Loading

ICT ์‚ฌ์—…์†Œ๊ฐœ

ICT

Information and Communications Technologies
๊ธฐ์—…์ด ํ•„์š”๋กœ ํ•˜๋Š” ์‹œ์Šคํ…œ์— ๊ด€ํ•œ ๊ธฐํš, ๊ฐœ๋ฐœ, ๊ตฌ์ถ•๊ณผ ์šด์˜๊นŒ์ง€ ๊ณ ๊ฐ์˜ ํ™˜๊ฒฝ์— ์ ํ•ฉํ•œ ํ† ํƒˆ ์ง€์› ์„œ๋น„์Šค๋กœ ํšจ์œจ์  ์šด์˜๊ณผ ๊ฐ€์šฉ์„ฑ์„ ๋ณด์žฅํ•ด๋“œ๋ฆฝ๋‹ˆ๋‹ค.
ict_hpc

HPC

High Performance Computing
๋‹จ์ผ ์ปดํ“จํŒ… ํ™˜๊ฒฝ์œผ๋กœ ์ฒ˜๋ฆฌํ•˜๊ธฐ ์–ด๋ ค์šด ์˜์—ญ์— HPC ๋ถ„์•ผ๋Š” ๋ฌด๊ถํ•œ ๊ฐ€๋Šฅ์„ฑ์„ ์—ด์–ด์ค๋‹ˆ๋‹ค. ํŠนํžˆ ์ตœ๊ทผ ๊ฐ๊ด‘๋ฐ›๋Š” ๋”ฅ๋Ÿฌ๋‹(Deep Learning)์œผ๋กœ ์ผ์ปฌ์–ด์ง€๋Š” ์ธ๊ณต ์‹ ๊ฒฝ๋ง์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ ๋จธ์‹ ๋Ÿฌ๋‹ ๋ถ„์•ผ์—์„œ๋Š” ์ธ๊ฐ„์˜ ๋‘๋‡Œ๋ฅผ ์ปดํ“จํ„ฐ๊ฐ€ ๋ชจ๋ฐฉํ•˜์—ฌ ์Šค์Šค๋กœ ํ•™์Šตํ•˜์—ฌ ํŒ๋‹จํ•˜๋Š” ๋ถ„์•ผ๋กœ, ์ž์œจ ์ฃผํ–‰์ฐจ, ์‹ค์‹œ๊ฐ„ ๊ธˆ์œต์‚ฌ๊ธฐ ๋ฐฉ์ง€ ๋ฐ ์‹ ์•ฝ ๊ฐœ๋ฐœ๊ณผ ๊ฐ™์€ ์ƒˆ๋กœ์šด ์‚ฐ์—…์˜ ํ•ต์‹ฌ์œผ๋กœ ๋– ์˜ค๋ฅด๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.
ํšจ์œจ์„ฑ์„ ๊ทน๋Œ€ํ™”ํ•œ ํ•˜๋“œ์›จ์–ด์˜ ๊ณต๊ธ‰ ๋ฐ ๊ตฌ์ถ•
  • ML(Machine Learning)/DL(Deep Learning)์— ์ตœ์ ํ™”๋œ HPC ํ•˜๋“œ์›จ์–ด์˜ ๊ณต๊ธ‰ ๋ฐ ๊ตฌ์ถ•
  • ํ•˜๋“œ์›จ์–ด ๊ฐ„ ์—ฐ๊ฒฐ ๋ฐ ์ตœ์ ์˜ ๊ณ ์† ์ €์žฅ ์†”๋ฃจ์…˜ ์ œ๊ณต
OS ๋ฐ ์ฝ”๋“œ ๋ ˆ๋ฒจ์˜ HPC ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ตœ์ ํ™”
  • ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ตฌ์„ฑ ๋ฌธ์ œ์— ๋Œ€ํ•œ ๋ณ‘๋ชฉ ํ˜„์ƒ ์ง„๋‹จ
  • ํ•˜๋“œ์›จ์–ด ์•„ํ‚คํ…์ฒ˜์— ๋งž์ถฐ HPC ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ฝ”๋“œ์˜ ์ตœ์ ํ™”
ํ™˜๊ฒฝ์— ์ ํ•ฉํ•œ HPC ํ™˜๊ฒฝ์˜ ์„ค๊ณ„ ๋ฐ ์ปจ์„คํŒ…
  • ์—ฐ๊ตฌ์šฉ / ์‚ฌ์—…์šฉ ๋“ฑ HPC ํ™˜๊ฒฝ์— ์ ํ•ฉํ•œ ์•„ํ‚คํ…์ฒ˜์˜ ์„ค๊ณ„ ๋ฐ ์ปจ์„คํŒ…
  • HPC ๊ฐ ์ปดํฌ๋„ŒํŠธ ๊ฐ„ ์ตœ์  ์„ฑ๋Šฅ์„ ๋ณด์žฅํ•˜๋Š” ์—ฐ๊ฒฐ์„ ๋ณด์žฅํ•˜๋Š” ๋ฐฉ์•ˆ์˜ ์ œ์‹œ
์šด์˜ ๋ฐ ๊ฐœ๋ฐœ ๊ต์œก
  • HPC ์‹œ์Šคํ…œ ์šด์˜์ž๋ฅผ ์œ„ํ•œ ๊ต์œก
  • HPC ์‚ฌ์šฉ์ž๋ฅผ ์œ„ํ•œ ๋„๊ตฌ์˜ ์‚ฌ์šฉ ๋ฐ ๊ฐœ๋ฐœ์ž๋ฅผ ์œ„ํ•œ ์ฝ”๋“œ ์ตœ์ ํ™” ๊ต์œก

CLOUD

Cloud Computing
ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์€ ์‚ฌ์šฉ์ž๊ฐ€ ํ•„์š”ํ•œ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ์ธํ„ฐ๋„ท์„ ํ†ตํ•ด ์–ธ์ œ ์–ด๋””์„œ๋“  ์‚ฌ์šฉ ํ•  ์ˆ˜ ์žˆ๊ณ  ๋ฉ€ํ‹ฐ๋ฏธ๋””์–ด ๋””๋ฐ”์ด์Šค๋ฅผ ํ†ตํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ์‰ฝ๊ฒŒ ๊ณต์œ  ํ•  ์ˆ˜ ์žˆ๋Š” ์‚ฌ์šฉ ํ™˜๊ฒฝ ๋ฐ ์„œ๋น„์Šค์ž…๋‹ˆ๋‹ค.
๋น„์šฉ ํšจ์œจ์„ฑ
  • Infra ๊ตฌ์ถ•์— ๋“ค์–ด๊ฐ€๋Š” ์‹œ๊ฐ„์„ ๋‹จ์ถ• ํ•˜์—ฌ ๋น ๋ฅธ Go to Market ์‹คํ˜„
  • ์‚ฌ์šฉ๋Ÿ‰์— ๋”ฐ๋ฅธ ๊ณผ๊ธˆ ๋ฐฉ์‹์œผ๋กœ ์ดˆ๊ธฐ ํˆฌ์ž๊ธˆ์•ก์˜ ๋ถ€๋‹ด์„ ์ค„์ž„
  • ์‚ฌ์šฉ์ž ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ๋น ๋ฅธ Infra ํ™•์žฅ์ด ๊ฐ€๋Šฅํ•จ
๋ณด์•ˆ
  • ๊ฐ์ข… ๋ณด์•ˆ ์œ„ํ˜‘์œผ๋กœ๋ถ€ํ„ฐ ์•ˆ์ „ํ•œ Global Level Security ์ ์šฉ
  • ์ „๋ฌธ IT ์ธ๋ ฅ์˜ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ IT ์žฅ์• ์ฒ˜๋ฆฌ ์ธ๋ ฅ
  • 1๋…„ 365์ผ ์•ˆ์ •์ ์ธ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์ œ๊ณต
๊ด€๋ฆฌ
  • Biz Needs ์— ๋”ฐ๋ฅธ ๋น ๋ฅธ ์ธํ”„๋ผ ๋ฐ ์„œ๋น„์Šค์˜ ํ™•์žฅ๊ณผ ์ถ•์†Œ ์‹คํ˜„
  • ์ตœ์ ํ™”๋œ ์ž์›ํ• ๋‹น , OS๊ด€๋ฆฌ , ํ”„๋กœ์„ธ์Šค ๋ฐ ๋น ๋ฅธ ๋ฐฑ์—…๊ณผ ๋ณต๊ตฌ ์ง€์›
  • ์ดˆ๊ธฐ ์„ค์ •๊ณผ Migration ์ง€์›์„ ํ†ตํ•ด ๋น ๋ฅด๊ณ  ์‰ฝ๊ฒŒ ํด๋ผ์šฐ๋“œ๋กœ ๋ณ€ํ™˜
Public Cloud / Private Cloud
  • ๋ฉ€ํ‹ฐ ํ…Œ๋„ŒํŠธ ํ™˜๊ฒฝ์— ์ ํ•ฉํ•œ ์ž‘์—…์— ๋Œ€ํ•ด์„œ Public Cloud ์ œ๊ณต
  • ๊ฐ€์ƒ์„œ๋ฒ„๊ฐ€ ๊ณ ๊ฐ ์ „์šฉ์˜ ํ˜ธ์ŠคํŠธ ์„œ๋ฒ„์— ๋ฐฐํฌ๋˜๋ฏ€๋กœ ์šฉ๋Ÿ‰์˜ ์ฆ๊ฐ€๊ฐ€ ํ•„์š”ํ•  ๊ฒฝ์šฐ ๊ฐ ๋…ธ๋“œ์˜ ๋ชจ๋“  ํ•˜๋“œ์›จ์–ด ์ž์›์„ ํ™œ์šฉ๊ฐ€๋Šฅ. ๋น ๋ฅธ ์„ฑ๋Šฅ๊ณผ ๋ณด๋‹ค ๊ฐ•ํ™”๋œ ๋ณด์•ˆ ๋ฐ ๋ฐ์ดํ„ฐ ๋ฌด๊ฒฐ์„ฑ์„ ์ œ๊ณต
ict_cloud
ict_ai

AI

Artificial Intelligence
ยท IBM Watson ๊ธฐ๋ฐ˜์˜ ์ธ์ง€(Cognitive) ์ปดํ“จํŒ…, ๋”ฅ๋Ÿฌ๋‹(Deep Learning) ๊ธฐ์ˆ  ๋“ฑ์„ ์ ์šฉํ•˜๊ธฐ ์œ„ํ•œ ์ปจ์„คํŒ…
ยท IBM Watson API๋ฅผ ํ™œ์šฉํ•œ ์†”๋ฃจ์…˜ ๊ฐœ๋ฐœ
ยท ์˜๋ฃŒ ๋ถ„์•ผ, ์ œ์กฐ ๋ถ„์•ผ ๋“ฑ์— ํŠนํ™”๋œ ์ธ๊ณต์ง€๋Šฅ ์†”๋ฃจ์…˜ ๊ตฌ์ถ•
AI ์ปจ์„คํŒ…
  • 4์ฐจ์‚ฐ์—…ํ˜๋ช…์‹œ๋Œ€๋ฅผ ์„ ๋„ํ•˜๊ธฐ ์œ„ํ•ด ๊ณ ๊ฐ์ด ํ˜„์žฌ ํ˜น์€ ๋ฏธ๋ž˜์— ์ค€๋น„ํ•ด์•ผ ํ•  ์ธ์ง€(Cognitive) ์ปดํ“จํŒ…, ๋”ฅ๋Ÿฌ๋‹(Deep Learning) ๋“ฑ์˜ ์ธ๊ณต์ง€๋Šฅ(AI) ๊ธฐ์ˆ ์„ ๊ณ ๊ฐ์ด ์‹ค์ œ๋กœ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ์ปจ์„คํŒ…์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
AI ์†”๋ฃจ์…˜ ๊ฐœ๋ฐœ
  • IBM Watson API, IBM WEX(Watson Explorer), IBM ๋ธ”๋ฃจ๋ฏน์Šค(Bluemix) ๋“ฑ์„ ํ™œ์šฉํ•˜์—ฌ ๊ณ ๊ฐ์ด ํ•„์š”๋กœ ํ•˜๋Š” ๋‹ค์–‘ํ•œ ๋ชฉ์ ๊ณผ ํ˜•ํƒœ์˜ ์†”๋ฃจ์…˜์„ ๊ฐœ๋ฐœํ•ฉ๋‹ˆ๋‹ค.
AI ๊ตฌ์ถ•
  • IBM Watson ๊ธฐ๋ฐ˜์˜ ์ธ๊ณต์ง€๋Šฅ ๊ธฐ์ˆ ์„ ์ด์šฉํ•˜์—ฌ ์˜๋ฃŒ ๋ถ„์•ผ, ์ œ์กฐ ๋ถ„์•ผ ๋“ฑ์— ํŠนํ™”๋œ ์ธ๊ณต์ง€๋Šฅ ์†”๋ฃจ์…˜์„ ์˜จํ”„๋ ˆ๋ฏธ์Šค(on-premise), ํ˜น์€ PaaS ํด๋ผ์šฐ๋“œ ๋“ฑ ๊ณ ๊ฐ์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ ํ˜•ํƒœ๋กœ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

Security

Security
๋ณด์•ˆ์˜ ์œ„ํ˜‘์ด ์ ์ฐจ ๊ณ ๋„ํ™” / ์ง€๋Šฅํ™” ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ์‚ฌ์ด๋ฒ„ ์นจํ•ด์™€ ์ค‘์š” ์ž๋ฃŒ ์œ ์ถœ ๋ฐ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋“ฑ ๋ณด์•ˆ ์ด์Šˆ๋กœ ๋ถ€ํ„ฐ ๊ณ ๊ฐ์˜ Needs ๋งž๋Š” ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
Network Security
  • Next generation F/W( IPS, URL filtering, APT, VPN etc.
  • Network Access Control
  • N-DLP(Network Data Loss Prevention
  • WIPS(Wireless Intrusion Prevention System
  • NMS(Network Management System)
System &ย Endpoint Security
  • SMS(System Management System)
  • Database Security Solution
  • DLP(Data Loss Prevention)
  • EDMS & ECM
  • DRM(Document Right Management)
Others Security
  • ESM(Enterprise Security Management)
  • Cloud Computing Security
  • Penetration Testing
  • Security Consulting
ict_Security