|
|
|
Á¦83ȸ_ÀüÀÚ°è»êÁ¶Á÷ÀÀ¿ë±â¼ú»ç |
|
|
|
|
|
|
|
|
Å°¿öµå : |
|
|
¼Ò°³±Û |
Á¦83ȸ_ÀüÀÚ°è»êÁ¶Á÷ÀÀ¿ë±â¼ú»ç |
¿ä¾à |
±â¼ú»ç Á¦ 83 ȸ Á¦ 1 ±³½Ã (½ÃÇè½Ã°£: 100ºÐ) <ºÐ ¾ß><Á¤º¸Ã³¸®><ÀÚ°Ý Á¾¸ñ><ÀüÀÚ°è»ê±âÁ¶Á÷ÀÀ¿ë ±â¼ú»ç><¼öÇè ¹øÈ£><><¼º ¸í><>
<> ¡Ø ´ÙÀ½ ¹®Á¦Áß 10¹®Á¦¸¦ ¼±ÅÃÇÏ¿© ¼³¸íÇϽÿÀ. (°¢10Á¡)
1. Metaverse 2. UTM(United Threat Management) System 3. ECM(Enterprise Contents Management) 4. MDM(Master Data Management) 5. XIP(eXecution-In-Place) 6. FAN(File Area Network) 7. RSS(Really Simple Syndication) 8. BPEL(Business Process Execution Language) 9. Dublin Core 10. Second Life 11. INDECS(Interoperability of data in e-commerce system) 12. DOI(Digital Object Identifier) 13. u-Factory ±â¼ú»ç Á¦ 83 ȸ Á¦ 2 ±³½Ã (½ÃÇè½Ã°£: 100ºÐ) <ºÐ ¾ß><Á¤º¸Ã³¸®><ÀÚ°Ý Á¾¸ñ><ÀüÀÚ°è»ê±âÁ¶Á÷ÀÀ¿ë ±â¼ú»ç><¼öÇè ¹øÈ£><><¼º ¸í><>
<> ¡Ø ´ÙÀ½ ¹®Á¦Áß 4¹®Á¦¸¦ ¼±ÅÃÇÏ¿© ¼³¸íÇϽÿÀ. (°¢25Á¡)
1. Á¾ÇÕÀ§Çè°ü¸®½Ã½ºÅÛ(RMS : Risk Management System)°ú ÅëÇÕº¸¾È°ü¸®½Ã½ºÅÛ(ESM : Enterprise Security Management)ÀÇ Â÷ÀÌÁ¡¿¡ ´ëÇØ ¼³¸íÇϽÿÀ.
2. À¯ºñÄõÅͽº ¼¾¼ ³×Æ®¿öÅ©(Ubiquitous Sensor Network : USN)ÀÇ Æ¯¼º¿¡ ´ëÇØ ³íÇÏ°í, ÀÌ USNÀº Ad-hoc Åë½Å±â¹ýÀ¸·Î µ¥ÀÌÅ͸¦ Àü¼ÛÇϴµ¥, Ad-hoc ³×Æ®¿öÅ©¿Í ±âÁ¸ ±â¹Ý±¸Á¶ ³×Æ®¿öÅ©(Infrastructure Network)ÀÇ Â÷ÀÌÁ¡¿¡ ´ëÇØ ¼³¸íÇϽÿÀ.
3. V |
|
|
|
|
À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ Áø½Ç¼º¿¡ ´ëÇÏ¿© º¸ÁõÇÏÁö ¾Æ´ÏÇϸç, ÇØ´ç Á¤º¸ ¹× °Ô½Ã¹° ÀúÀ۱ǰú ±âŸ ¹ýÀû Ã¥ÀÓÀº ÀÚ·á µî·ÏÀÚ¿¡°Ô ÀÖ½À´Ï´Ù. À§ Á¤º¸¹× °Ô½Ã¹° ³»¿ëÀÇ ºÒ¹ýÀû ÀÌ¿ë, ¹«´ÜÀüÀç¹× ¹èÆ÷´Â ±ÝÁöµÇ¾î ÀÖ½À´Ï´Ù. ÀúÀÛ±ÇħÇØ, ¸í¿¹ÈÑ¼Õ µî ºÐÀï¿ä¼Ò ¹ß°ß½Ã ÇÏ´ÜÀÇ ÀúÀÛ±Ç Ä§ÇØ½Å°í¸¦ ÀÌ¿ëÇØ Áֽñ⠹ٶø´Ï´Ù. |
|