|
|
|
Á¦81ȸ_ÀüÀÚ°è»êÁ¶Á÷ÀÀ¿ë±â¼ú»ç |
|
|
|
|
|
|
|
|
Å°¿öµå : |
|
|
¼Ò°³±Û |
Á¦81ȸ_ÀüÀÚ°è»êÁ¶Á÷ÀÀ¿ë±â¼ú»ç |
¿ä¾à |
±¹°¡±â¼ú ÀÚ°Ý°ËÁ¤ ½ÃÇè¹®Á¦
±â¼ú»ç Á¦ 81 ȸ Á¦ 1 ±³½Ã (½ÃÇè½Ã°£: 100ºÐ) <ºÐ ¾ß><Á¤º¸Ã³¸®><ÀÚ°Ý Á¾¸ñ><ÀüÀÚ°è»ê±âÁ¶Á÷ÀÀ¿ë±â¼ú»ç><¼öÇè ¹øÈ£><><¼º ¸í><>
<> ¡Ø ´ÙÀ½ ¹®Á¦Áß 10¹®Á¦¸¦ ¼±ÅÃÇÏ¿© ¼³¸íÇϽÿÀ. (°¢10Á¡)
1. Post Mortem °ËÅä 2. Á¤Çü°ËÁõ(Formal Verification) ¹æ¹ýÁßÀÇ ÇϳªÀÎ ¸ðµ¨Ã¼Å·(Model Checking) 3. ¸¶ÀÌÅ©·Î Ä¿³Î(Micro Kernel) 4. ȸ±Í½ÃÇè(Regression Test) 5. ºò¹ðÅ×½ºÆ®(Bigbang Test) 6. LBS(Location Based Service) 7. UCC(User Created Contents) 8. Web 2.0 9. i-PIN(internet-Personal Identification Number) 10. ¼ÒÇÁÆ®¿þ¾î Çü»ó°ü¸® 11. IT Governance 12. MPLS(Multi Protocol Label Switching) 13. ³×Æ®¿öÅ©ÀÇ QoS(Quality of Service)
±¹°¡±â¼ú ÀÚ°Ý°ËÁ¤ ½ÃÇè¹®Á¦
±â¼ú»ç Á¦ 81 ȸ Á¦ 2 ±³½Ã (½ÃÇè½Ã°£: 100ºÐ) <ºÐ ¾ß><Á¤º¸Ã³¸®><ÀÚ°Ý Á¾¸ñ><ÀüÀÚ°è»ê±âÁ¶Á÷ÀÀ¿ë±â¼ú»ç><¼öÇè ¹øÈ£><><¼º ¸í><>
<> ¡Ø ´ÙÀ½ ¹®Á¦Áß 4¹®Á¦¸¦ ¼±ÅÃÇÏ¿© ¼³¸íÇϽÿÀ. (°¢25Á¡)
1. ºÐ»ê½Ã½ºÅÛÀº ¿©·¯ °¡Áö Åõ¸í¼º(Transparency)À» À¯ÁöÇÏ¿©¾ß ÇÑ´Ù. ÀÌµé °¢°¢ÀÇ Åõ¸í¼ºÀ» ¼³¸íÇϽÿÀ. ¨ç Access ¨è Location ¨é Concurrency ¨ê Replication ¨ë Failure ¨ì Migration ¨í Performance ¨î Scaling 2. ¸ÖƼ-¿¡ÀÌÀüÆ®(Multi-Agent)ÀÇ °³³ä, Ư¡, ºÐ»ê¹®Á¦ ÇØ°á¹æ½Ä ¹× Àû¿ëºÐ¾ß¿¡ ´ëÇÏ¿© ±â¼úÇÏ |
|
|
|
|
À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ Áø½Ç¼º¿¡ ´ëÇÏ¿© º¸ÁõÇÏÁö ¾Æ´ÏÇϸç, ÇØ´ç Á¤º¸ ¹× °Ô½Ã¹° ÀúÀ۱ǰú ±âŸ ¹ýÀû Ã¥ÀÓÀº ÀÚ·á µî·ÏÀÚ¿¡°Ô ÀÖ½À´Ï´Ù. À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ ºÒ¹ýÀû ÀÌ¿ë, ¹«´ÜÀüÀç¹× ¹èÆ÷´Â ±ÝÁöµÇ¾î ÀÖ½À´Ï´Ù. ÀúÀÛ±ÇħÇØ, ¸í¿¹ÈÑ¼Õ µî ºÐÀï¿ä¼Ò ¹ß°ß½Ã ÇÏ´ÜÀÇ ÀúÀÛ±Ç Ä§ÇØ½Å°í¸¦ ÀÌ¿ëÇØ Áֽñ⠹ٶø´Ï´Ù. |
|