Friday, August 31, 2012

Social Commerce




■ concepts

New e-commerce distribution business model to purchase goods and services through a combination of online media and social media (SNS)
* Global Internet portal Yahoo (Yahoo) use past 2005 for the first time, the term 'social commerce'

■ Type

Social links, social wephyeong, co-purchase type, offline-linked, and 'co-purchase type of social commerce boom

* Social link type: e-commerce site on the SNS, such as Facebook or Twitter link (button type) that can be moved in a manner that provides

Automatically reflected in the consumer of SNS the * Social wephyeong: Web links, as well as the behavior of consumers, such as the purchase takes place in the e-commerce site, review the form of the function of social networks within the site, which is implemented

* Buy by product type: fixed be achieved at a discount in a manner that provides the minimum purchase quantity '08 the world's largest social commerce enterprises (美) Groupon (Groupon) since its establishment in the world, a joint purchase social commerce boom occurs

* Peristaltic offline: offline spaces that connect to SNS, in the form of smart phones, such as in the offline networking terminals (devices) using to take advantage of social networks and location-based services, such as connection type

■ FEATURES

Substantial discount, the consumer products you can buy 50 percent cheaper companies take advantage of bulk sales and promote
* Minimum purchase quantities for sale through the social network service (SNS) consumers voluntarily disseminate information

■ market size

Since the early '10 domestic social commerce market is rapidly growing, in Jan. 2011, about 300 companies have formed

■ controversy

Damage cases, including non-refundable, discrimination, reservations hiatus, with the exponential growth of social commerce companies, such as Internet shopping mall and communications vendors' brokers' existing 'and redefining the exchange command visibility to the Refund Policy, FTC ( caused controversy by '11 .5)

Mobile AP (CPU) on




Less interested in these days, as long as the hardware specs of the smartphone had they could not receive more attention in the future Tenerife's
Cpu About this contribution, simply to investigate saw this ^ ^ hope

Application processor (AP) What's this?
If you think simply of the brain and smart phones like the role will be your computer's CPU's

Samsung, Apple, TI, Qualcomm, Nvidia, the company that makes the AP

* ARM (Advanced RISC Machine)? AP to learn about you sometimes appeared to bosida company ARM is a company that manufactures AP, because the above company makes AP's design but it is very important to provide all ARM
Provided by the ARM architecture-based companies such as Samsung, TI, we often know the excimer North, ohmaep AP will to create simple schematic think if you pyeonhapnida architecture (^ ^)
Had a company called ARM smartphone now if they could not
* Micro process? On how finely produced architecture from each company to create based on AP is a unit of the unit is recommended, because it can increase the density of transistors and L2 cache to reduce internal heat, the more finer nm units.


Now'll learn about each company's AP

1 Snapdragon Qualcomm (Qualcomm) -
Company is uniquely provided by the ARM architecture does not just
Qualcomm's architecture can be divided into two Scorpion (Scorpion) architecture Krait (greater Wright's architecture)
※ Scorpion (Scorpion) - S3 until the third generation have been produced based on the Scorpion architecture (Snapdragon, S is the number after generation.) Scorpion architecture of communication chipset compatibility and AP significantly honed, but performance degrades So snap Dre rep will write a stigma was a lot of initial LTE smart phones Snapdragon S3 came out wearing a Scorpion architecture compatibility is because it is eating up swearing equipped Snapdragon is why at the time, only LTE-compatible possible Because
Popular by previous generations of Snapdragon can not recognize good architecture is based on the fourth generation S4 shows the performance of the otherwise quite excellent and the Scorpion architecture, ※ Krait (greater of Twilight) - However, not kept Personally, I think the Snap per core performance than Dragon S4 excimer of the 4412 North thinkyou the 4412 North excimer quad-core; overall superior ability in all four cores, but does not go back a simple task, the Internet or watching movies such as better performance S4 28nm process is expected to show was produced by ('s highest level)
Were mounted Vega Racer 2, Optimus lte2

2 NVIDIA (NVIDIA) - Tegra
Tolerable if you know of the computer's graphics card Nvidia is GeForce (Geforce) is a company that produces
AP Nvidia's Tegra 2 and Tegra 3 is a representative
, Would like to explain briefly about Tegra 2, cortex a9 architecture was constructed based on the 40nm process has been used in this look at the general AP and does not differ from bar Why hear the sound movie he grows? ... Do not think you do it's so much was because of Nvidia's bad judgment Tegra 2 neon units .. Reduce the size of the Tegra 2 from NVIDIA but it eliminates the Annie movie without proper playback may not get so already Tegra Tegra 2 ap25 burya burya with neon unit and re-exported the I 2 movie trying to say the rumors are then Nobody Tegra 2 ap25 did not have an interest in, the Tegra 2 that was literally ruin
Tegra 3 quad-core processor, an upgraded version of Tegra 2 is cortex a9 architecture have been built on 40nm process Nvidia expect the graphics considerably excels the most noticeable thing is aka Ninja core, called the fifth core that exists .. 5th core only do common tasks that do not require high computational power, and the other cores when they stopped work, the battery efficiency is quite good
Tegra Kal-El, (KAL-EL), Wayne (WAYNE), Logan (LOGAN), Stark (STARK) the sequel is preparing to
HTC One X, Nexus 7 is mounted

3 TI (Texas Instrument Texas Instruments) - ohmaep
Excellent semiconductor technology, followed by Samsung, Intel is the world's third largest semiconductor manufacturer (OMAP) AP ohmaep is produced
Are fabricated with the 45nm process ohmaep 4460 cortex a9 typically based on 45nm process, in spite of significantly superior performance shows ohmaep the overall balance allows good thing is characterized by a strong performance, mature, and so hard to find a particularly bad shows cortex a15-based 5th generation is preparing'm

4 Samsung (Samsung) - Axial North
Damned Certified is a leading semiconductor company currently cortex a9 architecture based on 32nm fabrication process as the 4412 North excimer product has been released to high technology, producing the best AP, what is different enough to say you do not need is an excellent ap robust performance, especially in terms of the computation rate, exhibit cortex a15 architecture is based on the fifth generation of preparing
Note that the number after the North excimer there are certain rules, the number of front-based architecture means and (cortex a8 - 3, cortex a9, cortex a15-5), the second number is the number of cores (1 - single core, 2 - dual-core, quad-core), and the fourth the number of micro process with mean (0 - 40nm process, 2-32nm process) and the third number I do not know ^ ^;
For example, based on cortex a8 3110 (Hummingbird), 40nm process single core and cortex a9, 4212-based, 32nm process is a dual-core

Snapdragon dual-core ohmaep 4460, s4
Quad Core - Axial North 4412, Tegra 3

Many core unconditionally a good thing, not per core efficiency drops and the battery more quickly, irrevocably, fever can be more severe pushed a simple task in a dual-core or less, for example, North 5250 cortex a15 of the excimer-based processor dual-core, but 4412 more is expected to show better performance and, of course, a better gpu than the 4412 (not yet released, but ...) that is so sweet ..

Thursday, August 30, 2012

D. Dos (DDos, Distributed Denial of Service)




■ concepts

Of malicious traffic attacks distributed denial-of-service (DDos, Distributed Denial of Service) to send massive amounts of data at once, to a particular site by overloading hack that prevents normal service.

* DDoS hacking case and interfere with service to target specific sites and companies who extort money from

■ how to hack

DDos spreading viral program that continued access to the targeted site, upon which the PC is infected with this program to the target site repeatedly connected

Remotely control the infected PC at once concentrated on the specific site to access the site connected disability causes

* February 2000 related sites such as Amazon and eBay and e-commerce site failure occurs while under attack became known to the general public starting

■ Major Events

The world, by July 2001, the site of the White House, the United States via the Windows 2000 and Windows NT server DDos paralyzing virus 'Code Red II' appeared nervous Sikkim

In a fortnight was found as a variant of the 'Code Red' worm virus infection worldwide system of 300,000 non-domestic systems (at least 3) infection manyeodae

Related trends,

March 4, 2011, 10:00 a.m. in observance of the 40 Internet companies, and financial institutions, state agencies, such as the Cheong Wa Dae and the Ministry of Foreign Affairs and Trade on the Web site for DDoS (DDoS) attack occurs, KCC cost cyber crisis 'caution' alarm issued

Prior to July 2009, even simultaneous DDoS (DDoS) attack from Cheong Wa Dae and the National Assembly, some banks and media companies, portals, sites, 25 for each of the major areas of the Internet Site, the connection fails,

Wednesday, August 29, 2012

dll file viruses?




dll dll files can not do anything alone. dll exe files can be run within the
dll archived library of many small programs can be seen. . Exe format of the program is needed when running the program, if you can recall. . exe file format and receives information from a particular device may be used to, and able to perform the function of a specific source code is stored in the dll files may be
Example) load the exe file from the drive of a user's computer capacity available if you know how the data is stored in the dll files, exe files can Then the dll file and pass it to the exe file, and can assure you.

The advantage of this;
Create exe file in this way, if you create an exe file, when exe file, the size of its capacity to know it. Should not need to use the function.
Created if you do not use dll files exe file, exe file size are much larger than writing the dll file is.

Exe as well once before going on let's understand!

exe file that can run Executable [/ etc.] is an acronym for
In short, is a file that a user can run.
Exe file that, when opened, the user performing the tasks created by the person who created the exe file /.
The most common types of exe files exe file is used to install the software.
exe is used to perform other tasks when you install them, but when.

Dll and exe files now understand do you say?


Above I have explained the contents of the dll file alone is not able to run, no action, just run exe file within that be done?
First ask or where to find out exe files, dll loading, ~ which path? Haneungeon highest priority.
First need to know what dll is stored in the directory where the system exe files usually to write dll or exe file, dll loading of malicious code such as a virus or backdoor is required dll judgment.

Do you have another file format exe dll files do not rotate the vaccine silttae you can see a good idea.

Ordinary system executable files needed if other exe files, dll files, dll, or the file is useless.

Portable vaccine




What is a portable vaccine?

Portable vaccine ... the word is an unfamiliar concept.

At first glance, thought to be carrying stored somewhere antivirus will think. So, Pulling a portable vaccine. Well, why not carry around an antivirus? I was curious. In fact, quite a bit of PC anti-virus, hardwood and their kind, also very vary. In such an environment, why vaccines do not carry around?

I've heard stories of developers were plausible. Virus vaccine is installed so, why still the polarity? Why?

From here that the idea of ​​a portable vaccine. Personal antivirus virus from May until vaccine has already been installed in one PC from virus infection if this worldwide spread that is

Monthly install already powerful virus virus is spreading from the external these in order to prevent damage to carriers, enterprises, institutions, etc., to prevent it. However, about internal users? On my job here and copy the files and documents created at home even as a company importing. Contrast on a removable disk.

It to removable storage devices, in order to ensure that the vaccine altogether. Of course, be a powerful antivirus updates automatically and that you get a good basic Pulling

These products are bringing in interesting ramifications. Perform the role of a computer therapeutics. If the PC already infected with the virus, install additional antivirus that it almost does not make sense. Vaccines are already infected PC In severe cases, the vaccine itself become infected. How would you go about it?

The answer was simple. Portable vaccine therapy and the connection ...

Worm yiranda polarity. Buy a new computer to connect to the Internet, feeding Packaging jeukgi infected danda. So ... updates and security patches to instantly receive the vaccine as soon as an Internet connection ... jjeop.

Will probably be almost impossible. In this case, the alternative goes. Internet connection boot and plug the portable vaccine and ...

Vaccines carry the latest and one of the charm of a portable vaccine is available when and where the driving.

Example is a new concept whatnot ... I heard a somewhat confusing. We will investigate about the value and use hyoyo chageunhi These types of vaccines currently there's only Virus Chaser USB it will be checked.

Tuesday, August 28, 2012

Best HDD performance server configuration




System Engineer most slow, causing a bottleneck in the performance of your computer, the device is a hard disk that will be familiar.

 Worth of computer devices in recent years become very good performance, particularly the performance should be this bad. Of course, turning the game on the PC than the specification may be lower.
 But nonetheless the speed of the HDD are not satisfied does Yet until the SSD's performance will force the server needs to match the performance.

 Only too professional knowledge, except commonly used RAID-1 and RAID-5 will explain. (Best performance RAID 0 + 1, but do not use a lot of relationships, we will subtract.)


RAID configuration, the S / W H / W as possible.
Dynamic disk in Windows Disk Management S / W as a convert after available.
Server performance due to the S / W is slightly eaten.
H / W as a tolerable Array controller on the server appears. Thing about mounting
Professional use of a separate device implementation faster, making it the best place.

RAID-1
 RAID-1 mirroring. Two disks on the same information will be recorded.
 Pasting data copied to a different server, the disk did not fail, the failure by one I operated on does not interfere, is also available.
 When I read the note to give to the two when data required by dividing the amount of reads from both disks at the same time. Theoretically write speed is a little slow and the read speed 2x faster, but ... Does not feel like it.

RAID-5
 More technical part of a lot of information, so I will not.
 (The total number of disks - 1) as default and can be set from the amount of disk space you can use more than one drive. The disk, the faster the write speed reading speed more. One enters the space, the parity bit error check bits. The parity bit is not the only flocking to one of the disk, and then turns the record.

 For example, assuming that you have configured RAID-5 DISK 9 1BYTE write (8bit doeget jiyo)
 Eight disks 1bit by writing a ninth parity bit recorded on the disc.
 Than writing 8bit DISK 1 DISK 1 bit per record eight times faster write speeds do, huh.

 DISK many cases such as disk access SQL configuration will

DISK configuration of the server
 Optimal configuration, in order to isolate the portion of the area and the normal OS DATA will

 146GB * 2ea: RAID-1: total 146GB available
 - C: 70GB: OS installed, D: 70GB: Other Application Installation

 300GB * 4ea: RAID-1: total 900GB available
Mount E: 900GB SQL or Exchange of Data. (Application) mounted on D:
Not be extended to make several small disk capacity will improve performance and reduce the loss of disk 1 minute bondamyeon.

Additional performance to 146GB * 2ea: RAID-1 configuration: 146GB available
Log mount F: 140GB available: SQL or Exchange. OS of the Paging file mounted.

= Amount consists of the cost of the minimum-phase if ... DISK 4 pieces RAID-5 configuration C: D: Chainloading.
 There are some cases, if your DISK 3 consists It would be difficult to expect the performance.
 DISK 2 Mirroring Configuration and paging files, installation files, backup files, etc. to one storage phase unimportant things even moved us to help with performance. The same capacity that can be used anyway.

Monday, August 27, 2012

Configuration optimized server performance




Always a lot of troubles when you purchase a server chose.
 To a properly configured server and pay the high cost to purchase you'll join, you will have the questions.
Unconditional, to pay the expensive server is introduced, trouble-free performance but unnecessary waste of money and so forth. Upside were too cheap to buy the PC and insufficient performance for easy upgrades, but the do not. And failure, even men and women even more problematic agent.

 If you are selling inexpensive hosting companies often
 Usually a single web hosting performance as the older PC if there is no problem. Visitor to tens of days, but data is not large, because most

 Typically talk about the performance of your PC when CPU is unconditionally good, Server bother, but does not. Handling process usually because the data from the PC and Server PC required to send and receive.

 Now, in conclusion, I'll go.
 The performance of the server configuration depends on the purpose.
 Typically, a file server, Web server, SQL server, mail server, and so chose to use a lot.
 Depending on the purpose, regardless of the OS or Application. Is similar, because

File server, web server,
- Performance almost does not matter.
CPU: Dual-core level or above
- RAM: 1GB suffice.
  More if you use a bulletin board with zero board or SQL (the case of a Web server, 2GB degree may be required.)
HDD: Required as much. Only if the data is important, because the mirroring configuration.

Mail server
Persistent connections, and therefore is dependent on the number of users. (See below 50user below)
- CPU: dual-core level or above.
- RAM: linux Exchange of more than 2GB, 8GB or higher required
- HDD: HDD 2ea more than mirroring.

SQL server
- Require the most performance.
- CPU: quad-core level or above. 2CPU longer.
- RAM: linux more than 4GB.
- HDD: OS 2ea mirrored area.
             DATA area 4ea RAID-5.

Common
2WAU server CPU for easy upgrades in the future, so one
- RAM also facilitate capacity expansion applies only to the base.
HDD's very difficult because optimal future configuration changes to the state configuration.
 (A lot of performance, if necessary, start with a basic 6 at least four or more RAID-5)


Ubuntu (Ubuntu) APM (Apache + PHP + Mysql) Construction




Posts have been written about the installation of the Ubuntu-based APM.
(Apt-get way to proceed with the installation.) Please note that the benefits

Zero. root privileges
since have root privileges by hand will need to put a sudo to sudo-i << command.

1 Installing the APM and other library
 (1) Apache2 installation
 apt-get install apache2

 (2) php5
 apt-get install php5

 (3) mysql
 apt-get install mysql-server libapache2-mod-auth-mysql php5-mysql
 Password (to enter the password in the middle comes out the root account and the root account separately DB)

 (4) GD library installed (XE installation required)
 apt-get install php5-gd

 (5) phpmyadmin
 apt-get install phpmyadmin
 DB root password (in the middle asks pop up just proceed by default.)

2 Setting
 (1) phpmyadmin interlocking and ServerName
 vi / etc/apache2/apache2.conf
 On the bottom line
 Include / etc / phpmyadmin / apache.conf
 ServerName localhost
 After entering the store

 (2) language set (UTF-8) set
  (2-1) PHP
  vi / etc/php5/apache2/php.ini
  : default_charset = "iso-8859-1" default_charset = "utf-8" to change

  (2-2) mysql
  vi / etc / mysql / my.cnf
  Below add [mysqld]
  default-character-set = utf8
  default-collation = utf8_general_ci
  init_connect = set collation_connection = utf8_general_ci
  init_connect = set names utf8
  character-set-server = utf8
  collation-server = utf8_general_ci
  character-set-client-handshake = TRUE

 (3) Apache, Mysql restart
 service apache2 restart
 service mysql restart

This progress has completed the installation of APM and other essential settings.
Pinoy (EUC-KR) optional on the UTF-8 language set to set, if you do not enter or change the utf-8 to EUC-KR.

Localhost (127.0.0.1, my IP, domain, etc.) to final confirmation by typing in the address bar and verify that the output It works! Paste / phpmyadmin phpmyadmin works properly Make sure that you

Sunday, August 26, 2012

The impact of the computer drive P2P




Usually say this, people have learned to use your computer
P2P has an adverse effect on your computer, just When asked why, if the virus is much aground,
Or, that there is a problem with the security to say something, but people do not know exactly what the exact reason for

Nevertheless, the computer, I do not know the exact thing, but I learned quite many circumstances, when viewed
P2P has an adverse effect on your computer can be found.

The principle of the P2P, Peer To Peer, reducing the original, P2P, was chinghage
Technology, by connecting directly to your computer and upload or download files, etc.,
Know has brought this technology to save files quickly and easily obtained.

Obviously, this technology is much better than the original intent of the development, the
Is not about to share files between two computers, many of the people you share your computer in
Crowd goodbye, I want to boahdo development had

Then go briefly the basic environment of P2P jipeo reported
So far, the P2P is actually being used, but it is small.
A transcript, it is difficult to list the basis set, he ought to upload files, but also
Put the file download can be set up so the fractional part been broken, because
Get when you download any file, and other parts also available for download As
Download much faster file sharing, and also is excellent.

Of course, be pointed out for illegal file sharing, where tens of thousands of different masks, but worth commenting,
Exclude them, and the impact of the computer on each article I'm writing now only to write.

Then think about the state of Internet-based P2P
By default, to use the Internet, you need a modem, and the router should be the default.
And the other is connected to the router, the router receives various signals, the exact target,
The request to move the data into one place that role.

If you are using your own computer, using a router around in their clear
To use a router, and use the Internet,
NIC (Network Interface Card) must be present on your own computer.

When you download a common file path to be used, the server on which the file exists,
Data goes through a router, and many, and their computer's NIC is connected to the computer coming
That data is being stored on your computer, the files are available for download.

Common in the case of uploading, the opposite of downloading files that exist on your own computer,
NIC connected to databasing, and goes through a router, by storing files on a server that exists somewhere,
File exists in the server.

So the case of P2P download Think
First file exists 'server' concept does not exist.
So the file where that comes from, how each is coming from the computer.
Home after exactly one file that is divided into 10 parts, 10 parts,
Way, the fastest file downloading files one assume that if you have 10 people or
10 Part 10 patients, respectively, to get down the fastest.
So years, you can download files at a much faster rate than down at one specific server.

Down faster, but also that the
It directly to your computer, think about the impact of it is not seen.

Try to think, if you download 10 files at the same time look ...

(The Internet is assumed to be a combination of many routers)
After I myself PC12 assume that PC11 in the same router on all computers except
Look to download the file to ...
Through the router many times may be able to send the file on each computer, and my computer 12 times, from
Halsey, on the assumption that all data files at the same time, this server 12 to download.

However, where the problem exists.
Point is not a specialized server computer to download / upload.
Undergo a lot of files here and there, What happens will happen ...
Clear their computer, as well as a great influence on his direct router.
Maven, download the file, take the file on the router and use his viewpoint,
Same transmission that make sense to the specified computer, because damage here,
Will affect the PC to use the same router.
People who use the same router as the router is overloaded, the disabled, Internet phenomenon, or
Or Internet slowdowns is affected.

Of course, this is temporary, and the router is specialized to upload and download, because it was created
Will be giving you a big problem. To upload and download, but the computer or specialized server, the router will not
File, receive a file going to cause a big problem, but you need to download beats
In almost all P2P upload should do, as you have set down, even at the moment of uploading,
Computer as the download and upload, NIC,
And will have a direct impact on the computer.
Of course, this overload phenomenon once or twice a big influence Sabe, look at this stacked pile,
Someday NIC or just need to put stress on the computer is a computer, or replace parts.

P2P Why look more obvious than to get down on a particular server is fast, but fast enough,
Computers, and computer parts affecting what results may be surprising.

The impact of the one-dimensional computer degree, other problems also exist.


P2P's, especially if you have the ability to check a file, is slowed.
It means that the file download and virus scan, Dunn, malware scans, etc. are neglected.
Of course, some P2P programs have a virus scan on the file directly, but
Believe that virus scan called the ending a few seconds?
Actually overhaul of your computer, scan for viruses when
It takes a lot of time in spite of a few hours it takes a few seconds to a few GB of files ends
Do not understand common sense. That means the type of file, avoiding detailed examination, only briefly looking around
Virus scan which, in this case, not to stop the outflow of the virus also

In addition, based on the leakage area of ​​new malicious code, called P2P, I
Even if the vaccine updates, no matter how fast, because new malware is discovered behind the vaccine is updated
New files using P2P in Download, malicious code that is not yet discovered by intact
Disseminated until the point where, if you look at the same time, download the files as As, formidable advantages also
To download the file holding floating anxiety elements and the same is true.

I have never used P2P of the files in a folder that has been shared only the name FORMA hover,
Share programs that start immediately, never used, so if you look at that,
Hover your nifty new virus name instantly share will not be an issue.



Remember that extent that I have about 5 years of being used for P2P streaming.
Not saving the file at that time, also can be obtained easily and fast download speeds
Looks good, but at the time, a few years before studying for the computer program, some one behind,
May be reluctant to install even if you get the desired files, P2P.
Clearly, directly, who once said P2P is bad ', but
Came to learn about the variety of computer, OS, Programming, and parts of
Was also to give the crowd naturally as a computer file sharing techniques that learn.

Of course, the better the performance of your computer, the better the performance of the vaccine, using P2P straining at all, also connote
Viruses or malicious code to be safe, but also from that part of the risk, because there
I thought it was not that the old use of P2P programs.

Saturday, August 25, 2012

New types of media




(1) CATV (Cable TeleVision)
Than a regular user of the antenna, CATV operators, excellent high-sensitivity reception antenna to repair the quality of broadcast television signals to subscribers' homes using broadband transmission line such as coaxial cable transmission services that
Often transfer large number of broadcast channels and interactive services available
Came to think the solution is for poor reception areas, but in recent years the development of Internet access services using the excess bandwidth of coaxial cable, and
Components: subscriber terminal equipment (Terminal Equipment), the head-end devices (Head-End System), and transferred to

(2) CCTV (Closed Circuit TeleVision)
Specific only to the recipient of service with the aim of a closed-circuit system
The camera is connected to a television monitor, so the signal does not propagate into the air
Extend the conventional closed-circuit system of functional limitations in the field of information management, computer network, multimedia technology background and
An industrial television (TV) or a dedicated television referred to as

(3) HDTV (High Definition TeleVision: high-definition TV)
Complementary technology to the problems of the existing television high-definition television, greatly increasing the number of lines and the total number of pixels, screen aspect ratio, etc.
Aspect ratio: 16:9
Number of lines: existing NTSC format (525/625) of the approximately 2-fold

(4) Teletext (Teletext)
+ Broadcast TV receiver + Data Bank System
Television propagation of extremely short intervals using the one-way system to deliver a multi-character information broadcasting
Television propagated the unused portion of the system that sends the characters or shapes at the same time as regular television broadcasts program
Such as information retrieval, message passing, and electronic data processing services, transaction processing services, remote monitoring services

(5) Teletex
Height of document memory mutual communication services
In addition to editing, storage and communication capabilities, and use a wide range of high-quality (error correction) and the character of the Beach Office document handler to use the terminal
Available public data networks such as the telephone network, the connection

(6) Videotex
TV receivers + + Phone Data Bank
Search for the required information in the user information that is accumulated in the Information Center computer system, a TV award or on the PC screen that displays characters and shapes

(7) Facsimile (FAX)
Decomposed into pixel stills, letters, photos, etc., into an electrical signal by changing transfer, the receiving points won and it looks like the way to obtain a permanent record video

(8) video conferencing system (VCS; Video Conference System)
Created to conduct meetings, such as video and sound through the reflection on the TV screen installed in the indoor people away from each other over long distances between their respective systems

(9) automatic training system (CAI Computer Aided Instruction)
Learning program computer applications automatically education system, to be held by the individual education while teaching many people using a computer at the same time to adapt to the individual's aptitude or understanding

Friday, August 24, 2012

IP Contact Center




IP Contact Center (hereafter IPCC) What sort of call center.



1 Call center is



Call center know what? When the lady on the phone dials KT Megapass Go Wrong phone rage? When you call to order products LG Home Shopping, the girls phone rage? These call centers.



All the traditional call center telephone system. ' Do you have to phone to make phone calls. Therefore, the existing call center is usually located in the central region of South Korea.



're Usually a toll-free call center? Seoul residents from everyone except all incoming telephone calls received from people in Seoul If you have a call center in Seoul, but the inner city rates because not all people living in Seoul does she have to pay long distance calls. So to maximize total phone bill down to usually geographically located in the middle of the South to do.



2 VoIP What's this?



Network infrastructure in our country is well paved. Network is, of course, 'data' communications network. Network using the Internet, games, mp3, sending and receiving, and getting down to write with the purpose of, you know? Both sending and receiving data geotyijyo. Telephone network, on the other hand, is the 'voice' communication network. 's The main purpose to convey the voice of the people. But in our country these days, all too well, because underlying the net: network data communications came from the receipt of the data and voice communication networks (voice) also give the effect that it is a VoIP (Voice over IP). You can call using the net: network data communications using VoIP technology geotyijiyo. Dramatically if can be called revolutionary idea.



The fact that the voice in the early days of VoIP technology has never been properly delivered. Frequently disconnected, static. Hanging ... did write a little uncomfortable. But nowadays, you can be quite similar to regular landline phone and a lot of technology development and quality. Inconvenient to write almost do no wrong.



Anyway, by the underlying network throughout Korea, technology, VoIP is derived from the purpose of giving voice (let's call receipt).



3 IP Contact Center?



IPCC (IP Contact Center) What is a "call center using VoIP". Once a traditional call center desk Po ~ itguyo every desk, telephone, one by Po ~. 's Agent is preferably sit down there and receiving a phone call. This phone bills i did not In addition, receives phone calls What the hell Are you sure you want to.



The other hand! Two straight on the phone at a call center - ripping off if I applied to the VoIP technology, the circumstances vary.
Once on the desk phone instead of a computer Po ~ are placed. Hang the phone to the computer. (Or just a special computer machine to receive a phone call there, and the only such program in a typical computer aesthetically pleasing.)



Telephone (telephone network) from a computer (data communication network), just means that the phone think has changed? Absolutely not.
The questioner by his Megapass are impossible to call KT Imagine the scene.



Scene 1. Call center that uses existing phone

KT When you call, the agent receives a phone counseling helps. Megapass on the agent desk Megapass Question / Answer "collections" or "Manual", there will be



Scene 2. Build IPCC call center

By about a ton of information will pop up on the agent's computer screen when a call> KT. Megapass install anywhere, anytime, and be used for Megapass light or premium, or by what the problem in the past with the phone that you have so come on the screen straight on. Counseling agent is supposed to be much more comfortable? In addition, the quality of counseling, of course, go up, right?



This IPCC, however, is not the greatest feature. Just one of the many characteristics of Annie.
The biggest advantage of the IPCC. "ANYWHERE, ANYTIME, ANYHOW" LG Home Shopping have about 5,000 agents. Call center in 5000 to accommodate the building would be useful? 5000 must have a desk to sit in, right? 5,000'd get a phone?



This building three alone, you will need quite a lot of money. However, IPCC If you've built?
You do not need a call center building itself. Internet anywhere where you can not get to the phone's. Is ideally suited for telecommuting.



In addition, many usually call the call center to experience the long wait has just broken.
In this case, referred to as "abandoned call" Dropped Call IPCC build abandon calls will be reduced dramatically. 's What agents certainly can be customized to the customer's phone line consult



The customer's information above, I already told you I, IPCC ton of pop up on the computer. Then, by analyzing the customer's propensity to specializations of course) to be connected to a suitable agent (agent can create. In addition, analysis of existing data by which the agent can receive calls in the first situation, if all agents busy can be unpredictable. Agents can be managed very efficiently
Can.


Thursday, August 23, 2012

The structure of the communication layer




1 Layer-Based Communication Model - hierarchical structure

- Layer N
   Use the services provided by the (N-1) layer
   Instance with the same hierarchy of communication

- Protocols
    For the communication between the tiers of the same predetermined protocol
 - Service
    The ability to provide the (N +1)-tier hierarchical N
    Also known as the Service Interface.
 - Instance
   Tier one communications protocol that provides services that implement


  2 ISO / OSI Reference Model

- Features
   Presents the abstract model for the communication between the system
   Standards development system for providing an open communication system
   Important feature of the communication system in terms of logical decomposition is recognized.
   Actually in a position to implement because of the complexity of the failed model

- Physical Layer (physical layer)
   Unstructured bit sequences converted to a physical signal transmitted through the media layer

- Data Link Layer (Data Link Layer)
   Transmitter transmits a frame made of data.
   Do not overload the receiver and adjust the flow of data.
   Error detection and re-transmission.
   Protocol: SLIP, PPP, HDLS, ...

- Network Layer (network layer)
  System connectivity between the networks.
   Routing, Fragmenting plays.
   Protocol: IP, ICMP, IGMP, ...

- Transport Layer (Transport Layer)
   Application provide data transfer between
   Exist for the accuracy of the data and to secure the order.
   Protocol: TCP, UDP, ...

- Session Layer (session layer)
   Handling the exchange of structured messages through the transport layer.

- Presentation Layer (presentation layer)
  Control the flow of data between the terminal system.
  The delivery of data in computer and communication systems that do not depend on (independent) regulations.
  Example: ASCII vs Unicode Big endian vs. Little endian

- Application Layer (Application Layer)

 
3 TCP / IP Reference Model

- Interface Layer
   Network adapter drivers and their covers.

- Internet layer
   IP
   ICMP - transfer control and error information
   IGMP - Communications Group

- Transfer layer
   Transfer terminal system applications among responsible
   TCP - connection-oriented, reliable, STREAM
   UDP - connection-oriented, stack light, DGRAM
             Complex (heavy) TCP are increasingly preferred over transfers (such as multimedia)

- Application layer
   Of all tasks associated with the application layer (ISO / OSI model of 5 ~ 7 layers)
   Telnet, FTP, SMTP, DNS, HTTP

Wednesday, August 22, 2012

Programmer (develop) and technicians (tech / develop)




Developers (Derveloper), technicians (Engineer)
Coding, and software developers to easily use the program so that
USER is the development of convenient and allow easy access.

In other words, developers are people who'll be able to create something went.
Jeoyeoksi, engineers and developers, you should say split

I called the developer reopened halsuitget
But, more than 10 years gisuljajeuk developers, engineers are not called.

There is a difference between developed and technicians.
Or that nothing is currently being used or technician or any language dealing with modifications that could show your work lamps casts

This is how little difference does not look at developers and engineers.
I engineer now program, application developers do not say Do not let her.

But that new software or something I can speak a language he does not know it is not the application.

It is possible to do.
However, I am not Derveloper Engineer to support.

Jjokbodaneun software on the hardware side Derveloper know more haeteuldae
Engineer to see the hardware side there are also more andago my idea.

Yojeungneun younger friends and wanted to study a lot of programs do eoga
Peurogeuraemeo C, JAVA GAME peurogeuraemeodeung peurogeuraemeo.

What is important or necessary Enginner Derverloper I learn that someone is a ...

The developers and engineers that car?




Developers and engineers

Engineers and developers to get paid differently according to the instructions at the top for the purpose of the program is developed.

Unlike the developer to engineer his own creation and testing of new technologies try gamyeo keyword.
The technology to optimize it away for the public and is a technician.
Of course, within four engineers in the company fell on the use of alcohol is limited sikige.

The biggest drawback of the IT industry in Korea, the source code and note that the information is shared.
It can be fatal to both turn back.

This plateau in the IT industry in Korea is calling a itneungeot look is probably not exaggeration.

Korea, the developers, but really need to have an engineer to develop a program point

All. Therefore, developers should more than equipped to become a knowledge engineer

Tuesday, August 21, 2012

Mad Movies, AMV




"What is maedeumubiran?>


Movie Mad (Mad Movie) ... Hajamyeon prefer being literally crazy movie.
Of course we have to do anything, you literally can not derive the.
If a more rapid uptake of helping, something crazy videos made 'how shall I say?

In the meantime, several described the meaning of the movie Mad writings were floating around the net and,
Neither of them properly in the movie Mad does not explain the overall entity.
Therefore, I hold a little more seriously, to make the attempt to describe this place was laid.
Although a little jumbled order, although
As much as possible try to talk I hope you will understand that the jeommaneun.

The edited video of the movie is a kind of mad, with fan fiction is similar. Authorship of the work that the original video by editing and creating independent because people bring. There are many types of work that is original but, also jangreusang game, and may aeniil and may manhwail, you can officially fiction.

Basically the movie Mad video and music are included.
Video also, music is in the existing ones in most cases, but in some cases, video or music, or create your own writing, both cases are the author. (If you've never seen in music.)

The two basic elements by meeting Mad movie a music video and similar nature took on, which determines the difference between a music video, the price to be song and video this additional element to be inserted would, if Mad movie picture stock and Music Insert the two is that in order to support this year. So the music has nothing to do with the original case so much more and have been selected by the author's judgment will be inserted. (Which works to raise the image of the music more deeply than is namgido.)

Mad that the original game or animated movie, cartoon, and video based on the fans to demonstrate his or her own skills to create, the music is the movie gyeotdeulyeoji. Mad movie itself is a music video editing skills and the ability to edit both, mostly amateur writers, but because it requires considerable skill in the field are those professionals who have. The movie produced by Mad is distributed free of charge, without exception, a temporary opening of your own home, or to secure a temporary capacity should disclose myeochildonganman.

Mad movie to use the original source, but original copyright issues by identifying the author from a Mad beyond the movie and the original non-profit because of the publicity it brings is tolerated. Even in terms of the original developers to create publicity for the movie Mad cases are often (but not the majority of movie fans make the Mad.)

It is not clear that the movie Mad boundaries.
This simply by using fans to create original video that is hard to edit. If the so-called Mad Movies waenya Among the cases are classified according to the promotional video, or unless the original authors of the source directly without using a direct painting (East Indian movie), also because. Currently, it is difficult to arrive at a definite answer on this point.

Japan's share of the movie Mad Manufactory, or even a few ronama Korea and China, producers do exist, and there are massive western side. (In this case does not say the movie Mad term AMV writes will discuss separately.) Mad Movies is quite prevalent in Japan, even with multiple authors of a team and making things even if you can see not uncommon. Carlsberg teams include well-known studios (they put the factory, dissolved by) or magic Development Authority (MDO, dissolved by), Tim visitor (Team Visitor), Operation Legend (Operation Legend) include:

Mad Mad movie makers made a hard movie to make money because you can not include decent producer if there is no passion sometimes difficult. (Usually from the original one was interested in video editing, Mad Movies are not parallel at all.), But some authors the case of recognition of its outstanding video production capabilities, such as miyeonsi Publisher dee various games, including Opening Movie Scout doeeoseo videos they have done is create. A prime example of a rookie workshop kanjeuki Yashiro (神 月 社) is a person.

Finally, the Mad movie I'll tell you about the impact on us. Mad that the main features of the movie to fans of the original is that it brings new fun. Edit the contents of the original author's disposal, and by reconstructing the original may be different from another yeonchulhal atmosphere, and the author's direction by demonstrating techniques without regret to see a great video and great music, people, visual and auditory delight may .

Is not alone in holding. Mad the original movie to those who have not encountered yet a great advance will often perform the function of providing information. CG video of the original scene, or by entering some knowledge about the work we can learn, albeit fragmentary, and also the overall atmosphere and the deployment method can always guess. (This movie is mad about Promotional Video This may also be present.) In addition to a variety of high-level movie Mad video editing and production techniques will facilitate the development of.




"Kind of movie Mad>


Mad enough to classify four different movie I will not be visible, three of the original source and the others depending on the characteristics of a crew on the nature of the source of the origin or is due.

A. Still Picture Movie Mad 静止 畵
This series is stationary, as the name implies, the movie is created using the picture. CG and game illustrations, wallpaper, etc. Anyway, do not move on the basis of Figure create it using various production techniques. Thus, the original still images of the movie Mad overwhelmingly game. Annie still do not see keotdeulro. To retrieve the images are static, as indeed it directed to a variety of ways, and thus very high rate of editing. Series of still images is the most excellent movie is not an exaggeration.

Two. Mad fairytale movie 动 畵
This family, as the name implies, is a moving picture of a movie made of woven. Things moving as smooth as the original parts from the video section make a cut or put the production techniques. Thus, the original fairy tale movie Mad is overwhelmingly animation (there are teukchwalmul) but sometimes using only video games can make. In this case, the still images in each scene as movie editing contrived to put a difficult relationship, but if yeonchulryeok scarce, such as synchronization with the music of its own way a lot nonhaeseoneun superiority should not jump to conclusions. In fact, Japan and South Korea say they call the movie Mad In the West, this series AMV (Animation Music Video) refers that, the vast bulk of production is to continue AMV.

Three. Hybrid movie Mad
Written as CG and video games, or if one works out everything in this game, and Annie, both when used as a source of a fairy tale movie and still images of the movie will have all the properties. It is mixed (random), I'll call. Two properties in both the two well-placed as easily be seen to good effect, but without a lot of work in the first place, both relationships are rare side. And in all of the original game and Annie, the two genres, including drawings showing the various qualitative difference, so if you write wrong, but rather can be awkward. Anyway, it does not consider this case in fact the side AMV belongs only to the movie Mad.

Four. Other Mad Movie
This promotional movie by the original developer (CM) or the demo movie, the opening movie, and even play video movies are included. Strictly in terms of fan made videos, are not. However, included in the scope of the movie Mad sikigido do anything it would be nice to know. Recording and editing the combo of fighting game combo videos (CMV) also show the rise and availability nowadays qualitative plots are making a lot of Mad movie format. Also, just because the movie creative drivers, even create your own images there are some authors.






Strictly speaking, the country, including Japan and South Korea, the East side, this is also the Mad Movie 'called Una, Western country, including the United States as a raw material side, the animation, one collectively edit the video AMV (Animation Music Video) called. As indicated by the words say, AMV, called the rainy season is simple for the condition. In the West, will make (the exception), you will wonjaeryoil animation, music, insert the music video format will make. This is three kinds.

The total set of Western AMV processing site called the animemusicvideos.org is, when you see it here, and how many producers will realize that there are no work. Mad AMV movie too much apart from the trail and has its own, this series is also very huge and chop a solid foundation is the state. In fact, people do not view this situation, non-Herzegovina AMV I finally Like Mad owing, yet awareness of the relationship has not done enough to fuse completely, knowing it to be classified according to its own will.

In Japan, Piano, Luria system in Korea (Rurisis) is a producer representative AMV creators. These are typical of the movie Mad miyeonsi mainstream animated series based on the work only work only creates rather than creating, animemusicvideos.org who are active in the site.

In a way the difference in terms of MAD AMV movie and just could gyeongjaengil hegemony. Chop on both sides but there is a state of a solid foundation, a complete understanding and communication between each other, and even voluntary on both sides of the two terms interchangeably prospects look carefully, would probably not impossible.

Buffering (Buffering) What?




What is buffering 'buffer (temporary storage) has been working on which is stored in "means that the

Usually VOD Streaming (Streaming) technology is created. This streaming technology to play a little bit down, is a technology that takes. In this case, where data is stored buffer (Buffer) is

However, the buffer was playing down the back, for any reason, then the arrival of data, unless the following actions must take back.

So I hang up the screen as there will be buffered. Dropped in a short time phenomenon for a short time in a long time will never get broken all the symptoms for a long time to come will never get.

The color image data, resolution, frames, etc. jineunde determined by the capacity, so that the display is like 300k 500k. A lower capacity would come take a startling picture quality will be forced to write down more interactive.
Conversely, the opposite also be thought of.

Buffering not feel lucky, while taking advantage of streaming is that there can not be buffered.

So in order to solve this is to either a taekhasyeoya. 'll See a lot of first takes less interruptions, or a little bit at first see? Is bateumyeonseo.

To view a large sum at the beginning, the first screen comes slowly, it takes time. However, for later viewing screen be less interruptions've ever done.

Vice versa, save for the first time to play only a small amount of data that can be faster, so at first. However, depending on network conditions are highly dependent.


To adjust the buffer, and Windows Media Player -> Options -> Performance -> Buffer -> Please make figures. Keojina buffer increases, so will increase the storage time.

Streaming is a technique based on network conditions affect so much to get a fast network speeds, so you have to see where you can say that the most stable.

Monday, August 20, 2012

Home for the service required




Servers (H / W), operating system, Internet connection, a web server (S / W), DBMS (S / W), the domain name, source files, and other

A. Servers (H / W)
Homepage for the software has been installed to service the site to locate the source file for the computer says.
Home User's PC when I saw that the client, the server is called a relative concept.
You can call the same server, web server or WAS server hardware and software, meaning the other hand, here, means facing servers.
Typically use simple on a PC, from dedicated servers with multiple processors and storage to vary depending on the features and Internet lines are connected to the web server and DBMS services such as installing the necessary software and source files to this location is
For dedicated servers HP, Compaq and professional supplier of such products are mainly used.
I serve the contents of the homepage, you can be prepared in the proper specifications.
Hosting services hosting company's servers are located in IDC.
(Sometimes also called a web server and the server, where the software as a web server to distinguish it from the server was referred to.)

Two. Operating System
Computer software for operating systems, saying you know a lot of windows operating system such as is the family.
Particular reason to mention the website if the service using the operating system, usually because a separate server.
NT Department of window area or window server, advanced server, and the same thing as, Linux or Unix server operating systems, this typically is classified as
Case of Linux or Unix, Redhat, HP-UX, solaris, but functionally, as many software does not seem a big difference.
General operating system consumes more system resources, but system management functions is superior.
Most are provided with the server.

Three. Internet connection
Server that connects to the Internet, says the line.
Home users to connect to the server, or the name server for the domain name in order to locate the server must have a fixed IP.
(For example the case of the general high-speed Internet services to a dynamic IP, so hard to normal service.)
T1, E1, and the same can also use leased lines, high-speed Internet access is either use a static IP service.
Internet connection provided by your ISP, such as the KT can be.
Hosting services are connected to IDC, the line is used.

Four. Web server (S / W)
Depending on the client's request to interpret the source file is a communicator software.
Home users PC's browser as a client when I saw a server called a relative concept.
PHP, ASP, JSP, Java-coded source code for various types of analysis can show the users browser is converted into HTML format.
In addition, the website user's request to accept and send the requested information for each user to manage a series of processes.
Separately, the virtual server or virtual directory may provide such services.
However, WAS used in conjunction with the web server if the server-side source code generally is interpreted to suit the client side does not work.
(In this case, the WAS server to do the job instead.)
Web Programming by lowering the language and you can put a web server is as follows.
Web Server - Web Programming Language
IIS - ASP,
Apache - PHP,
Tomcat - JSP
Hosting services refer to services provided if Musk can know the web server.
※ Sometimes the relationship between the operating system and web server if you have a misunderstanding.
A typical example that Linux, Apache is only available if you are thinking that you do not think so.
The web server operating system is system software that is installed on the application is a.
If the windows for the windows operating system may be installed on Apache.
However, generally get the most performance for each webserver hagekkeum good fit to write the OS.

5 DBMS
Using databases and software that allows you to manage, often referred to as DB or database.
The use of a database on the website allows you to provide dynamic functionality.
(This dynamic is registered as a bulletin board, view, modify, delete, can perform the same function means.)
Oracle, MSSQL server, My-sql, etc. are mainly used.
Hosting services refer to services provided if musk know the DBMS, and to pay costs that can add capacity.

6. Domain Name
If the domain is a set of multiple web pages, domain name means the name of this set of wealth.
If you think that the name of the website is easy.
If you have a domain name on the Internet, organizations must register with andoemeu.
Nowadays, with the domain registration agency to pay the prescribed register and you can easily.
Simply corresponds to the domain registration agency to take ownership of the domain name registration only that I actually kind getdaneun is meant by a floating home as it does not address that.
I registered my domain name to the name server to map the server's IP should always remember to.
Of course, domain registration can be handled easily through the agency.
Hosting services to offer the domain neimman side handles give companies.

7 Source File
Website of the files that make up the different kinds.
Including HTML, js, inc, php, asp, jsp file from the same code, gif, jpg, png image files, such as, swf, wma, class and other services means all the files that make.
Depending on the configuration of your Web server if the location is in a particular place.
Hosting services from companies has been granted is done by uploading a file to an FTP account.

Eight. Other
Above-mentioned seven kinds of things the most basic requirement for home service can be called.
In addition to expertly handle logic WAS (web application server) in our country, firewall, CMS .... Numerous hardware and software can be used.