Monday 28 January 2008

Steve Job's Presentation Tip

1. Set the theme.
2. Demonstrate enthusiasm.
3. Provide an outline.
4. Make numbers meaningful.
5. Try for an unforgettable moment.
6. Create visual slides.
7. Give 'em a show.
8. Don't sweat the small stuff.
9. Sell the benefit.
10. Rehearse, rehearse, rehearse.

Wednesday 23 January 2008

When to use Passive

1) When you don't know who did the action
2) when your readers don't care who did the action
3) when you don't want the readers to know who did the action
4) when the receiver of action is more important than the doer of the action
5) when you wish to be less confrontational

Goal with SMART

To make good plan, one should make good goal.
There are famous tool to make good goal.
SMART
Specific, Measurable, Attainable, Relevant, Time-Bound

Monday 21 January 2008

SOA

Biz View: a set of services that a business wants to expose to their customers and partners, or other portions of the organization
Architecture view: a set of architectural principles, patterns and criteria which address characteristics such as modularity, encapsulation, loose coupling, separation of concerns, reuse, composability and single implementation
Implementation View: a programming model complete with standards, tools and technologies such as Web Services
An SOA is composed of multiple layers. At the heart of the SOA is the Service Model that defines Services and Components that realize them

Service modeling – what we model
Layer 1 which is the bottom layer describes operational systems. This layer contains existing systems or applications including existing CRM and ERP packaged applications, legacy applications and “older” object-oriented system implementations as well as business intelligence applications. The composite layered architecture of an SOA can leverage existing systems, integrate them using service-oriented integration.
Layer 2 is the component layer which used container–based technologies and designs used in typical component-based development.
Layer 3 provides for the mechanism to take enterprise scale components, business unit specific components and in some cases project specific components and provides services through their interfaces. The interfaces get exported out as service descriptions in this layer, where services exist in isolation or as composite services.
Level 4 is an evolution of service composition into flows or choreographies of services bundled into a flow to act as an application. These applications support specific use-cases and business processes. Here, visual flow composition tools such as WebSphere WBI-Modeler can be used for design of application flow.
Layer 5, the presentation layer is usually out of scope for an SOA. However, it is depicted because some recent standards such as Web Services for remote Portlets version 2.0 may indeed leverage Web Services at the application interface or presentation level. It is also important to note that SOA decouples the user interface from the components.
Layer 6 enables the integration of services through the introduction of a reliable and intelligent routing, protocol mediation, and other transformation mechanisms often described as the Enterprise Service Bus .
Layer7 ensures quality of service through sense-and–respond mechanisms and tools that monitor the health of SOA applications, including the all important standards implementations of WS-Management.

Wednesday 16 January 2008

Human Computation and Louis von Ahn

http://video.google.com/videoplay?docid=-8246463980976635143&q=luis+von+ahn&pr=goog-sl

Luis von Ahn, he is a really, really, really genius!!!
I studied MPEG1,2 4 and MPEG7 10 years ago.
But still how to abstract specific objects from image and how to describe the relevant objects are open problem in image processing area.
But he solved this by "human computation" concept.

His main idea is like this;
let people compute for opem problem which computer cannot solved yet.
But use the people with fun and for free!
He is one of the Cooooooolest guy , a professor of CMU , as I ever met.....
(I'm going to have his class in this semester!!!!)

His PhD thesis was CAPTCHA (A program that can tell whether it suers is a human or a computer) in 2005.
a program that can generate and grade test that:
A.most humans can pass
B.current computer programs cannot pass

The official CAPTCHA site : http://www.captcha.net/
http://recaptcha.net/
Human Computation : http://www.cs.cmu.edu/~biglou/research.html
Luis von Ahn:http://www.cs.cmu.edu/~biglou/

Tuesday 15 January 2008

Simplicity and Separation of Concern

"One of the most degenerative tendencies of the last forty years is the belief that if you are understandable, you are vulgar." by Peter Drucker

"Insecure managers create complexity. Frightened, nervous managers use think, convoluted planning books and busy slides filled with everything they've known since childhood. Real leaders don't need clutter. People mush have the self-confidence to be clear, precise, to be sure that every person in their organization - highest to lowest - understands what the business is trying to achieve. But it is not easy.You cannot believe how hard it is for people to be simple, how much they fear being simple. They worry that if they are simple, people will think they are simple minded. In reality, of course, it is just the reverse. Clear, tough-minded people are the most simple." by Jack Welch.

I 100% agreed about Jack Welch's last expression; "Clear minded people are the most simple".
Software architect is one of very hard occupation in the world, I think.
There are too many constraints in the company and technology and too many uncertainties in the business policy. However, software architect should make architectural decision and meet many different business objectives. And architectural decision should be reasonable, objective, and meet stake holder's totally different views; CEO wants numbers, CTO wants reliability, developers want codes, designers want lots of diagrams.....Although this complex and different perspectives, software architect make "simple" architectural decision. Simple architecture is the key for architectural decision. I paraded Yoda's saying in the movie "Star Wars", "May the force be with you."; My favorites :-) !!!

Monday 14 January 2008

Foundation Facility

JMS
Java Messaging service offers a unified wrapper over queuing mechanisms. The framework wraps the JMS implementation and provides methods for applications to use this service without knowledge of the underlying queuing mechanism or the JMS API. The JMS API offers a asynchronous send and receive mechanisms and also a synchronous send and receive mechanism for application clients. The synchronous implementation is a convenience implementation which calls the send and then the receive methods with an appropriate timeout. The mechanism uses the JMS correlation id to associate the request and the response. The framework also implements a wrapper over a JMS Topic thereby allowing an application to work in a publish subscribe mode.
Logging
This supports for reporting application events into persistent storage areas. Logging provides precise context about a run of the application. Once inserted into the code, the generation of logging output requires no human intervention. Second, log output can be saved in a persistent medium to be studied at a later time.
Rules
It provide flexibility to application design and development by externalizing dynamic business logic. As some areas of the business are more susceptible to change than others. It is important to therefore have a mechanism that allows an application to identify areas that are likely to change and externalize the logic contained within them. This changes should be managed is a such a manner that there is no to less development effort required. It uses code generator to generate rule classes. Rule classes run in the same address space as the application program. This enhances performance as rule classes run in the same address space and use the same thread of execution, they share the transaction database session context for data. This avoids reads from database for data that is already loaded. Rules can also be dynamically changed by integrating with dynamic class loader.
Dynamic class loading:
This facilitates deployment of business rules dynamically without stopping the application server. Rules as mentioned above are business logic that changes frequently and needs to be deployed on the application server without restarting the application server. Rules are deployed as jar files in the application server, any changes to the rules would negotiate a re-deployment of the jar files. Currently it is not recommended that the hot deployment option of the application server be used. This is because the application server vendors claim that it might cause potential synchronization problems with the deployed application and might cause deployed applications to be deleted or modified incorrectly.Custom class loader load classes directly from the disk. It scans a pre-defined area on the file system for changed files based on time stamp. Clients already in middle of a method call will continue to use the old class, while new clients will receive an object from the changed class. It checks for modified classes on configurable time based interval.
Configuration:
It supports for retrieving of application parameters defined in properties file. It synchronizes with the changes made to the application parameters while the application is running. This component uses caching and logging architectural mechanisms. Configuration allows for providing set of properties in a different properties file to
Helpers
The Framework offers various helper functions to facilitate the building of framework components. These components are expected to be re-used across various other sophisticated framework facilities or components.The following helpers are available as part of the framework. These facilities are implemented as helpers as any improvements to these facilities can be done in a central place benefiting all framework components that use them. For example, if there are changes to reflection helper to leverage performance enhancements to the next version of J2SE, then all components will benefit from the same. Similarly the XML Helper wraps the DOM implementation of Xerxes and provides an easy to use interface. The XML Helper includes some significant performance enhancements in the way commonly used XPath (/Customer/Name/) expressions are evaluated. It uses a custom mechanism for these kind of expressions instead of the much slower XPath API. XPath API is still supported for the complete XPath specification.
Error and Exception Mechanism:
This architectural mechanism handles application errors and loggs them as per standard strategy. Error handling supports for multi-lingual error messages for the same error codes. Two named exceptions viz FrameworkException and BusinessException are provided to be used to denote any application errors. Unique error code is assigned with each exception to identify the error.
Service locator
This is a deviation of the standard service locator pattern. It provides transparent object access to applications or other framework components. The service locator abstracts the service discovery process. This discovers a service based on a set of configuration parameters provided. This will then return an object of the service based on the parameter defined. The service locator handles the discovery of JNDI services apart from specific services like EJBs, JMS handles and POJOs. It caches JNDI resources to avoid lookups for each invocation.
Alert
This architectural service provides mechanism for sending alerts for an event. Events needs to be registered with alert service. Event handlers are implemented that handles the event. Support for alerting by SMS and Email is provided using SMS and Mail helper architectural components. Events have information as required by it’s event handler. Client provides those information in the Event and does not need to know about the recipients and mode of alerts. Event handler identifies the list of recipients and modes of sending alert. Alerts are sent asynchronously where client does not wait until alert is sent.
Reporting for batches
This architectural service is a wrapper over third party, OZ reporting, tool and provides option to plug-in another reporting tool in future without change in the client code. OLTP reports will continue in the same style as the existing KB system. Mainly this service is used by batch. Report service supports two modes of execution, synchronous and asynchronous. In asynchronous execution mode, the client request a report and then poll for the status based on the report task ID that was provided when requesting a report. In synchronous execution mode, the client waits for the completion of the report.
Mail
Mail component provides facility to send an email. Mail shields client from internals of sending email. Client is not required to know about the details on how to send mails. Mail component currently is used by Alert. Mail component currently inserts a record in a table owned by e-business team. E-business team finally reads records from the table and sends mail using their existing mail gateway.
SMS
SMS component provides facility to send a SMS. SMS shields client from internals of sending SMS. Client is not required to know about the details on how to send SMS. SMS component currently is used by Alert. SMS component currently inserts a record in a table owned by e-business team. E-business team finally reads records from the table and sends SMS using their existing SMS gateway.
Data Compression
Data compression implements a simplified API over the GZIP implementation. This mechanism can be used to compress data being transferred from the channel tier to the application tier or from the client to the channel tier. This mechanism can be used where-in the available bandwidth mandates a data compression mechanism. By implementing a standard compression algorithm, the data compression mechanism allows even third-party applications to compress data.
Charset Conversion
This supports for conversion from EBCDIC character set to ASCII character set and vice versa. Client code need not code for character conversion every time instead they can use this component.
FTP helper
FTP helper assists in listing and exchanging files between two servers. This uses the Apache commons FTP library, but makes modifications to the open-source library by providing support for the IBM mainframe file system. Files are exchanged using FTP protocol where host runs FTP service. This component consists of a convenience GUI which shows the progress of the files downloaded or uploaded. Client can get the listing of files on host system using this component. This component supports DBCS.
File Parser
This architectural mechanism provides a uniform approach for parsing of ASCII flat files. It supports position based and delimiter based file parsing. It returns the parsed file as a domain object thus freeing developer from file IO operations. Provision for returning domain objects after each record is parsed or in batch of records is provided so as to maximize memory utilisation as per the application need. It supports two models for parsing viz push and pull. Push model parse pre-configured number of records and send to the client as domain object. Pull model waits for client to request to parse the file sequentially in batches. Client receives an handle to lazy fetch which can be iterated through to generate next batch of records.
Bootstrap
This architectural component assist in initializing required services or components in application server before any client request can be serviced. It also helps in improving performance by ensuring globally required services are initialized and available when required rather than loading them at the time of request. In the channel tier, where there is a web container, a bootstrap Servlet is used. In the application server, which is not expected to host a web-container, this component uses the custom API provided by application server. Hence this component is coupled with application server and is currently available for use in IBM Websphere application server for the application tier.
Data Access Service
This architectural mechanism allows access to the persistent store. It is wrapper on Hibernate ORM that provides XML based mapping of objects to relational mapping. It uses IOC (inversion of control) to keep the connection handles encapsulated from a developer and internally uses a reference counting mechanism to finally close database connection. It throws named exceptions to flag application developers of exceptions that can be handled like no data found.
Batch-Shared OLTP
The framework includes a high performing batch framework. The batch framework will provide application developers a platform to assemble business components to be used in a batch mode. The batch framework provides abstract classes for batch application development. The batch framework uses JMS to stream batch jobs. The batch framework does not use custom threads, but rather uses JMS as the threading mechanism to achieve parallelism in a batch job. A batch job can be distributed across not just processes (JVMs) but across servers (or machines). This provides a lot of flexibility in distributing a job. A batch job can therefore be run on the same server as the OLTP or can be run on a different server. It is also possible to introduce new servers for just batch processing, thereby improving the scalability of the batch framework.
The framework provides an abstract batch data class, which can be extended to set the data for the batch process. The developer therefore needs to extend the class for the batch data. Once the data set has been coded for a particular batch process, then the application developer will need to map the batch data set with the input for the process component that needs to be used for the batch process. To actually execute the batch process, the application developer will need to register the batch process using the batch processing administration GUI provided.
PL/SQL Batch Process
The batch framework also provides a PL/SQL version of the batch framework. The PL/SQL version does not share the OLTP process components or the business common services, but provides a simple high performing batch framework in PL/SQL. PL/SQL offers a “near data processing” batch framework. This framework will provide a high batch throughput on a lower system configuration due to the inherent benefits of processing near the data. This framework will need source code duplication and will increase the maintenance effort of the application. Though this will increase the maintenance effort, this framework cannot be written off as it provides a very high batch throughput. For extremely time critical batch processing, this framework may need to be used. The actual usage of the same will depend on the specific requirements for the application.

Framework

Framework implements J2EE-based OLTP, batch, and foundation architecture as technical environment of J2EE development. it provides a development environment where application developers focus on the business process development.The framework components are split into 2 sections, the architectural mechanisms and the integration mechanisms. Architectural Mechanisms are framework infrastructure components. Integration mechanism are components which can be used for integrating systems

1) Channel Tier

This tier provides various protocol services for communication with Presentation. Converts different message formats to internal standard formats, check validity, and supports posting to hosts that provides actual business services. Features of the channel tier are as below:• Handles multiple request protocols • Comprehensive connectivity to a large variety of systems• Uses Asynchronous IO for TCP/IP • Configurable audit logging with pre and post formatted inputs and outputs• Plug-in support for validations• Re-use validations across transactions• Push data to a client via TCP/IP for long running transactions.

2) Biz Tier

Biz tier comprises of Service Orchestrator, Service Provider and Data abstraction components. Message router in channel tier forward the message to Service orchestrator.

a. Service Orchestrator

This sub component deals with invocation of appropriate service provider for the transaction being sent by message router. It comprises of message listener, transaction coordinator, service command, and process orchestrator.Message Listener is implemented as a message driven bean and provides mechanism for receiving transaction from message router in channel tier. Process orchestrator manages the invocation of one or more than one service commands to execute transaction. Services are invoked synchronously. Process orchestrator caches the work flow information from the repository.Service command converts XML message to the DTO java object as required by service provider which executes the transaction. Service command then invokes service provider using the DTO java object. Following figure shows the flow of transaction within Service orchestrator.

b. Service Provider

This component comprises of process component, EIS wrapper, referential component or domain component. Service provider manages the business processes for the transaction. Service provider communicates with the back end systems that provides the business functionality. Data required by host system is provided by service provider by formatting or generating data from the available data with transaction. Data is retrieved from database using referential component. EIS wrapper acts as a proxy for allowing back end services to be invoked by service provider.

c. System Integration Mechanisms

Component in the service provider communicate with multiple host system via system interface. System interface allows for a standard mechanism for clients to connect to host systems. The system interface consists of a basic interface which is used by clients to communicate with different back-end systems. An interface to a specific back-end system can be obtained via a System interface factory. The system interface factory will create an instance of the appropriate back-end system connector and return the interface for the same. The system interface handles this posting of the reversal, which is completely independent of any application developer intervention. In case the reversal transaction so posted fails, then the transaction is marked as pending reversal in a local log. The log is a database table. When a user initiates another transaction, the reversal transaction is attempted again. This auto reversal function assumes that the host system will return a success for a reversal transaction for which the original transaction does not exist. The auto reversal function will not handle any failures for the reversals sent.

3) J2EE Fundamental Facility

Fundamental facility provides sets of architectural services and architectural classes that can be used for building an application or framework.



Friday 11 January 2008

What level of education is required to understand my blog?

cash advance

How do they evaluate my blog?I tried to my other blog (written in Korean, but most of contents are open source framework including "Hibernate", "Spring" and other UML and Software architecture artifact) but they evaluate as "high school" (http://blog.naver.com/tooth2)I cannot understand what their criteria is...is it English only?

Thursday 10 January 2008

PAN technology overview

Sensors can be combined with WPAN(wireless personal area network) technology to access or communicate with Distributed Environment.

There are several WPAN technologies available; Bluetooth, UWB(Ultra-wide band), and Zigbee.
Bluetooth is nowadays well-known technology.
UWB technology is one of the wireless transmission technology, it can deliver digital data with lower power, more data using wide-spread spectrum in short range. Zigbee is also alternative , it has low complexity for design, low cost, the price is rather cheaper than Bluetooth low power consumption. However its data rate is low , maximum 250kbps,

RFID + WSN Application

What would be the future application for RFID and wireless sensor network technology?

Since the US government invested 19$ budget in 2004, several projects have been researched by military service and research institute.
WSN will be used in DoD, health Care, transportation, Industrial Automation, Retail Industry, manufacturing, retail/supply chain, environment , disaster prevention and home network as well.
DoD
If mote can be spread out in enemy's area using remote-controlled spy plane, the mote can make communication network and activate the sensors then it can detect vehicle and its route. There are many research project which are sponsored by military, Vanderbuilt college has researched about ‘Shooter Localization’ project for military purpose and Ohio Sate university has researched about ‘Line in the Sand’ project to figure out enemy’s movement based on vibration sensors and UCLA has developed ‘Power Aware Distributed Systems’ based on vibration and actuator sensors in enemy’s area.
Environment
- Using temperature, humidity, heat, location, vibration sensors, application can detect and control environment in real time and prevent and efficient response when the fire or collapse is occurred.
Disaster Prevention
- Application can decide and notify disaster based on sensing data analysis
Health care
- Application can detect and analyze patients health from bio sensors which can collect pulse, temperature and blood pressure of patient. Through this application, doctors can monitor, diagnose and prescribe the patient in distant when emergency occurs.
If temperature sensor and humidity sensors are attached to blood or anti-cancer medicines, this application can provide right temperature and humidity and raise down blood disposal ratio.
Transportation
- Using vibration, actuator, application can detect crash or traffic and control traffic congestion efficiently in real time.
Retail/Supply Chain
If WSN technology is combined with RFID, then RFID/WSN can be applied retail/supply chain management area very efficiently. RFID will be used in Identification/Access &Tracking, . sensor network can collect, analyze, transmit to monitor & control.
These applications will be commercialized soon according to sensor node manufacturing company such as SAIC (Science Application International Co.) , Dust Networks , Sensicast System

Smart Dust

One of the sensor node technology is Smart Dust, it can be utilized as tiny sensor node. Smart Dust technology was originally developed in the mid 1990’s at university research institutions, the University of California, Berkeley, for defense and intelligence applications. As the research world rallied around the concept of “Smart Dust” ,the first project was conducted by Kris Pister, a Professor at UC Berkeley and founder and CTO of Dust Networks, universities and research institutions worldwide started to take a closer look at the impact of ubiquitous sensing and control. Smart Dust (Silicon Mote) can collect , analyze data and transmit them to 30m range distance by wireless
SmartDust was designed in very small Silicon Mote and integrated with SoC and solar-cell technology in early days.

Intel Mote
One component of the sensor node is low-power CPU, this component has been developed by Intel, ARM, and Motorola. Intel developed motes which use micro processor based on ARM 32bit CPU , as following image shows Intel Mote . It has 64KB RAM, 512 KB memory and 12MHz CPU clock. RF Module is based on 2.4GHz Blue tooth which is developed by Zeevo, and its transmit ration is up to maximum 720kbps.

Problems and other approach
However, the sensor node technology has still outstanding issues such as sensor size , battery life cycle, cost for installation and data accuracy. To solve these issues many research and development project is still going on. By the Dust technologies, current sensor mote size is as small as 1cent, however, it can be recognized by eye, so it can easily exposed to enemy or general human beings who may regard it as “dust” and throw it away.
Second, limitation of battery life cycle can be an obstacle for the deployment. To extend battery’s life cycle there are several approaches has been researched and developed. In initial stage, it is proposed instead of battery, that solar cell is used. However, solar cell cannot minimized mote size and not efficient in energy transformation. Since then, instead on solar cell, acoustic noise and kinetic energy by vibration between the motes are replaced.
l Solar cell
l Energy source from human body (Temperature)
l Source from building(heat)
l Kinetic Energy (by Vibration, by Motion
l Acoustic Noise

Nowadays, other approach for better life cycle is researched by communication engineering area, which is to optimize sensor network To minimize battery exchange cost, there are several efficient communication routing protocol is proposed for example, SMedia Access Control by prof. Wei Ye.
Third, sensor mote’s price is not cheap. Recently, MEMS technology has dramatically led to the development of ultra small in size, low-power, low-cost sensor devices. However, cost is shrink down from 50$/mote to 1$/mote. Still, it will cost huge amount of money to apply and create sensor network in real world.

RFID application use case model + domain model

Problem statement

The problem context of requirements analysis for an asset tracking system using RFID technology. The system will track important assets and entities in the hospital (pharmaceuticals, supplies, durable medical equipment, patients, doctors, nurses, etc.) and provide specific user interfaces that are tailored for particular kinds of asset tracking.

1) Supply Tracker (search inventory, display inventory, order supplies, update inventory) - primarily used by an individual playing the role of Purchaser
2) People Tracker (admit patient, register visitor, discharge patient, register staff, query person location, monitor visitors, monitor ward) - primarily used by Nurses, Administrative Staff and Security Personnel

Approach
Through this project approach can be summarized as following :

1) Construct questionnaires for various stakeholders
2) Make a list of use cases (brief format) and initial prioritization
3) Develop fully-dressed use cases for high-priority use cases
4) Describe UML use case model for fully-dressed use cases
5) Describe UML system sequence diagram for each fully-dressed use case
6) Describe UML domain model

Use Case Model
1) Supply Tracker Application

















2) People Tracker Application


















The business value of the system is driven by several current issues which are of concern :
- Unauthorized visitor access (e.g. risk of drug theft or infant abduction)
- More effective inventory management
- More effective shared use of high-demand capital equipment (e.g. sonogram machines)

Domain Model
In this problem context, key concerns are RFID tag , People Registration /Asset Registration and Location Event. The others are duplicated information from HR, e-Records and e-Logistics system which is originally managed patient’s medical information, employee’s detail information and asset’s information. By applying “separation of concerns” concept, key abstraction can shows this domain characteristics concisely, however, with other entity can describe well enough to understand this domain as well. Key abstraction (yellow) will be designed first in design stage and others will be designed later and be consistent with existing environment.
E-records is the master domain of patient’s medical information. HR is the master domain of employee’s information such as department, special occupation, and position. E-Logistics is the master domain of asset’s information such as asset category (disposable supplies, expensive equipment, etc) and earned date , earned price, and etc. These entity should be consistent with original master entity in HR, e-Records, and e-Logistics. To meet consistency, in design stage, these entities should be designed to meet their original domain’s design specification such as database schema, interface specification and etc.

RFID application proposal for Hospital

Introduction

The purpose of this project is to propose the high level application recommendation for a hospital to be adopted as the RFID technology blueprint for the hospital, cost of recommended application and IT deployment strategy are also part of a sequence of deployment plan following 5-years time frame.

This proposal contains:

(1) Review of RFID technologies applicable to the health care industry, including an assessment of RFID devices, readers and support systems applicable to a hospital
(2) Recommendation of the ten best applications of RFID for a hospital using the four criteria
(3) Recommendation of the ten solution deployment strategy for the next five years
(4) Estimation of deployment costs for recommended solution including RFID devices and support systems.
Specifically out of scope are systems and the networks architecture on which they run and the management of these systems and operation systems. However it is expected that the cost estimation of recommended solution will need assumption of generic architecture which can be applied to the implementation plan of these systems.


Problem Statement
The United States Food and Drug Administration (FDA) (http://www.fda.gov/) is requiring drug companies to enhance the safety and security of the U.S. drug supply by 2007 using radio-frequency identification (RFID). As described by the FDA, this is "a state-of-the-art technology that uses electronic tags on product packaging to allow manufacturers and distributors to more precisely keep track of drug products as they move through the supply chain." The client wants to be able to satisfy FDA requirements for drug tracking within its hospitals, which will require it to install RFID readers.

When the client wants to use RFID throughout the hospital for many different purposes, including patient identification, billing, surgical safety, personnel location and, of course, drug tracking. The client understands that it will be able to control some of the RFID systems, such as patient identification, but for others it must remain compatible with RFID tags coming from outside entities, such as drug companies. The client also sees RFID as the beginning of "ubiquitous computing" in the medical field.

The client understands ubiquitous computing to mean that in the future numerous computers and chips will be embedded in the walls of rooms, in surgical instruments, laboratory apparatus, patient blood sample containers, employees badges, patient wristbands - essentially all over the hospital. These devices can interconnect through wireless technology to form a vast network of computers and sensors that will allow automation of many functions now performed manually, such as capture of billing information. It expects that this technology will be able to improve the efficiency and safety of health care delivery.

The question that the client asked which set of technologies should be used, how can it be sure to be compatible with outside products having RFIDs, and what future applications can be developed to
(1) increase profit,
(2) promote safety,
(3) improve the speed and quality of health care delivery; and
(4) comply with FDA regulations regarding RFID in drug packaging.
The client is looking for a far-ranging, creative implementation of RFID-based ubiquitous computing in its hospitals. It will also need to understand the cost of various alternatives.

Summary of Result
To drive Health-care transformation this project would focus on using new technologies and leveraging the electronic health record for more effective patient care, easier communication for hospital staff and better efficiency. Technologies to be employed will include: wireless handheld devices for connection to electronic health records; radio-frequency identification (RFID) tags for tracking personnel, equipment and patients; and monitoring devices in patient rooms to alert nurses of patient status.
The ten applications
1. Ready to Go, will provide emergency check before ambulance leaving
2. Operation Monitoring will improve patient safety by check and monitoring before/while operation
3. Surgical Instrument/Equipment management system will provide the status of surgical instrument – for e.g. Sterilization/contamination/infection and etc.
4. Patient Tracking will provide patient we will look through in next slides and protect infant stolen by real-time notification as well.
5. Employ Tracking will provide employer's location information and notification to doctors and nurses when they are called.
6. Drug Tracking is the FDA compliance Application and also provide drug inventory as well.
7. Sample/Organ Management will provide Identification and speed up test center’s billing process as well.
8. e-Patient Medical Record will provide right Medication and Speed up diagnosis process as well 9. Home Nursing System will provide 24hours home care service for special patient like diabetic patient etc.
10.Patient Guidance system will protect elderly or blind people getting lost in the hospital and provide navigation information by headset.

RFID technology overview

Ubiquitous, as defined by Merriam-Webster Dictionary, means “existing or being everywhere at the same time”. Based on this, ubiquitous computing is the computing environment that is everywhere; it is in the environment surrounding us and becomes part of our life, and as the technology is almost transparent to us, it does not become a distraction. As RFID provides a way of making “things communicate with other things” (understanding things as machines, products, etc.), people can just live their lives and let the technology work by itself.
  • Freqeuncy issue

The 3 main frequencies used for RFID purposes are: HF(13.56 MHz), UHF(860 MHz – 930 MHz), and Ultra UHF( 2.45 GHz). The first one fits in the category of High Frequency (HF) and the other two in the Ultra High Frequency category (UHF). Generally speaking, by using a higher frequency you can improve a tag reader's ability to read many co-located tags because of the higher data transfer rate, reducing the chance of collision. [07/want04] It is also possible to read tags at bigger distances (up to 100 meters with active RFIDs) while increasing the frequency.

HF is cheaper than UHF technology and HF can be recommended for most of the applications, especially when a large number of tags/readers are required. If the application is going to be used within the hospital, HF can be recommended for cost reasons as well. For drug tracking UHF can be recommened , because the need of interoperability with other health centers and the FDA.
If a further range of operation is needed or tag size is not important, probably 900MHz frequency can be recommended. If more functions are needed, 2.45GHz frequency can be recommended because it is easier to integrate with sensors and has more functions, but cannot be used inside operation rooms or near people with pacemakers.
When mobility is a must, portable readers should be used. These machines have their own operating system and usually have the ability to send data to a central computer through a wireless connection. Otherwise, fixed readers should be used (portable readers cost 2-5 times of a fixed one).
HF has a lot of advantages in size and antenna design, but has a very short operation range. On the contrary, 900MHz offers a very long range and a great tolerance to interference (medium to water/metal) but a bigger tag size and more complex antenna design. The 2.45GHz also has very small size tag, but it is not so tolerant to interference as 900MHz and has a shorter range, although the antenna design is a little bit easier. Both HF and 900MHz should be able to work with metal/water and avoid most of interference, and their bigger differences are in size and range.

  • Data Standardization issue
Several standards / proposals might be used within these frequencies, including ISO 14443, ISO 15693, ISO 18000 and EPCglobal, which has its origin in the MIT Auto-ID Labs.
Even though the Japanese ubiquitous ID protocol implementation has gathered strong allies like Microsoft and Hitachi, and is trying to became an RFID standard, EPCglobal’s UHF Class 1 Gen 2 is in a much more advanced stage and has already become a part of ISO 18000-6. This standard defines the use of the 860 MHz – 930 MHz spectrum.
The EPCglobal standard defines the EPC code within its Architecture Framework. Other important standards are the ONS (to locate authoritative metadata and services) and the EPCIS (provides a service interface to access information from the central DB or repository).
The EPC is defined by EPCglobal as a code to identify the manufacturer, the type and unique id of a given product. It uses 96 bits, where 38 are for identifying its serial number (see table below). That means it can have 2^38 (270+ billion) unique serial numbers for each product and company. EPCglobal Tag Data Standards Version 1.3 defines all these details.


  • RFID tag with Material issue
There are certain limitations when using RFID tags on liquids and metals. According to research, UHF use would be more appropriate than HF for the pharmaceutical industry in order to avoid these limitations. Several kinds of antennas can be used in order to satisfy a specific need. In one of Impinj's technical documents, some of their models are described, including one that is specially interesting for the pharmaceutical world; the PaperClip Antenna, that can be used everywhere, even in water. [10/impinj06]But as this is a (relatively) new technology, new problems arise.
  • Privacy and Security Issue
Privacy and security issues are covered in many ways, ranging from manual deactivation of the RFID tag to sophisticated public key protocols or hash functions, that require the tag to have processing capacities. Encryption technology is developed so far for privacy concern, this technology provided authentication, privacy, integrity and non- repudiation: [ohkubo05, anshel06]
-Smart tags
-PKI capable tags
-Anonymous-ID scheme
-Tag with lightweight circuits: i.e. hash function
- Algebraic Eraser

Book: Through the Looking-Glass by Lewis Carroll

!---From Wikipedia----
Through the Looking-Glass (1871) is a work of children's literature by Lewis Carroll (Charles Lutwidge Dodgson), generally categorized as literary nonsense. It is the sequel to Alice's Adventures in Wonderland (1865). Although it makes no reference to the events in the earlier book, the themes and settings of Through the Looking-Glass make it a kind of mirror image of Wonderland: the first book begins outdoors, in the warm month of May, on Alice's birthday (May 4),[1] uses frequent changes in size as a plot device, and draws on the imagery of playing cards; the second opens indoors on a snowy, wintry night exactly six months later, on November 4 (the day before Guy Fawkes Night),[2] uses frequent changes in time and spatial directions as a plot device, and draws on the imagery of chess. In it, there are many mirror themes, including opposites, time running backwards, and so on.

This book was reported that many software architect and software engineering people got insight from it.

Tuesday 8 January 2008

Mobile Banking Domain Model (Analysis Model)

This system design is the implementation for mobile banking application. The scope and main function of the system as belows.
1) User registration as mobile baking services
2) Basic authentication: log-in, log-out
3) View user’s bank accounts
4) Transfer money
5) Alert (Add/delete/check)

User can be classified based on trader Type; Casual Trader, Frequent Trader, and Day Trader
Casual Trader may have no fixed data plan but pay for Data packets and use several times usage per month. Frequent Trader can have unlimited data plan, need ticker's information. Day Trader can have unlimited data plan, need ticker's information and daily trading transaction service.Trader can be enhanced by defining trader Type and its transaction fee.
Account can be categorized billing account for bill payment service, bank account such as savings and check account and stock account for stock trading.
Alert can be enhanced by defining Alert Method such as SMS, RSS, and Email.

Mobile Banking Site map

Mobile Banking Application starts with "Main" menu which provide “My Account” , “Transfer” and “Alert” Service. Next step, “My profile” will provide manage Contacts. The site diagram is that it begins with Main menu that displays four services in the main menu: My Accounts, Transfer, Alert and My Profile
Before the users move to 'the select menu', the user is needed to perform login or register according to the type: returning user or new user.
The site has one integrated success and error page. When each transaction or process is completed, they go to success page( success.jsp ) if user complete the process, the system displays error page ( error.jsp ) if ) if user input the wrong data, information or make it incomplete during the banking process. This success and error page is common to all pages available.
Each use case has the redirection to the designated pages.

PON (Passive Optical Network) Technology review

PON (Passive Optical Network) is gradually establishing itself as an important part of broadband access technologies, which is fiber to the premises network architecture, FTTH (Fiber to the home). PON has several characteristics such as Simplicity (1: Multi) : PON consists of OLT (Optical Line Termination) and ONUs(Optical Network Lines) , no electronics or active link in field.

Why PON is important? PON can reduced operation cost in terms of below aspects
- High reliability
- Reduced power expenses
- Shorter installation times

There are several PON related technologies; B-PON, E-PON, and G-PON.

1) BPON: ATM based PON technology [Standard: ITU-T G.983]
BPON maps all traffic to ATM sells
• ATM cells fit into BPON TC frames
• Can use Ethernet uplink


2) EPON: Ethernet based PON technology [Standard: IEEE 820.3ah]
EPON is based on Ethernet Bearer, Symmetrical bi-directional 1Gbps
• Optical network can be split and delivered to 16ONUs
• End user can transmit packets by TDM. • Efficient for IP-based interactive and high speed data service.
• Easy to deploy with existing Gigabit Ethernet networks with last mile to the home
- In Asian Market, Japan and Korea, GEPON is dominant due to Re-use of Ethernet
- However, in North America TDM or ATM based network bearer is not efficient for EPON

3) GPON: ATM + Ethernet hybrid technology [Standard: ITU-T G.984]
• Address rates greater than 1 Giga byte/s
• Multi-service technology with Cell, Packet and TDM mapping
• Support ATM-only, Packet-only (variable length burst), and Mixed-mode framing
GPON draws on the B-PON series
• Main Player in US market: Verizon (Nation-wide Deployed), AT&T, Bell South
•Advantage on downloads, efficiency, security, well support on TDM services (voice, data or video service) and QoS.
• Due to the existing ATM networks in US, fairly easy to deploy GPON with a large customer requirements.
• By 2008, North America will account for 43 percent of worldwide PON revenues where GPON dominates.

Telecom network technology vs application review

Data network technologies are compared in terms of data rate against required data rates. Since Simple Short Messaging service(SMS) is limited with data size 100 bytes and with data rates at 14.4kbps, 2nd generation wireless data technology is mainly based on plain text limited at 14.4kbps. HPCSD and IS-95A are the relevant technologies for 2G.
Downloading ring tones and accessing the Internet with cell-phone modem mode requires more than above data rates up to 56kbps. GPRS and IS-95B can deliver these application with 56 kbps data rates.


With introduction for network technology, to apply these wireless technology, feasibility for mobile banking application will be studied as well . So it will be recommended to adopt technology for mobile banking application.


For example, relatively low data rate technology such as IS-95 A/B and GPRS will not be recommended for mobile banking application if application needs higher than 56kbps data rate.
Because secure data exchanging like mobile banking or image and mp3 downloading via "Wireless Internet" requires more than 100kbps data rates. 2G is not fit for deliver these applications. Since 2.5G is available via CDMA 20001X and EDGE which can deliver more than 153kbps up to 384kbps data rate, mobile banking application and various multimedia service can be commercialized and realized.


Since 3G network has been deployed, video streaming and video telephony which are sensitive in data latency, are available. Thus 3rd generation technology standard EVDO and EDGE/WCDMA realized video telephony, mobile TV service and fluent multimedia service in Asia and North America. Beyond 3G technologies such as HSDPA/HSUPA and EVDO revision B enables wireless broadband access, Multimedia Messaging Service, video chat, mobile TV, and other streaming services. For example, Verizon wireless started mobile TV service (VCast) in several cities including New York using HSDPA network.

If we have a look on 3rd generation technology adoption of USA market operators, AT&T adopted HSDPA in 2004 while T-mobile adopted HSDPA in 2006. Verizon Wireless adopted EVDO in 2005 while Sprint adopted EVDO in 2005.

Telecom Network Technology Review

Wireless technology evolved from the fist generation for exclusive analog voice communication network to the 4th generation for All- IP network.

The first generation technology is analogue voice communication only, TACS is dominant technology in Europe, AMPS in dominant technology in U.S. After that, wireless technology was involved to the 2nd generation of wireless technology which can deliver data at 14.4kbps rate and digital voice traffic. GSM is dominant in Europe, IS-95A/B and TDMA are dominant in US market. IS-95A, which use CDMA technology developed by Qualcomm, can deliver data traffic at 14.4kbps, and IS-95B can deliver data traffic at 56kbps rate. Since these 2G technology were deployed, the wireless user can access Internet using cell-phone’s modem mode.

As the needs for "Wireless Internet" grows higher and higher, the network technology evolved to the second and a half technology which can deliver more higher bandwidth for data traffic. GPRS is dominant 2.5G technology in Europe, which can deliver data with 56kbps, however, CDMA 2000(IS-95C) , dominant in Asia market, can deliver data traffic up to about 153kbps.
These 2.5G technology enabled wireless data market more fluently and it can provide various multimedia messaging with animation and colorful image or picture against just simple text only SMS.

As the needs for multimedia and various application grows higher and higher, 3G technology started to be developed by two big organization, which are 3GPP and 3GPP2. 3GPP is a WCDMA supporting group for 3G technology, 3GPP2 is a CDMA20001X supporting group for 3G. In United Sates, AT&T and T-mobile are 3GPP supporting service provider, and Verizon wireless and Sprint are 3GPP2 supporting service provider.

3G technology enabled fluent multimedia service such as video downloading & streaming, video telephony, game, and various multimedia contents due to high bandwidth. CDMA2000 1X-EVDO can deliver data more than 153kbps and up to 2Mbps for exclusive user in a cell. Now CDMA2000-3X with EVDO revision A/B are deployed and it can deliver data at 1.8M~3Mbps rate. EDGE and WCDMA release 99can deliver data at 384kbps however WCDMA released 4 and 5 which can deliver data 5M ~ 14.4Mbps using MIMO technology. Now these Release4/5 are known as HSDPA and HSUPA.

And these technology will eventually evolve to All-IP based technology. 4G is being developed to enable broadband Internet access, high quality video conferencing and video presence, mobile TV, High definition TV content, and other integrating multimedia service by combined with IMS. These technology evolution will bring to us "any device” , “anytime” and “anywhere" communication environment.
Now 2.5 G and 3G technology are existing in the market. However, as the technology evolve, new technology will replace old legacy network technology.

Monday 7 January 2008

Magic Number

Number “Three” is mysterious. It is so called "magic number"In the book "Logical Thinking" by McKinsey Consulting, in my memory, the number "Three" is favorite number among consultants when they develop their logic.For me....the number "Three" is very applicable because it is easy to present in one power point page, easy to deliver to the audience , easy to let the audience memorize.

Number "4" is very useful dealing with "Enterprise Architecture.”Enterprise architecture can be developed perspectives and views.There are four views which are Business architecture, Application architecture, Data architecture, and Technology architecture. And there can be four perspectives which is contextual, conceptual, logical and physical perspectives (or one might say, Executive level, Owner level, Designer level, Executer level) So...when we talk about "Enterprise Architecture Framework", 4*4 matrix is generally used in enterprise architecture consulting.

Based on my perspective, number "12" is very very exotic, mysterious.I dare to say, like Jesus and 12 disciples; one cannot serve more than 12 people in one's mind.I am not Jesus so there are no disciples as well, but I would like to invite 12 people in my village (in my heart) , serve them and make them be happy whoever can be a member of my family, religious family, colleague or competitors, in my contemporary society.I would like to find them and complete my village and make them better from now on.

3 이라는 숫자는 매우 신비롭다.한국에서는 삼세판이 통하고, 서양에서는 magic number로 통한다.컨설팅세계에서는 Mckinsey Consulting이 펴낸 책에서, 컨설턴트들이 논리를 펼 때 좋아하는 숫자도 3 이라고 한다.나의 경우도 마찬가지......3은 한 장의 파워 포인트에 담기도 쉽고, 전달하기도 쉽고, 상대방에게 기억을 시키기도 쉽다.

4 라는 숫자도 꽤 유용하다.Enterprise Architecture를 다룰 때 더욱 그런 편. BA/AA/DA/TA 라는 아키텍처 관점의 Point of View와 Executive (Sponsor)/ Planner(or Owner)/Designer/Executer(Programmer) 라는 관점의 Perspective 또는 Contextual, Conceptual, Logical, Physical 역시 4라는 숫자가 매우 유용하다.그래서일까...... EA Framework을 논할 때는 4*4 matrix가 컨설팅에서 매우 일반적으로 쓰인다.

내게 있어 12라는 숫자 또한 매우 신비롭다.예수와 12제자에서 보여지듯이, 한 개인이 섬길 수 있는 믿음의 형제가 12 명 이상을 초과할 수 없다는 묘한 논리를 갖다 붙이고 싶다.내게 있어 12제자는 아니지만, 나와 같은 동시대를 살아가는 사회인들 중에그 사회가 가족사회이든, 종교집단이든, 직장 이라는 사회, 경쟁회사든 간에12명을 내 마음에 Village에 상주시키고 그들을 섬기고 그들과 행복을 나누며 살아가고 싶다.지금부터 나는 그들을 찾아 내 마을을 완성시키고, 더 나은 미래를 만들고 싶다.

Sunday 6 January 2008

The Village Theory

The village theory in “ The 80/20 Principle: The Secret to Success by Achieving More with Less” by Richard Koch


Anthropologists stress that the number of exhilarating and important personal relationships that people can establish is limited. Apparently, the common pattern of people in any society is to have two important childhood friends, two significant adult friends, and two doctors. Typically, there are two powerful sexual partners who eclipse the others. Most commonly, you fall in love only once, and there is one member of your family whom you love above all others. The number of significant personal relationships is remarkably similar for everyone, regardless of their location, sophistication or culture. This had led to the anthropologists’ "village theory". In an African village, all these relationships happen within a few hundred meters and are often formed within a short-period of time. For us, these relationships may be spread all over the planet and over a whole lifetime. They nonetheless constitute a village which we each have in our heads, and once these slots are filled, they're filled forever.

그래서 10여명 정도의 인간관계가 내 마음에 살고 있고, 한번 채워진 자리는 절대 다른 이로 대처될수가 없다는 거다.

이러한 마을이론과 더불어, 나는 위로 존경할 수 있는 선배 또는 웃어른을 3명, 아래로 애정으로 이끌수 있는 후배 또는 자식을 3명, 그리고 나와함께 삶을 함께 나누는 관계를 3명 맺으리라 생각해 왔다.
가족중에 가장 사랑하는 어머니의 자리와 ...이제는 대처할 수 없는 첫사랑의 빈자리를 제외하고...

이제....앞으로의 10 여명의 사도를 채워나가고 싶다.

People in my world

주로 난 내가 처한 환경에서 사람들을 존중하고 관계 맺기를 고수해왔다. 다른 환경의 사람들을 그닥 신뢰하지 않아서가 아니라, 좀 더 이해할 수 있고, 동병상련 이랄까, 과부마음은 과부만 안다고 힘든 상황에서 유사한 업종에서 고민하고 일하는 사람들과 희노애락을 함께하고 싶어서....

컨설팅 생활 8년차에 이르던 어느날 도미한 나지만....늘 고마움을 느끼는 사람들이 있다.
예전 PwC Consulting에서 나를 interview하셨고, 조직의 리더 이자, 내 마음의 리더인 유인철 박사님, 지금은 IBM GBS에서 파트너로 계신다. 외롭고 힘든 삶이지만 늘 웃음 가득, 성공을 빌어주는 밝은 모습으로 응원해 주시는 분....석사 박사 원서 넣을때 마다 바쁘신 와중에도 resume를 늘 써주시던 분.....이 고마움을 제대로 표현하지 못하고 돌아와 맘이 아프다.

역시나 예전 PwC Consulting에서 싸부였던 조영표 선생님, 지금은 KTF 전략기획팀장으로 계신다. 늘 조영표 선생님이 고수의 길을 가르쳐 주던 후배를 아끼고 가르침을 나눠주시던 분. 아마 조영표 팀장님 때문에 KTF의 전략기획실은 승승장구할듯.

그리고 역시나 PwC 시절의 박주혜 선생님, 지금은 AT커니에서 상무로 계신다. 박상무님. 늘 엄마같고 늘 이모같고, 늘 큰언니 같은 .... 사적으로 내 생활을 너무나 잘 꿰뚫고 계시기에....박주혜 선생님은 내 마음의 10명중에 한자리를 넉넉히 차지하신다.

그리고 PwC 시절의 최지호 선생님....늘 최지호 선생님 주위로 모이는 좋은 사람들과의 모임에서 자극도 받고 새로운 기대도 하게 되는 ,initiative를 늘 제공해 주시는 분

내가 언제쯤 이분들에게 도움이 될 수 있을까....
늘 함께 했던 과거를 그리워하지 말고 언제쯤 함께 미래를 만들어 볼 수 있을까....
어떻게 시작해야 할지는 아직 모르겠지만....조만간 그런 미래가 왔음 좋겠다.

How to be a good consultant

In my world, people say that a professional consultant has so many abilities such as outstanding knowledge in more than one industry, overwhelming persuasion capability, good analytical ability and ceaseless physical strength against excessive stress. But qualifications of being a professional consultant do not contribute to friendship and morality. How can we succeed as a professional, contribute to family, company and the world, make friends and be the person we want to be? Based on my own experience, I want to introduce my personal answers about how to be a good consultant in private life and in relationships.

First of all, take initiatives with seamless efforts and curiosity. Consulting jobs are never the same. That is, every project you encounter has different objectives, different business and technology environment, and different types of clients. Everything something different is not always good, because consultants always have to study and analyze the whole problem. If you lack patience or exhaust your self through stressful projects, you might loose your temper or sometimes you might be scared. To prevent this, you have to be proactive with your curious mind and say for yourself “Enjoy it, if it is inevitable.”

Secondly, in business relations, make long-term relationships with your clients. People commonly make a mistake in a consulting business relationship with their clients because they regard their opportunity as one of the temporary and pass-by project. But remember the saying, “Don’t burn your bridges”. Almost every consulting project is a long-term business or even if it is not, you have to think of it as a long-term business. Clients can be good friends if you show your trust to them first and treat them as partners which will give win-win opportunity.

In summary, to be a good consultant is to be proactive with ceaseless curiosity and make long-term relationships with your business partners. Consulting is a difficult job because selling knowledge and experience can not be seen in the first place. But if you try to do your best in your job and make good friendship with people around you, then you will be a successful consultant in your private life and also your business.

Men are from mars, women are from venus

화성에서 온 남자, 금성에서 온 여자 라는 책이 있다.
서로 다른 행성에서 온 남자와 여자 라는 종족은 태생부터 그 관심사가 달랐고, 대화방식이라던가 사물을 대하는 느낌이나 태도가 달라서 서로의 다름을 이해하고 대해야 한다는 책.
내가 이책에서 얻은 장점은 회사에서 남자를 대하는 말투나 사고를 적용할 수 있다는 것. 다만, 연애에서는 그다지 적용해보지 않아 딱히 좋다고 머라 말할수가 없다. 많은 부부들이 이 책을 그들의 결혼생활에 적용하는 것을 보아, 아마 가족이라는 구조도 서로간의 이해관계가 다르면서도 목적이 같은 조그만 사회를 형성하기 때문에 이 책을 적용해도 큰 잇점을 얻을 수 있을 것이리라.

이 책에서 내가 발견한 내 삶의 영향은...
사회가 가족이라는 구조를 만드는 경향보다 단일 구성원을 지향하려는 경향이 클 때, 남성성과 여성성이 동시에 발현되지 않을까 라는 점이다. 즉, 화성에서 온 여자이면서 금성에서 온 남자처럼 행동하고 사고하는 경향이 생기지 않을까...

그래서, 나는 화성에서 온 여자처럼 살아오지 않았을까 라는 내 나름대로의 나에 대한 고찰과 내 미래를 화성에서 온 여자 처럼 살아감에 있어 좋은 점은 부각시키고 나쁜 점은 고쳐보려는 노력을 나의 물리적인 삶과 나의 논리적인 삶, 바로 이곳에서 표출하고 싶다.

There is a book, "men are from mars, women are form venus".
This book explored the generic differences between men and women in a way that their concern is diffrent, their communication style is different, their behavior or feeling to objects is different, and guided two opposite sex should understand and communicate each other.
I found the author's guidence was effective in my company life by applying in communication with men. But, I could not apply to my private life , I could not say anything for the time being.
However, many couples applied this book in their private lives, I might say this book will be effective as well, because family is a small society, in which each member has different concern but has the same objective....(But I am not sure 100%, I could not make my family so far.)

But what I found in this book, insights in my life is....
If a society has a trend which is being single life not married rather than being familes, two opposite characteristics - what women are like and what men are like- may be revealed.
That is , there may exist people like men from venus, women from mars.

So, I think I am the one of them, women from mars, if really I am, I want to reveal my effort to live myself to strengthen what I have and to remedy my defects as a girl from mars not only my phisical life but also my logical life , this virtual space.

Prologue


2008년 새해를 맞이함과 동시에 회색 도시 피츠버그의 우울함에서 벗어나고자 블러그를 시작하다.
지금까지의 모든 내 지식과 경험을 이 블러그에 녹이고자 , 내 과거를 기록하고자... 앞으로의 나를 또다른 디지털 공간에 살아 있게 함으로써 또다른 생명을 부여하고자....
이제 이 블러그는 나 개인의 과거이자 현재, 그리고 미래가 될 것이다.
Why I start this blog...
to meet the new year's day of 2008 ,
to avoid from gloomy mood in the Grey city, Pittsburgh,
to store my knowledge and experience so far in this virtual space,
to record my past,
to give a birth to my life by being alive in this digital virtual space ,
From today, this blog will be my second life to reveal my past, my present and my future.