|
|
|
¡Ø »õ·Î°íħ ¹öÆ°À» ´©¸£½Ã¸é ½Ç½Ã°£ ¾÷µ¥ÀÌÆ® °¡´ä¾ÈÀ» º¸½Ç ¼ö ÀÖ½À´Ï´Ù. |
|
¡Ø ¸ð¹ÙÀϱâ±â(¾ÆÀÌÆù,¾Èµå·ÎÀ̵åÆù)¿¡¼´Â ÁÖ¼ÒÇ¥½ÃÁÙ »õ·Î°íħÀ» ´©¸£¼¼¿ä. |
|
¡Ø ½º¸¶Æ®Æù¿¡¼ °¡´ä¾È À̹ÌÁö°¡ º¸ÀÌÁö ¾ÊÀ» °æ¿ì, ÀÎÅͳÝâ > ´õº¸±â > ¼³Á¤ > ±â·Ï»èÁ¦ ¹× ÄíÅ° »èÁ¦¸¦ ÇØÁÖ¼¼¿ä. |
|
|
2016³â Á¦ 2ȸ Á¤º¸Ã³¸®±â»ç½Ç±â |
|
|
| |
|
| Á¤º¸Ã³¸®±â»ç ½Ç±â A/B´ä¾È | |
| ¾Ë°í¸®Áò (Á¦1°ú¸ñ) | µ¥ÀÌÅͺ£À̽º (Á¦2°ú¸ñ) | ¾÷¹«ÇÁ·Î¼¼¼ (Á¦3°ú¸ñ) | ½Å±â¼úµ¿Çâ (Á¦4°ú¸ñ) | Àü»ê¿µ¾î (Á¦5°ú¸ñ) | 1 | 33 | q=small | 1 | 16 | Meta Data | 1 | 17 | ERP | 1 | 34 | Digital Forensics | 1 | 4 | DRM | 2 | 18 | j=small,large,1 | 2 | 30 | Data Warehouse | 2 | 34 | Enterprice application integration | 2 | 11 | Cyber Bullying | 2 | 1 | VPN | 3 | 40 | a(j,t) | 3 | 37 | ´ÙÂ÷¿ø | 3 | 24 | Moment truth | 3 | 40 | Hadoop | 3 | 31 | LBS | 4 | 6 | large=large-1 | 4 | 15 | OLAP | 4 | 35 | VOC | 4 | 4 | LBSNS | 4 | 29 | DDOS | 5 | 36 | large=large+1 | 5 | 13 | Data Mining | 5 | | | 5 | 18 | Digital Prosumer | 5 | 39 | VoIP |
|
|
|
|
|