4 inches) and support a wide variety of security features for critical applications. This technology is also referred to as “contactless smart card technology.”RF-enabled contactless smart cards comply with international standards for contact and contactless smart card (ISO/IEC 7816 and ISO/IEC 14443) and implement security features to protect payment, access and identity applications.RF-enabled applications have differing requirements in their use of RF technology, with RFID tag and RF-enabled smart card technologies providing very different capabilities. The figure below illustrates the range of security requirements of different RF-enabled applications and technologies.RF Technology Security Requirements (click for larger view)Understanding the differences between RFID and RF-enabled smart card technologies is critical in order to correctly assess each technology’s fit with a specific application’s security and privacy requirements. RFID and RF-enabled smart card technologies comply with different standards, have different operating ranges and widely varying ability to support security features needed by RF-enabled applications. The figure below shows key requirements for common RF-enabled applications and the typical RF technology used for the application.Example applications using RF-enabled contactless smart card technology include:The U.S. FIPS 201 Personal Identity Verification (PIV) card being issued by all Federal agencies for employees and contractors;The new U.S. ePassport being issued by the Department of State;The Transportation Worker Identification Credential (TWIC) being issued by the Transportation Security Administration;The First Responder Authentication Card (FRAC) being issued in Department of Homeland Security pilots;Contactless payment cards and devices being issued by American Express, MasterCard and Visa;Contactless transit fare payment systems currently operating or being installed in such cities as Washington, DC, Chicago, Boston, Atlanta, San Francisco and Los Angeles.Smart Card Alliance industry councils provide a variety of resources to assist organizations in evaluating RF technologies and implementing RF-enabled applications.Frequently asked questions about RFID and RF-enabled contactless smart cardsRF-enabled applications’ requirements and technology useRF technology featuresBest Practices for the Use of RF-Enabled Technology in Identity ManagementContactless Smart Chip Technology: The Business Benefits, Smart Card Alliance briefingContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked QuestionsSmart Card Alliance councils also provide additional reports and resources describing the use of smart card technology for different applications.Contactless Payments CouncilHealthcare CouncilIdentity CouncilPhysical Access CouncilTransportation Council

DRM -- w/ the CEO of Fasoo.com

Consumer DRM--> individual who wishes to post a content online would require this.Enterprise DRM--> Makes sure secure documents are kept secureEncription vs. DRMDRM keeps control even after the file/software has been distributed to the user.The key of the lecture was on the Enterprise DRMCould EDRM be applied by a small company with ie., 10 employees? Would it be cost effective?Enterprise DRM user may feel more comfortable about working because he/she knows that he/she is not doing anything wrong or that they are under the exposure of involuntary mishap.Also, I do not know the credentials of the lady in class however, it was fascinating to know that a pdf file could be copy pasted by Ctrl A, Ctrl C, Ctrl V. I never tried Ctrl A on a pdf file because I just assumed that the pdf files were not copy-pastable. Awesome!!! Has this been the case from the flintstone days? I remember I used to scan and run OCR to capture the content, then fix the layout and make sure that all charaters are recognized. I wish I had known about this before. Sigh. :)
One month for policy settingthen consult with technicians to setup the DRMTypically takes 2-3 months for the implementation of a DRM --> based on the past 500 deals booked by Fasoo.
Systems are usuallu built with very simple policies. This is the reason why one company may have 10 different DRM systems in the company because each DRM has different boundaries.

Is Sarbanes-Oxley Working?

I'm interested in Audit recently.
At the workplace recently I had to make an document for the audit of Sarbanes-Oxley fo r LG-Nortel company.

"A number of companies have begun to standardize and consolidate key financial processes, eliminate redundant information systems and unify multiple platforms; . . . automate manual processes; . . . better integrate far-flung offices and acquisitions; bring new employees up to speed faster; broaden responsibility for controls; and eliminate unnecessary controls."
-- that's exactly what we're supplosed to do at the moment.

I found an interesting article about it.

===================================================

Compliance: Is Sarbanes-Oxley Working?

Learning to Live With SOXIt seems like a straightforward enough question: is SOX working? Two years after the Sarbanes-Oxley Act (also called the Public Company Accounting Reform and Investor Protection Act of 2002) went into effect, there is a mounting supply of data on hand to throw at the query. But like so many seemingly simple questions, this one isn't. There are a lot of layers to peel back before any serious answer can be reached. The question invites more questions, such as, "What does 'working' mean?" "Working for whom?"
And to the extent that SOX might be working, are its successes worth the costs? One thing everyone agrees on is that the costs of compliance are much higher than had been estimated. After that, well, define "worth it."



One point of view is represented by Stephen Wagner and Lee Dittmar in their article, "The Unexpected Benefits of Sarbanes-Oxley," published in the April 2006 edition of the Harvard Business Review. They write: "A number of companies have begun to standardize and consolidate key financial processes, eliminate redundant information systems and unify multiple platforms; . . . automate manual processes; . . . better integrate far-flung offices and acquisitions; bring new employees up to speed faster; broaden responsibility for controls; and eliminate unnecessary controls."
Or not, according to a recent paper by Henry Butler and Larry Ribstein for the American Enterprise Institute, called The Sarbanes-Oxley Debacle: How to Fix It and What We've Learned (see "Larry Ribstein on the Holes in SOX"). It calls SOX "a colossal failure, poorly conceived and hastily enacted during a regulatory panic. . . . SOX supporters are dead wrong in their assessment of SOX—both logic and evidence make it clear that SOX was a costly mistake."
Even quantitative responses, from the number of earnings restatements by public companies since compliance with the law became mandatory (high), to the number of initial public offerings by companies in the U.S. capital markets (low), can be spun in different directions.


And as in so many things, where you stand may depend on where you sit. Groups with particular interests have definite opinions on the question. For audit firms, Sarbanes-Oxley has been called the Full Employment Act of 2002. IT workers with audit skills command a premium in the job market. SOX is working just fine for these folks. But investment bankers who haven't been getting those tasty IPO fees, and small companies forced to pay big dollars to comply? Not so much.
Of course, business and regulation and markets are complex subjects, and in the real world this question is not a binary function with a clear conclusion—on or off, yes or no. But while acknowledging messy, multifactorial reality, and with some caveats and quibbles, we'll venture an answer to the question: Is SOX working? Yeah, it's working okay. Not perfectly, and not for everyone, but in a broad and measurable sense, the case for SOX is affirmative.
This is a holistic argument. It won't convince the IPO firms or the folks at the American Enterprise Institute. But as Wagner and Dittmar contend, the benefits of SOX go beyond avoiding scandals to rationalizing financial reporting that had grown ragged for a whole laundry list of reasons, including poor integration of merged companies, Y2K fixes, new technology that doesn't play nice with legacy systems, and complex, interconnected supply chains. As high SOX start-up costs are absorbed, the real benefits should accrue to companies with standardized processes and centralized systems that make compliance with regulations of all kinds an integral part of their cultures.
As Senator Paul Sarbanes (D–Md.), one of the bill's cosponsors, said in March, "The benefits of compliance are emerging." He pointed to a CFO Research Services survey of 180 senior finance executives who identified "unexpected benefits from Sarbanes-Oxley compliance." Respondents said Sarbanes-Oxley enables them to manage risk better and uncover weaknesses in financial controls, while boosting operational performance. Let's walk through some of the pros and cons, the spin and the counterspin. Your mileage may vary depending on usage. I look forward to some full, frank discussion of this issue on my CIO Insight blog, "Know It All" in the weeks to come.

3.6Gbps Mobile Internet Sevice-NoLA

3.6Gbps 무선전송 기술 ‘놀라(nola)’집에 100Mbps 속도의 유선 광랜이 설치되어 있다면 인터넷을 통해 영화 한편 다운 받는데 평균 1~2분정도가 소요된다. 전화모뎀으로 인터넷을 하던 시절에 비하면 정말 대책없이 빨라진 것 아닌가 하는 걱정이 들기도 한다. 이렇게 빨라지는 인터넷 속도에 와이브로까지 등장. 이제는 언제 어디서나 인터넷을 즐길 수 있다. 이런 인터넷 속도에 한계는 어디까지 일까. 이제 곧 5기가바이트 급 HD급 고화질 동영상을 10초 만에 다운 받을 수 있는 세상이 온다. 이번 시간에는 얼마전 개발돼 인터넷 세상을 새롭게 바꿀 ‘놀라(NoLa)’로 명명된 기술에 대해 알아보고자 한다.<편집자 주> △ 초당 3.6기가바이트 전송 한국전자통신연구원(ETRI)은 지난 11일 3.6Gbps 전송속도를 구현하는 ‘저속 이동용 무선전송 시스템’을 세계 최초로 개발·시연하는데 성공했다고 밝혔다. ETRI는 이 기술을 ‘놀라(NoLA)’로 명명했다. 이번에 개발된 기술은 유럽과 미국, 일본의 경우 1Gbps 정도의 시스템이 개발돼 있는 정도다. 이 기술은 국제전기통신연합(ITU)의 차세대 무선 전송의 핵심기술로 경쟁이 치열한 분야일 뿐만 아니라 실시간 구현하기까지 많은 어려움이 산재돼 불가능에 가까운 기술로 여겨져 왔다. 하지만 ETRI는 이러한 여러 난제를 △여덟 개의 다중 안테나를 사용한 미모(MIMO) 기술 △Multi-Rate LDPC 부호기 기술 △Multi-Gigabit LDPC 복호기 설계 및 구현 기술 △Multi-G급 Throughput(처리량) 제공 무선제어 기술 등 네 가지 핵심 기술을 바탕으로 개발해 현재까지 선진국에 비해 최소 1년 이상 최대 3년 앞선 원천기술을 확보하게 됐다. ETRI는 이 기술과 관련해 2006년 4건의 국제특허, 4건의 국내특허를 출원했으며 올해 추가로 약 16건의 국제특허와 20여건의 국내특허를 출원해 오는 2008년부터 시작될 예정인 차세대이동통신(IMT-Advanced) 국제표준에 반영할 예정이다. 한편, 2012년 이후에 4세대 이동통신이 상용화되면 초고속 대용량 서비스를 필요로 하는 무선 인터넷 TV(IP TV) 시장, 홈네트워킹 시장 등을 고려할 때 수조원의 시장 파급 효과가 있을 것으로 기대된다. △ 세계최고 원천기술 확보 이번 기술개발로 한국은 코드분할다중접속(CDMA), 와이브로(WiBro), 지상파 디지털멀티미디어방송(DMB)에 이어 또 한번 세계 최초 원천 기술을 확보하는 쾌거를 이뤘다. 특히 1년 6개월이라는 짧은 기간에 세계 최고 성능을 자랑하는 3.6Gbps 무선전송 기술을 구현함에 따라 이동통신 분야에서 우리나라가 세계 최고 수준에 올라와 있음을 다시 한번 입증했다. 이날 시연회에 참석한 유영환 정보통신부 장관은 “CDMA, 와이브로, 지상파DMB에 이어 정보기술(IT) 강국 한국의 위상을 다시 한번 확인한 획기적인 연구결과로 앞으로 산업체와 공동으로 상용화해 세계 시장을 선점할 수 있을 것으로 기대된다”며 큰 의미를 부여했다. 놀라는 정지상태 및 저속이동 환경에 적합한 4G 기술이다. 따라서, 도심의 인구밀집공간 등 사용자가 많고 이동속도보다는 고품질 서비스 요구가 높은 지역에서 서비스하기에 매우 장점이 큰 기술이다. 지금은 핫스팟에서 WiFi로 인터넷검색 정도를 할 수 있지만, 앞으로는 대용량 HD영상도 마음 놓고 즐길 수 있게 된다.
김호경기자 yongin@yonginnews.com

Monday, December 10, 2007

Information Systems Audit and Validation

Importance of Information Systems Audit and Validation: Understanding, Experience, and Technology for Compliance MetricStream Delivers

Information technology has become a core enabler of business processes within the organizations today. As a result, companies are required to audit and validate their relevant IT systems to ensure that their business processes and underlying records comply with regulations such as the Sarbanes-Oxley Act of 2002 or Healthcare Insurance Portability and Accountability Act (HIPAA) or 21 CFR Part 11(FDA). This paper defines an “easy-to-implement” framework for auditing and validating IT systems for regulatory compliance. It also identifies a best practice which calls for IT organizations and software vendors to proactively audit their software development and implementation processes on an ongoing basis to identify and correct any systemic issues to lower the cost of compliance.

Bio-Sensor for U-healthcare

Almost all the advanced countries have the plan of developing U-healthcare services with leading edge scientific technologies.I think U-healthcare services should be realized in the future and will come true even if there may some obstacles like security, privacy, systemization, and standardization issues.Most of countries worry about these issues. But we cannot escape the fruitfulness of this services.Hospital related services are still out of control from the public. Very difficult special words, complex processes, reliability issues explains why this service is not easy to be included public IT/IS services.Standardization will be possible because we have long history of standardization experiences and de jure standardization organization worldwide. All the related stakeholders will paricipate in the standardization process. Security for preventing to break privacy is also related to reach public common idea for overcoming the obstacles raised in the context. Special encryption technologies such as quantum encryption will be developed in the near future because there can be heard some initial success stories in scientific journals. Success story of demonstration in bank area is published in communication journal.U-healthcare including Bio-Sense has also both of bright and dark sides. The most import thing is how we can make it good use in our society. For this service to succeed, it should be suggested to discuss in world-level organization, for example, UN, WHO,...Hardware and infrastructure are ready to start, but key success factors are the issues the auther raised. Most of the related specialists regard it as "hot potatos". But I think we cannot escape from it.

Importance & hidden story of Quantum Cryptography

-Gilles Brasard-
Quantum cryptography is the only approach to privacy ever proposed that allows two parties (who do not share a long secret key ahead of time) to communicate with provably perfect secrecy under the nose of an eavesdropper endowed with unlimited computational power and whose technology is limited by nothing but the fundamental laws of nature.

The funny thing is that, while our theory had been serious, our prototype was mostly a joke. Indeed, the largest piece in the prototype was the power supply needed to feed in the order of one thousand volts to Pockels cells, used to turn photon polarization. But power supplies make noise, and not the same noise for the different voltages needed for different polarizations. So, we could literally hear the photons as they flew, and zeroes and ones made different noises. Thus, our prototype was unconditionally secure against any eavesdropper who happened to be deaf !

Wiesner submitted his paper “Conjugate Coding” to the IEEE Transactions on Information Theory. Unfortunately, it was rejected, probably deemed incomprehensible by the editors and referees because it was written in the technical language of physicists (which must have seemed normal for a physicist!). It is fortunate that Wiesner had expounded his ideas to Bennett, for they might otherwise have been lost forever

Ultimate Security - Quantum cryptography

In the end, all the leading edge services from emerging technologies can be commercialized or
publicly used if and only if the security issues are overcome.
I think quantum cryptography is ultimate solution.
When evesdropper invade or intercept the message, the information is broken and also informs the fact to the Allice & Bob.

====================================================================
"Quantum cryptography" from wikipedia

Quantum cryptography is an approach to securing communications based on certain phenomena of quantum physics. Unlike traditional cryptography, which employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, quantum cryptography is focused on the physics of information. The process of sending and storing information is always carried out by physical means, for example photons in optical fibres or electrons in electric current. Eavesdropping can be viewed as measurements on a physical object — in this case the carrier of the information. What the eavesdropper can measure, and how, depends exclusively on the laws of physics. Using quantum phenomena such as quantum superpositions or quantum entanglement one can design and implement a communication system which can always detect eavesdropping. This is because measurements on the quantum carrier of information disturb it and so leave traces.
Some commercially-available products have appeared based on quantum cryptography, for example, ID Quantique or MagiQ.

Business Intelligence - What is it?

Business Intelligence is a process for increasing the competitive advantage of a business by intelligent use of available data in decision making. This process is pictured below.

The five key stages of Business Intelligence:
①Data sourcing
Business Intelligence is about extracting information from multiple sources of data. The data might be: text documents - e.g. memos or reports or email messages; photographs and images; sounds; formatted tables; web pages and URL lists. The key to data sourcing is to obtain the information in electronic form. So typical sources of data might include: scanners; digital cameras; database queries; web searches; computer file access; etcetera.

②Data analysis
Business Intelligence is about synthesizing useful knowledge from collections of data. It is about estimating current trends, integrating and summarising disparate information, validating models of understanding, and predicting missing information or future trends. This process of data analysis is also called data mining or knowledge discovery. Typical analysis tools might use:-
probability theory - e.g. classification, clustering and Bayesian networks;
statistical methods - e.g. regression;
operations research - e.g. queuing and scheduling;
artificial intelligence - e.g. neural networks and fuzzy logic.

③Situation awareness
Business Intelligence is about filtering out irrelevant information, and setting the remaining information in the context of the business and its environment. The user needs the key items of information relevant to his or her needs, and summaries that are syntheses of all the relevant data (market forces, government policy etc.). Situation awareness is the grasp of the context in which to understand and make decisions. Algorithms for situation assessment provide such syntheses automatically.

④Risk assessment
Business Intelligence is about discovering what plausible actions might be taken, or decisions made, at different times. It is about helping you weigh up the current and future risk, cost or benefit of taking one action over another, or making one decision versus another. It is about inferring and summarising your best options or choices.

⑤Decision support
Business Intelligence is about using information wisely. It aims to provide warning you of important events, such as takeovers, market changes, and poor staff performance, so that you can take preventative steps. It seeks to help you analyse and make better business decisions, to improve sales or customer satisfaction or staff morale. It presents the information you need, when you need it.

What Is SCM ?

I. What Is SCM?
It’s important to have a clear definition supply chain when a company is trying to set its strategic objectives. For this purpose we have come out with the most accurate definition “the means by which firms engaged in creating, distributing, and selling products can join forces to establish a supply network with unbeatable competitive advantage"
• In the picture you can see the bigger picture of the supply chain.
• So Supply chain have to do with the following:
. Material flow from suppliers and their “upstream” suppliers at all levels
. Transformation of materials into semi-finished and finished products
. Distribution of products to customers and their “downstream”customers at all levels
• Depending on the situation, the supply chain may include major product elements, various suppliers,
geographically dispersed activities, and both upstream and downstream activities. It is critical to go
beyond your immediate suppliers and customers to encompass the entire chain is visualized.

II. Problems
• Distribution Network Configuration : Number and location of suppliers, production facilities,
distribution centers, warehouses and customers.
• Distribution Strategy : Centralized versus decentralized, direct shipment, Cross docking,
pull or push strategies, third party logistics.
• Information : Integration of systems and processes through the supply chain to share valuable
information, including demand signals, forecasts, inventory and transportation etc.
• Inventory Management: Quantity and location of inventory including raw materials,
work-in-process and finished goods.
• Cash-Flow: Arranging the payment terms and the methodologies for exchanging funds across entities
within the supply chain. within the supply chain. The flow is bi-directional.


III. Case Study
The chemical division of an integrated petroleum company engaged CSC to evaluate opportunities for further improvement in their existing ERP (Enterprise Resource Planning) infrastructure. The framework for the effort came from CSC’s experience with the Four Levels of Supply Chain Optimization.• The first stage of supply chain optimization is to “aggregate and leverage” known best practices
for early impact.
• In the second level of supply chain optimization, the objective is “internal integration.” Working together, executive groups.
• Next, the teams focused on customer relationship management and fulfillment.
• Other improvements included:
. Creation of enhanced customer service offerings, improving new business marketing tactics
. Creation of centralized processes powered by advanced decision support systems
The resulting alignment of business unit strategies fueled other benefits for the petrochemical and
specialties businesses including joint ventures for both business units.

A summary of the results from the effort include:
. Significant impact on top line, bottom line and balance sheet
. Overall supply chain costs down 12%
. Logistics alliances in all modes
. Outsourced barge fleet
. Reduced motor carriers
. Improved order satisfaction from 76% to 91%
. Significant revenue generation from new services – increased share with alliance partners

IV. Recommendation

• Supply chain design must be cautiously configured.
• Fit between demand pattern and supply chain
• Define strategy for asset ownership
• Practices Benchmark for best in class
• Organization :Consolidation of accountability and authority

Top 10 Science & Technology News of 2007

On today news paper, I saw 10 main news in Science and Technology part in 2007
I can see Web 2.0 is ranked as 8th news in there. I also agree their opinion and this change will change the business sheme of internate. Many user have posted their own contents on the web site. But how about the quality of the contents ? If someone fake information and many people believe it, How shall we control about it ?


Environment, Energy, Mobile Internet Are This Year’s Most Debated Issues

1. Red Alert on Global Warming

2. Mobile WiMax Selected as Global

3. Green Energy on Rise

4. Science Education in Crisis

5. Astronaut Ready to go

6. Stem Cell Breakthrough

7. Nuclear Fusion Test Reactor

8. Web 2.0 and User Created Contents

No one can define what exactly Web 2.0 means. The development in the broadband Internet network has brought the second generation of Web services, such as social-networking sites and user-built encyclopedias, where everyone can create their own services and relationships which cannot be defined in a fixed term.The Web 2.0 era is represented by the popularity of the blog (personal Web log), Facebook, Wikipedia and YouTube. In South Korea, the home-made video sharing services called UCC (user created contents) have become a fad among big Internet firms such as Daum, Yahoo and Cyworld.

9. Face-to-Face on Mobile

10. Debate on Technology Leaks

LG Dacom Launches IPTV service

Many internat companies are preparing IPTV service in Korea. If they start this business, Our daily life will be changed totally. We can select a TV program we want to see . While I can watch my favorite TV program any time and order clothes at the same time.




LG Dacom launches IPTV service

LG Dacom, Korea`s third-largest fixed-line operator, yesterday launched the broadband-based internet protocol television, intensifying competition in the market.Now there are three broadband service providers that offer the IPTV service, which they believe will serve as a new growth engine in the almost-saturated telecommunications market.IPTV is expected to bring a major change in television viewing by offering viewers a wide-ranging selection of programs on demand.LG Dacom said its IPTV service, dubbed "myLGtv," is available through a bundled product, which also includes broadband internet access and a telephone service. The broadband service is offered by LG Dacom`s subsidiary, LG Powercom.The company said its packaged product is as much as 15 percent cheaper than those provided by its two rivals - KT and Hanarotelecom, the country`s No.1 and No. 2 fixed-line service provider, respectively.LG Dacom said its new service also provides more high-definition content than its rivals.The company, which started its IPTV service with 3,000 programs, will expand its content into more than 20,000 by the first half of 2008.Its two rivals have already begun preliminary IPTV services, including video-on-demand. Full IPTV, including real-time broadcasting, was unlicensed under Korean law, but after three years of haggling in the National Assembly, it gained parliamentary approval in November.Hanarotelecom is ahead of KT in the IPTV market. Since its inception in 2006, Hana TV has attracted 660,000 subscribers, while dominant fixed-line carrier KT lured 230,000 subscribers to its Mega TV service.KT is the nation`s broadband market leader with 44.5 percent market share and 6.52 million subscribers, followed by Hanarotelecom with 25.2 percent market share and 3.69 million subscribers as of the end of October 2007.LG Telecom has an 11.1 percent market share with 1.62 million subscribers.