6월14일 COEX에서 열린 정보처리학회의 IT 21 Conference에서 발표한 내용입니다.
스마트 기기의 확산과 함께 웹 기술의 진화는 빠르게 이루어지고 있다. 오늘날 웹 기술은 HTML5와 단말 API 등을 통해 단말의 HW을 제어하고 비동기적으로 원격 데이터베이스를 연동하며 다양한 응용 로직을 처리할 뿐아니라 웹 운영체제(OS)로까지 진화하고 있다. 그러나 웹 기술을 활용한 응용과 서비스가 많아짐에 따라 시스템의 복잡도가 높아지고 새로운 사용자 인터페이스에 대한 요구들도 높아지고 있다. 더불어 PC뿐 아니라 모바일, TV 등 다양한 단말 환경에서 웹 응용이 활용됨에 따라 단말과 플랫폼에 상관없이 보편적 서비스 환경으로 웹 UI/UX에 대한 관심들이 높아지고 있다. 이에 본 발표에서는 이처럼 변화되는 서비스 환경을 중심으로 보다 나은 웹 사용성을 제공하기 위해 진행되고 있는 다양한 모바일/멀티디바이스 웹 UI/UX 관련 이슈 및 기술 표준 동향에 대해 살피고, 향후 웹 사용자 편의와 사용자 경험 개선 극대화를 위해 나아갈 방향들에 대해 고찰해보고자 한다
웹 UI/UX에 관심 있는 분들은 참고해보시길 바랍니다.
The comprehensive guide for optimizing the performance of mobile HTML5 Web ap...Sang Seok Lim
The deck includes a set of techniques and knowledge that can be used when you try to optimize the performance HTML5 app, mobile Web site, JavaScript application running on top of a browser or WebView
6월14일 COEX에서 열린 정보처리학회의 IT 21 Conference에서 발표한 내용입니다.
스마트 기기의 확산과 함께 웹 기술의 진화는 빠르게 이루어지고 있다. 오늘날 웹 기술은 HTML5와 단말 API 등을 통해 단말의 HW을 제어하고 비동기적으로 원격 데이터베이스를 연동하며 다양한 응용 로직을 처리할 뿐아니라 웹 운영체제(OS)로까지 진화하고 있다. 그러나 웹 기술을 활용한 응용과 서비스가 많아짐에 따라 시스템의 복잡도가 높아지고 새로운 사용자 인터페이스에 대한 요구들도 높아지고 있다. 더불어 PC뿐 아니라 모바일, TV 등 다양한 단말 환경에서 웹 응용이 활용됨에 따라 단말과 플랫폼에 상관없이 보편적 서비스 환경으로 웹 UI/UX에 대한 관심들이 높아지고 있다. 이에 본 발표에서는 이처럼 변화되는 서비스 환경을 중심으로 보다 나은 웹 사용성을 제공하기 위해 진행되고 있는 다양한 모바일/멀티디바이스 웹 UI/UX 관련 이슈 및 기술 표준 동향에 대해 살피고, 향후 웹 사용자 편의와 사용자 경험 개선 극대화를 위해 나아갈 방향들에 대해 고찰해보고자 한다
웹 UI/UX에 관심 있는 분들은 참고해보시길 바랍니다.
The comprehensive guide for optimizing the performance of mobile HTML5 Web ap...Sang Seok Lim
The deck includes a set of techniques and knowledge that can be used when you try to optimize the performance HTML5 app, mobile Web site, JavaScript application running on top of a browser or WebView
<p>
[데브멘토 동영상] 모바일 웹/앱 기획 및 실무적용을 위한UX 가이드3부</p>
<p>
김의준 유비즈밸리 부장</p>
<p>
LCD 크기와 관계 없이 최적으로 노출될 수 있는 화면 구성</p>
<p>
터치를 고려한 레이아웃</p>
<p>
기획자 고려사항</p>
<p>
Pivot을 고려한 디자인 방법</p>
<p>
CSS로 표현할 수 있는UI</p>
2016년 12월에 진행되었던 W3C HTML5 Conference 2016의 오후 트렉 (웹프레임워크)의 발표 자료입니다.
캔고루 개발팀장이신 김응주님께서 ‘IONIC으로 하이브리드 앱 개발하기, 사례와 시사점’이라는 주제로 발표를 진행하였습니다. . IONIC에 대한 전반적인 소개뿐 아니라 실제 개발하면서 경험한 다양한 시사점도 공유하였습니다.
We provide Business Success and Best Performance to the customers with our
“The Good Company “ which involves Initiative, expertise and passionate developers based on
Open-source SW & Cloud Technology such as Big Data (BI), Cloud(PaaS), Mobile, Web & CMS, UX
2017 스마트창작터 시장검증계획서
음성인식 기반의 지역 캐릭터 시스템
흄 대표 이정헌 작성
음성으로 사용자가 원하는 서비스를 찾아서 실행시켜 준다.
SMS 및 카카오톡으로 인공지능 대답 및 채팅이 가능한 서비스로 확장.
사용자가 질문하는 내용으로부터 사용자 요구사항 통계 및 빅 데이터 도구 제공.
채팅에 제한하지 아니하고, 버스노선, 기차시간, 지역 날씨, 쇼핑몰 옷까지 다양한 분야에서 음성과 채팅으로 서비스를 확장해 나가는데 자연스럽다.
REST (REpresentational State Transfer) is a web service architecture that uses HTTP requests to GET, POST, PUT, PATCH, and DELETE data in a stateless manner. It focuses on resources instead of remote procedures. REST examples show making GET requests to retrieve XML data from a URI and using RESTful principles like addressability, connectedness, statelessness, and a homogeneous interface with standard HTTP methods.
This document discusses media server options for Ubuntu, including iTunes Media Server which uses Digital Audio Access Protocol (DAAP) and the mt-daap and FirePlay clients. It also mentions the Media Player Daemon (MPD) as an alternative media server that includes an MPD server and clients that can control streaming.
This document discusses implementing a file upload feature using open source technologies. It describes using HTML forms to upload files and a PHP script to handle the upload. It then recommends using the open source Plupload library to add multiple file selection, client-side validation, and progress bars. The Plupload library allows uploading files to a PHP script which can then store the files in a database.
This document discusses computer security and threats. It covers authentication through passwords, program threats like trojan horses and trap doors, system threats such as worms and viruses. It also discusses threat monitoring through audit logs and scans, and encryption techniques like public-key encryption. The goal is to protect systems from unauthorized access, malicious modification, and accidental inconsistencies.
This document provides an overview of the Linux operating system, including its history, design principles, and key components. It began in 1991 as a small kernel developed by Linus Torvalds and has grown through collaboration over the Internet. The core Linux kernel is original but can run existing UNIX software. Major versions have added support for new hardware, file systems, networking, and multiprocessing. Key components include the Linux kernel, system libraries, and system utilities. The kernel uses loadable modules and supports process management and scheduling.
This document discusses protection in operating systems. It covers the goals of protection, domains of protection, access matrices, implementation of access matrices, revocation of access rights, capability-based systems, and language-based protection. The key aspects are that protection ensures each object is only accessed by allowed processes, domains define access rights to objects, access matrices represent access permissions, and capabilities and access control lists are approaches to implementing and revoking access rights.
The document provides an overview of the Unix operating system, including its history, design principles, interfaces, and key components. It was originally developed in 1969 at Bell Labs and incorporated features from Multics. The C programming language was developed to support Unix. Key aspects include its process management, memory management using paging and swapping, file system storing files in blocks and fragments, and user interface through command line shells.
This document summarizes key aspects of distributed file systems (DFS), including their structure, naming and transparency, remote file access using caching, stateful versus stateless service models, file replication, and examples like the Sun Network File System (NFS). A DFS manages dispersed storage across a network, using caching to improve performance of remote file access and dealing with issues of consistency between cached and server copies. NFS provides a specific implementation of a DFS that integrates remote directories transparently and uses stateless remote procedure calls along with caching for efficiency.
This document discusses network structures and communication. It describes different types of network topologies including fully connected, partially connected, tree-structured, star, ring, and bus networks. It also describes different network types like local area networks (LANs) and wide area networks (WANs). Additionally, it discusses important aspects of network communication like naming and addressing, routing strategies, connection strategies, contention, and design strategies using a layered approach.
This document discusses secondary storage devices used by operating systems, including disk structure, disk scheduling algorithms, disk management, swap space management, and tertiary storage devices. It provides details on disk addressing, mapping, scheduling algorithms like FCFS, SSTF, SCAN and C-SCAN. It also summarizes disk reliability techniques, stable storage implementation, removable media like floppy disks, tapes, optical disks and their applications. Hierarchical storage management and performance factors like speed, reliability and cost of different storage devices are also overviewed.
This document discusses various techniques for distributed coordination including event ordering, mutual exclusion, atomicity, concurrency control, deadlock handling, election algorithms, and reaching agreement. It provides details on implementing happened-before relations for event ordering, centralized and distributed approaches for mutual exclusion, using two-phase commit for atomicity, locking protocols and timestamp ordering for concurrency control, deadlock prevention and detection methods, and election algorithms for determining where to restart a coordinator process.
This document discusses input/output (I/O) systems. It describes I/O hardware, including devices, ports, buses and controllers. It explains how I/O requests are handled using techniques like polling, interrupts and direct memory access. It also discusses the role of the operating system kernel in managing I/O through subsystems that interface with applications, transform requests, handle buffers and errors. The performance of I/O systems is also covered.
This document discusses key aspects of file systems including file concepts, directory structures, access methods, allocation methods, and file system performance and recovery. It covers topics such as file attributes, operations, types, structures, tree-structured and graph-based directories, protection methods, free space management, efficiency techniques, and consistency checking. The goal is to provide an overview of file system interfaces and how different components are organized and managed.
Virtual memory allows a program's logical address space to be larger than physical memory by swapping pages in and out of memory as needed. Demand paging brings pages into memory only when they are referenced. When a page is not in memory and is referenced, a page fault occurs which causes the OS to locate a free frame, swap in the page, and update tables. Page replacement algorithms like FIFO and LRU are used to determine which page to swap out when there is no free frame. Thrashing can occur if working set size is larger than physical memory.
Windows NT is a 32-bit preemptive multitasking operating system that uses a microkernel architecture. It has several key goals including portability, security, POSIX compliance, extensibility, and compatibility with MS-DOS and Windows applications. The document discusses Windows NT's history, design principles, system components including the kernel, executive subsystems, virtual memory manager, process manager, file system, and networking. It provides details on how Windows NT achieves reliability, performance, and international support through its layered architecture and object-oriented design.
This document discusses various memory management techniques including paging, segmentation, and swapping. Paging divides memory into fixed-size blocks called frames and logical memory into blocks called pages. It uses a page table to map logical to physical addresses. Segmentation divides programs into segments and uses segment tables to map logical segments to physical frames. Swapping temporarily moves processes out of memory to disk to allow other processes to run.
2. 강사 소개
김종명
지앤비교육 스마트개발팀장, 부설연구소 소장(겸)
팀 프로젝트 : 영어교육용 음성인식 학습 앱
단어 학습 앱
소셜 그룹 앱 개발
개발 스킬 : C / C++ / VC / ActiveX / VB / C# / gcc
Java / ObjectC / Swift / Director
PHP / ASP / Javascript / CSS / XML
Oracle / MS Access / MS SQL / MySQL
Jquery / Ajax / Bootstrap / Wordpress / REST
Linux / Unity 3D / Hadoop
관심 분야 : Service Planning, UX Planning, Web Design
Social Network Maketing, Service Analytics
Issue Tracking, Growth Hacking
3. Web Project
주제 선정 자료 수집
디자인
퍼블리싱 프로그래밍 브라우저 테스팅
요구분석 / 타겟 선정
스토리보드
웹 기획
18. 서비스 구축 철학
어떤 가치를 전달할 것인가?
무엇을 만들 것인가?
무엇으로 만들 것인가?
어떻게 만들 것인가?
문제 / 핵심 가치 정립 / 시장 조사
해결책 제시 / 제품 기획 / 유저 분석
툴 언어 선정 / 적정 기술 / B2B / Open Source
팀빌딩, 개발방법론, 비용 문제