본 자료는 한국재활복지대학교(http://www.hanrw.ac.kr) 애니메이션 학과의 초청으로
2009년 10월 22일 월요일 오후 3시 취업 특강을 위해 마련된 자료임.
소셜 네트워크 기술 및 서비스의 발전 방향과
웹의 연결망 이론 등을 조망하고
이를 통해 취업 및 창업 준비생에게 도움을 주고자 2시간 분량으로 준비됨.
유비쿼터스, UCC, web 2.0의 상호관계 그리고 발전 과정을 개괄적으로 소개함.
방송과 통신의 융합 환경에서 트위터 서비스의 의미와 가능성을 타진함.
소셜 네트워크 기술 및 서비스의 발전 방향과 웹의 연결망 이론 등을 조망하여 현상에 대한 과학적 분석 시도
소셜 네트워크 서비스를 통해 취업 및 창업 준비생에게 도움을 주고자 2시간 분량으로 준비됨.
본 자료는 한국재활복지대학교(http://www.hanrw.ac.kr) 애니메이션 학과의 초청으로
2009년 10월 22일 월요일 오후 3시 취업 특강을 위해 마련된 자료임.
소셜 네트워크 기술 및 서비스의 발전 방향과
웹의 연결망 이론 등을 조망하고
이를 통해 취업 및 창업 준비생에게 도움을 주고자 2시간 분량으로 준비됨.
유비쿼터스, UCC, web 2.0의 상호관계 그리고 발전 과정을 개괄적으로 소개함.
방송과 통신의 융합 환경에서 트위터 서비스의 의미와 가능성을 타진함.
소셜 네트워크 기술 및 서비스의 발전 방향과 웹의 연결망 이론 등을 조망하여 현상에 대한 과학적 분석 시도
소셜 네트워크 서비스를 통해 취업 및 창업 준비생에게 도움을 주고자 2시간 분량으로 준비됨.
Intellectual Property Guide
patent requirements
industry approaches
patent strength -> patent map
International property offices
Scenario extends to more patents) - case study
.....
Data validation using CDR (Call Detail Records) and real cell tower coverageNicola Chemello
digital forensics acquisition is one of the most important part of any investigation. Granting the results comparing the obtained data with third party information is something the investigator should consider. Fake SMS, wrong parsing of the data, and other issues can be prevented if multiple sources are analysed. In this briefly presentation the results of a correlation with SecurCube Phonelog for the CDR analysis and SecurCube BTS tracker for the real cell towers coverage are highlighted.
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Amélie Gyrard
Keynote “Trends on Data Graphs & Security for the Internet of Things”
(Extended Version) #WF-IoT World Forum Internet of Things
Workshop on #Security and #Privacy for #InternetofThings and Cyber-Physical Systems #CPS
#Security #Toolbox #Attacks and #Countermeasures #STAC
#Security #KnowledgeGraphs #Ontologies
Speaker: Dr. Ghislain Atemezing(Research & Development Director, MONDECA, Paris, France) @gatemezing
Credits: Dr. Amelie Gyrard (Kno.e.sis, Wright State University, Ohio, USA)
Presentation done by Heejeong Han, Namho Chung, Chulmo Koo and Kyoung Jun Lee, during "Near field communication" workshop, of the ENTER2015 eTourism conference.
OECD workshop on measuring the link between public procurement, R&D and innov...STIEAS
OECD workshop on measuring the link between public procurement, R&D and innovation. "Impacts of Korean innovative procurement policies", presentation by Woosung Lee
Intellectual Property Guide
patent requirements
industry approaches
patent strength -> patent map
International property offices
Scenario extends to more patents) - case study
.....
Data validation using CDR (Call Detail Records) and real cell tower coverageNicola Chemello
digital forensics acquisition is one of the most important part of any investigation. Granting the results comparing the obtained data with third party information is something the investigator should consider. Fake SMS, wrong parsing of the data, and other issues can be prevented if multiple sources are analysed. In this briefly presentation the results of a correlation with SecurCube Phonelog for the CDR analysis and SecurCube BTS tracker for the real cell towers coverage are highlighted.
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Amélie Gyrard
Keynote “Trends on Data Graphs & Security for the Internet of Things”
(Extended Version) #WF-IoT World Forum Internet of Things
Workshop on #Security and #Privacy for #InternetofThings and Cyber-Physical Systems #CPS
#Security #Toolbox #Attacks and #Countermeasures #STAC
#Security #KnowledgeGraphs #Ontologies
Speaker: Dr. Ghislain Atemezing(Research & Development Director, MONDECA, Paris, France) @gatemezing
Credits: Dr. Amelie Gyrard (Kno.e.sis, Wright State University, Ohio, USA)
Presentation done by Heejeong Han, Namho Chung, Chulmo Koo and Kyoung Jun Lee, during "Near field communication" workshop, of the ENTER2015 eTourism conference.
OECD workshop on measuring the link between public procurement, R&D and innov...STIEAS
OECD workshop on measuring the link between public procurement, R&D and innovation. "Impacts of Korean innovative procurement policies", presentation by Woosung Lee
세상에 정보는 많다. 인터넷만 보아도 시시각각 뉴스가 올라온다. 뉴스 중 특정 단어 중심의 데이터를 텍스트 마이닝 할 수 있다. 메르스가 창궐했다면 뉴스기사 중 '메르스-불안-염려'라는 연관키워드의 빈도를 뽑아 그 해석을 할 수 있을 것이다. 또는 세월호 사건에서 '안타까움 등'의 연관검색어를 통해 세월호는 타자에 대한 아픔이라면 메르스는 나 자신에 대한 염려가 아닐까란 분석도 가능하다.
반면, 공개되지 않는다는 것을 전제로 시작된 폐쇄형 SNS(밴드, 카카오톡 등)은 API로 그 내용을 볼 수 없지만, 그 어느때보다 지금 폐쇄형에서 소통되는 내용이 국민의 진짜 속마음일 것이다.
당분간 폐쇄형과 개방형이 공존할 것이다.
근래들어 웨어러블, 사물인터넷 등 low level에서 솟구쳐 오르는 센싱 값이 늘어날 것이다. 굳이 이 비정형데이터를 분석하는 빅데이터의 프로그래밍 방식과 비주얼라이징 툴 그리고 하둡 등 분산처리 시스템을 논하지 않더라도 분명, 이 자료들이 분석될 것이다.
그렇다면 묻는다. 이들 날것의 정보들을 학생들과 선생님들에게 그냥 확 줄 것인가? 오늘날 큐레이션, 관계 서비스, 로컬라이제이션 서비스 그리고 LBS 등으로 상업적으로 이용될 때, 분명 돈을 벌고 광고를 얻고 플랫폼이 되고자 유인하고 선별하여 개인화시키는 정보 필터링 기술이 있을 것이다. 교육분야는 어떤가? 누가 이 정보를 필터링하여 학생, 선생님, 교육 관계자에게 시의적절하게 문맥을 읽고 추론하여 제공하는가? 큰 플랫폼을 설명하지 않아도 된다. 큰 교육 시스템을 그려내지 않아도 좋다. 아주 구체적이고 무척 작고 섬세한 교육의 한 부분을 그려보자. 예를 들면, '메르스가 창궐하고 학교 정문에서 학생들의 귀에 온도계를 꽃아 일일이 확인하고 있다' ..만약 웨어러블이 일상화된다면 학생 안전과 관련된 정보가 어느 수준에서 어떤 방식으로 어떻게 왜 언제 선생님, 학부모 등에게 전달되거나 공유되거나 저장되거나 때론 짧게 저장된 후 삭제되거나 등이 필요한가? 메르스라는 사태에서 의료정보가 어떤 수준에서 교육정보로 활용될 수 있을까? 학교 안에 안전이라는 측면에서 기존의 모든 이머징 기술을 이야기 구조 식으로 구체적으로 나열하면 어떤 방법으로 학생-선생님-학부모 등이 소통하기에 제일 좋을까? 교육 시스템 중 일부 모듈(안전 부문, 학생 질병 관리, 건강 기록 등)에 정보 공유를 고려할 때 어떻게 이해당사자 간의 거버넌스를 생각해볼 수 있을까? 예를 들어 의료정보와 교육적 가치가 상충할 때, 프라이버시와 교육의 효율성
로봇, 교육에 대한 한 꼭지와 소셜, 지도, 관심지도, 힐링, 의료 정보, 관광 등의 한 꼭지로 나누어져 구성되었습니다.
본 강의는 교육정보특론의 13-14주에 해당하는 뒷부분으로서 그간 배운 소셜 네트워크와 웨어러블 그리고 빅데이터 등의 기반 기술을 연결하여 사고하고 응용하는 능력을 배우는 시간이 될 것입니다.
고려대학교 대학원 교육정보 시스템 특론 과정의 12주차 교안입니다. 주요 내용은 서두에 융합에 내포된 오류를 검토하고 융합 또는 창의적 발상의 사례를 검토합니다.
구체적인 본 강의에서는 융합의 사례로서 인문학적 가치 중 몇몇 역사, 미술 등의 가치를 메타화하는 과정에 설명하고 이를 통해 얻을 수 있는 구체적 서비스 내용까지 검토합니다.
자세한 내용은 고려대학교 Mooc 에서 추후 소개될 예정입니다.
9 주; 2015.4.29. 수
교육정보서비스에서 정형/반정형/비정형 데이터 처리는 어떤 의미를 갖는가?
(교육정보에서 핵심 가중치를 두어야 할 데이터는 무엇인가?
몇 가지 추천하고 그 이유를 논한다.)
키워드 : 교육정보, 교육 데이터 마이닝, 교육 빅데이터
위에 대한 내용으로 고려대 정보대학 컴퓨터학과의 강장묵 교수 (연구)의 정규 교과목 교안 입니다.
'공공정보의 개방과 API'가 의미하는 바와 정책적 함의가 무엇인지에 대하여, 동국대학교 최고위과정 중 '빅데이터와 공공정보'라는 주제로 강장묵 교수(고려대)의 강의 교안입니다.
특강형식을 빌었으나, 본 강의는 2015년 3월에 있었던 경찰본청의 '공공정보 공유' 등에 대한 3일 연속 강의의 내용을 재사용하였음을 밝힙니다.
인용을 달고 PPT를 활용하시기 바랍니다.
고려대학교 교육정보 전공 대학원 수업 7주차
클라우드 기술과 교육정보 특론
2015년 4월 15일 수요일 강장묵 교수 강의 교안
클라우드 기술과 서비스 전반을 사례 중심으로 설명
클라우드의 구현 사례(에어비앤비 등)를 소개
클라우드 교육 시스템 구현 사례와 관련 연구 논문 분석
고려대학교 대학원 교육정보서비스 특론 수업 4-5주 교안
고려대학교 정보대학 컴퓨터학과 강장묵 교수 강의
본 교안은 빅데이터 기술을 활용한 교육정보서비스에 대한 것임
강의는 교육정보에서 활용될 수 있는 여타 ICT 기술의 원리 중 정보공유와 API, 빅데이터 정보처리 과정과 하둡 프로그래밍의 이해, 구글 지도와 크레이그리스트의 매쉬업 사례 등을 다룸
고려대학교 정보대학 컴퓨터학과 강장묵 교수의 '교육정보서비스 특론' 2주차 강의 교안
교육정보에 대한 원리를 이해하고 교육정보 서비스를 학습
강의 내용은 국내 대학들 간의 KOCW(Korea Open Course Ware)조직인 OCW에서 영상 서비스 제공
고려대 OCW 홈페이지(http://ocw.korea.edu)등을 통해 운영
지혜 구성 방법 및 기술 프로젝트 수행의 일환으로 진행된 워크샵입니다. 그 중 데이터 마이닝 기술과 언어 처리 기술을 이용하여 교육정보의 데이터마이닝을 연구하고 있습니다.
연구실에 여러 석.박사 학생들과 졸업생 이하 여러 교수들과 협업하는 지혜 구성 마켓을 구축하고 있습니다.
모바일 시대에 민주주의와 저널리즘 가치를 지켜낼 수 있는가? 신자본주의에 저널리즘은 조회수와 광고에 의존하여 황색으로 변색되고 있지는 않는가? 무한경쟁시대에 저널리즘은 효율성이라는 이름으로 중립적 가치보다는 시장가치, 지배자의 가치가 지배적이지 않는가?
국정원 등의 댓글 사건 이후 국내 트위터는 신뢰를 상실하였다. 그러나 한국주류언론의 현주소 역시 신뢰에 금이 가고 있는 작금에, 뉴미디어는 새로운 대안언론인가? 삐딱이들의 대안 채널일 뿐인가? 공론장은 인터넷 즉 PC alone에서 모바일로 진화하고 있다. 반면 숙의모델 등 공론이 이루어질 수 있는 최소한의 글자수, 이미지, 연결, 화면 사이즈 등 인터페이스와 글쓰기는 여전히 쉽지 않은 모바일 환경이다.
이 환경에서 비단 글쓰기를 통한 숙의만 가능한가를 묻고 그 대안적 보조적 또는 전환 기술과 메커니즘을 찾는다.
소셜 미디어의 발전이 저널리즘의 가치를 보장하는가?
소셜 미디어는 다양해진 관계망 서비스를 통해 저널리즘의 영향력을 중앙집중에서 분권화하는가?
소셜 미디어는 저널리즘을 황색저널리즘에서 품격있고 신뢰할 수 있는 저널리즘으로 변화시켰는가?
그렇지 못하였다면, 현재 대한민국의 저널리즘과 소셜 미디어의 관계와 진형은 무엇인가?
그리고 이용자들이 참여율과 보이지 않는 이용자(조직) 등의 영향력은 실제로 존재하는가?
SNA로 이 관계를 어디까지 실증적 조망이 가능한가?
저널리즘의 역사와 맥락 속에서 소셜 미디어를 고찰한다.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
강장묵 특허 등록 및 기술 이전 성과
1. ▶ Patent (cited: http://www.kipris.or.kr/, keyword: jang-mook kang)
Highlight _Technology Transfer, Commercialization, Be awarded, Awarded Project
- 현재 특허 출원 87-90 여건이 진행 중에 있습니다.
- 그 중 40 여 건이 현재 등록되었습니다.
- 또한 2015 년 2 건 내외로 국제 특허 (미국, EU)를 준비 중에 있습니다.
(그림) 네이버 전문정보 검색 중 특허 검색에서 ‘강장묵’ 검색 후, 특허 등록 및
출원 건수에 대한 화면 캡쳐 (2014.12.22)
본 자료에 첨부하지 않은 출원 특허는 총 40 여 건으로 2015 년에도 일정 수준
이상의 특허가 추가 등록될 것으로 예상됩니다.
특허 등록 중 국가 기관의 R&D 사업 착수 전에 출원하여 프로젝트 수주에
기여한 특허가 다수 있습니다. 파일 뒷면에 정리하였습니다.
2. 국가 R&D 사업의 결과물로 출원 및 등록된 특허 역시 다수입니다.
특히 국가 차원의 특허 매입에 공개 입찰하여 선정된 특허 역시 6 건 이상입니다.
이 중 몇몇 특허는 해당 자료와 함께 설명을 덫 붙였다.
위 특허는 대한민국 특허청의 특허검색사이트의 서비스 또는 네이버 전문검색
등을 통해 얻었으면
해당 사이트에서 특허 등록번호를 검색하시면 전문을 다운받아 보실 수 있습니다.
특허에 대한 기술이전, 사업 등은 고려대학교, 서강대학교, 경희대학교,
동국대학교, 서울과학기술대학교 외 몇몇 회사로 직접 문의하시면 됩니다.
3. [1]
Title: THE APPARATUS AND METHOD OF AUGMENTED REALITY IN BODILY
TISSUE WITH SOCIAL NETWORK SERVICE MOUDULE
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1013021200000
Registration date: 2013.08.26.
IPC : G06Q 50/00 | G06Q 30/00
Main Feature Image:
4. [2]
Title: Electronic Document Creation System For Automatical Inserting Of Quotation
Information
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1012839160000
Registration date: 2013.07.03
IPC : G06F 17/21 | G06F 3/14
Main Feature Image:
5. [3]
Title: Alarm System for Based On Accident Location
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1012745450000
Registration date: 2013.06.07
IPC : G08B 25/08(2006.01) G08B 25/10(2006.01) G08B 21/02(2006.01)
Main Feature Image:
6. [4]
Title: System and Method for Game Style Illustrated Book Production
Inventor: Jang-Mook Kang, Hyun-chul Kim, and Hyun-He LEE
Registration number: 1012598370000
Registration date: 2013.04.25.
IPC : G06Q 50/20 | G06Q 50/10C0
Main Feature Image:
7. [5]
Title: THE APPARATUS AND METHOD OF AUGMENTED REALITY OF BODILY
TISSUE WITH SMARTPHONE
Inventor: Jang-Mook Kang, Jae-Sang Cha, Sun-Hee Lee, and Sung-Jin Chi
Registration number: 1012589610000
Registration date: 2013.04.23.
IPC : G06Q 50/22
Main Feature Image:
8. [6]
Title: Customized LED lighting system using image recognition technology
Inventor: Jang-Mook Kang, and Jae-Sang Cha
Registration number: 1012586400000
Registration date: 2013.04.22
IPC : H05B 37/02 | G06K 9/78
Main Feature Image:
9. [7]
Title: LED Acupuncture Point Model and Education Manegement System By LED
Acupuncture Point Model
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1012560500000
Registration date: 2013.04.12.
IPC : G06Q 50/20 | G09B 23/28
Main Feature Image:
10. [8]
Title: Domain Possession Game System By Voice
Inventor: Jang-Mook Kang
Registration number: 1012484290000
Registration date: 2013.03.21.
IPC : G06Q 50/10C0
Main Feature Image:
11. [9]
Title: Social System and method for mobile lost and found service based on Location-based
service and augmented reality technology
Inventor: Jang-Mook Kang, and Woo-Jin LEE
Registration number: 1012392730000
Registration date: 2013.02.26.
IPC : G06Q 50/26 | H04W 4/02
Main Feature Image:
12. [10]
Title: Social Network System for Citizens Campagin's Share-Participation-Open
Inventor: Jang-Mook Kang, and Sung-i Yun
Registration number: 1012388100000
Registration date: 2013.02.25.
IPC : G06Q 50/00D3
Main Feature Image:
13. [11]
Title: THE APPARATUS AND METHOD OF SMART WINDOW TO DISPLAY A
PERSONAL MOVIE
Inventor: Jang-Mook Kang, Jae-Sang Cha, Sun-Hee Lee, and Sung-Jin Chi
Registration number: 1012102610000
Registration date: 2012.12.04.
IPC : G09F 9/00 | E06B 7/00
Main Feature Image:
14. [12]
Title: System and Method for providing virtual doodle board interface based on Location
Based Service
Inventor: Jang-Mook Kang
Registration number: 1012102820000
Registration date: 2012.12.04
IPC : H04W 4/02 | G06F 9/44 |
Main Feature Image:
15. [13]
Title: Advertising-promotional methods by treasure-searching game using location
information and augmented reality technology
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1011881790000
Registration date: 2012.09.27
IPC : G06Q 50/00 | H04W 4/02
Main Feature Image:
16. [14]
Title: Schedule Managing System and Method Based on Location Service
Inventor: Jang-Mook Kang, Jo-Sung Kwang, and You-Jin Song
registration number: 1011784180000
Registration date: 2012.08.24
IPC : G06Q 10/10(2013.01) H04W 4/02(2013.01)
Main Feature Image:
17. [15]
Title: Crowd Information Serving System Using CCTV
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1011769470000
Registration date: 2012.08.20.
IPC: H04N 7/18 | H04H 20/02
Main Feature Image:
18. [16]
Title: Mobile Device Case for Checking Heat
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1011734770000 (20120807)
Registration date: 2012.08.07.
IPC : A45C 11/00
Main Feature Image:
19. [17]
Title: THE APPARATUS AND METHOD OF CHANGE A EMOTION INFORMATION
WITH THE FIVE CONTENTS IMPORMATION
Inventor: Jang-Mook Kang, Jae-Sang Cha, Sun-Hee Lee, and Sung-Jin Chi
Registration number: 1011697170000
Registration date: 2012.07.24.
IPC : G06F 17/40 | G06F 17/30 |
Main Feature Image:
20. [18]
Title: SmartPipe and Underground Facilities Manegement SCADA System Using The Same
Inventor: Jae-Kwon Sim, Jin-Tae Kim, Kyung-Kun Lee, Sun-Ho Jung, Yong-Sik Kang, Suk-
Won Kim, Jin-Ho Bae, Yun-Ho Sul, and Jang-Mook Kang
Registration number: 1011672640000
Registration date: 2012.07.13.
IPC : G08C 17/02 | G08C 19/02
Main Feature Image:
21. [19]
Title: THE APPARATUS AND METHOD OF NEWS CONTENTS FOR PERSONAL
TARGET BASED ON LOCATION CONTEXT IN MOBILE SMART_PHONE
ENVIRONMENT
Inventor: Jang-Mook Kang, Jae-Sang Cha, Sun-Hee Lee, and Sung-Jin Chi
Registration number: 1011659890000
Registration date: 2012.07.10.
IPC : G06Q 50/00 | H04W 4/02
Main Feature Image:
22. [20]
Title: Pipe of Underground Management System Using Low-MAI Near Field
Communication
Inventor: Jang-Mook Kang, etc.
Registration number: 1011620670000
Registration date: 2012.06.27.
IPC : H04B 5/02 | H04W 84/18
Main Feature Image:
23. [21]
Title: Danger Signal Semantic Auto- Transmission System and Transmission Method
Inventor: Jang-Mook Kang, Sung-Kwang Jo, and You-Jin Song
Registration number: 1011462900000
Registration date: 2012.05.08
IPC : G08B 25/10 | G08B 25/08
Main Feature Image:
24. [22]
Title: METHOD AND SYSTEM FOR PROVIDING SOCIAL NETWORK ONLINE
EDUCATION SERVICE WITH LOCATION INFORMATION OF MOBILE
TERMINAL
Inventor: Jang-Mook Kang
Registration number: 1011351990000
Registration date: 2012.04.03
IPC : G06Q 50/20(2006.01) H04W 4/02(2009.01)
Main Feature Image:
25. [23]
Title: THE APPARATUS AND METHOD OF TRAFFIC CONTROL BY USE A
SMARTPHONE
Inventor: Jang-Mook Kang, Jae-Sang Cha, Sun-Hee Lee, and Sung-Jin Chi
Registration number: 1011344430000
Registration date: 2012.04.02.
IPC : H04W 4/02 | H04W 64/00
Main Feature Image:
26. [24]
Title: Cemetery Management Service Method
Inventor: Jang-Mook Kang, Jo-Sung Kwang, and You-Jin Song
Registration number: 1011330040000
Registration date: 2012.03.28
IPC : G06Q 50/10(2013.01)
Main Feature Image:
27. [25]
Title: THE APPARATUS AND METHOD OF CROSS MEDIA CONTENTS IN
ADVERTISEMENT LOCAL ZONE
Inventor: Jang-Mook Kang
Registration number: 1011060570000
Registration date: 2012.01.09
IPC : G06Q 30/02C0(2013.01)
Main Feature Image:
28. [26]
Title: Semantic web-search system based on personal life logging information using mobile
device
Inventor: Jang-Mook Kang, Sung-Kwang Jo, and You-Jin Song
Registration number: 1010907710000
Registration date: 2011.12.01.
IPC : G06F 17/30 | G06F 15/16
Main Feature Image:
29. [27]
Title: Kiosk management system for local information
Inventor: Jang-Mook Kang, Jo-Sung Kwang, and You-Jin Song
Registration number: 1010901320000
Registration date: 2011.11.30
IPC : G06Q 30/06A0(2006.01) G06Q 10/02(2006.01) G06Q 50/10B0(2006.01)
Main Feature Image:
30. [28]
Title: Visiting Cemetery Management System and Method Using Mobile Device
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1010796630000
Registration date: 2011.10.28
IPC : G06Q 50/10(2013.01) G06K 9/18(2013.01)
Main Feature Image:
31. [29]
Title: THE APPARATUS AND METHOD OF COLLABORATIVE CONTENTS WITH
POSITION OF SMART PHONE
Inventor: Jang-Mook Kang
Registration number: 1010698340000
Registration date: 2011.09.27
IPC : G06Q 50/00D3
Main Feature Image:
32. [30]
Title: System and Method for Emotional Information Service
Inventor: Jang-Mook Kang, and Chang-Hun Lee
Registration number: 1010456590000
Registration date: 2011.06.24
IPC : G06Q50/10A0 | G06Q
Main Feature Image:
33. [31]
Title: PERSONAL INFORMATION PROTECTION APPARATUS AND METHOD FOR
MANAGING DISTRIBUTION CHANNEL OF PERSONAL INFORMATION
EFFICIENTLY AND SAFELY
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1010334750000
Registration date: 2011.04.29.
IPC : G06F 21/00 | G06F 21/24
Main Feature Image:
34. [32]
METHOD AND SYSTEM FOR PROVIDING INFORMATION ABOUT PRIVACY
TRUST ZONE,
Inventor: Jang-Mook Kang
Registration number: 1010265000000
Registration date: 2011.03.25
Int. CI. : G06Q 50/10B0(2006.01) H04N 7/18(2006.01) G06F 11/00(2006.01)
Main Feature Image:
35. [33]
Title: Apparatus and method of generate the music note for user created music contents,
Inventor: Jang-Mook Kang, and Bong-Chul Kak
Registration number: 1010205570000 (20110302)
Registration date: 2011.03.02.
IPC: G06F 3/16.
Main Feature Image:
36. [34]
Title: System and method for providing contents creator with remuneration
Inventor: Jang-Mook Kang, and Chang-Hun Lee
Registration number: 1010121620000
Registration date: 2011.01.25
IPC : G06Q50/30D0 | G06Q
Main Feature Image:
37. [35]
Title: THE APPARATUS AND METHOD OF SUPERVISORY CONTROL AND DATA
ACQUISITION
Inventor: Jin-Tae Kim, Jae-Kwon Shin, Jang-Mook Kang, Jung-Nam Bae, and Kyung-Gun
Lee,
Registration number: 1010109090000
Registration date: 2011.01.19
IPC : G06Q 50/10D0(2013.01)
Main Feature Image:
38. [36]
Title: Method and device for providing information based on location of target person about
information
Inventor: Hee-Jung Cho, and Jang-Mook Kang
Registration number: 1010094640000
Registration date: 2011.01.12.
IPC : H04W 4/02
Main Feature Image:
39. [37]
Title: Method and device for measuring propagation of contents and site of offering the
contents
Inventor: Hee-Jung Cho, and Jang-Mook Kang
Registration number: 1010049990000
Registration date: 2010.12.23.
IPC : G06Q50/10A0
Main Feature Image:
40. [38]
Title: Statistics method for setting bookmark and device
Inventor: Hee-Jung Cho, and Jang-Mook Kang
Registration number: 1009819400000
Registration date: 2010.09.10.
IPC : G06Q 50/10A0
Main Feature Image:
41. [39]
Title: SYSTEM FOR POI VISIT INFORMATION PROVISION OF PREVIOUS VISITOR
Inventor: Jang-Mook Kang, and You-Jin Song
Registration number: 1013885310000
Registration date: 20140417
IPC : G06Q 50/30
Main Feature Image:
42. -Highlight-
30번과 34번 특허는 아래 그림과 같이 프로젝트 수주 전에 출원하여 프로젝트
공모 심사에서 가산점 등 프로젝트 수주에 기여하였음.
이후 본 특허를 바탕으로 해당 프로젝트를 진행함.
프로젝트 수주액은 3억 6천 2백 8십만원임
[34]
Title: System and method for providing contents creator with remuneration
Inventor: Jang-Mook Kang, and Chang-Hun Lee
Registration number: 1010121620000
Registration date: 2011.01.25
[30]
Title: System and Method for Emotional Information Service
Inventor: Jang-Mook Kang, and Chang-Hun Lee
Registration number: 1010456590000
Registration date: 2011.06.24
(그림) 위 특허 출원 후, 그 사상을 바탕으로 제안에 참여하여 프로젝트 수주 및
수행 성공
43. -Highlight-
다음 특허는 해외 특허 괴물로부터 국내 특허를 보호하기 위해 특허를 매입하는
프로젝트를 공모, 그 결과로 핵심 기술을 인텔렉추얼디스커버리 주식회사에
판매한 사례임
(그림) 특허 매입 사례 ( 참조;
http://kpat.kipris.or.kr/kpat/searchLogina.do?next=MainSearch&checkPot=Y
-Highlight-
이 외에도 ETRI 프로젝트 수행 후 참여 기업 등에 해당 기술 이전 사례 다수