|
|
|  |
2011³â ±¹³»¿Ü IT µ¿Çâ ¸®ºä ¹× 2012³â Àü¸Á |
|
±³À°½Ã°£ : |
37ºÐ
/ ÆÄÀÏÅ©±â : 37.0 MB
|
|
| |
|
±³À°¹æ½Ä : |
1. À©µµ¿ìXP,ºñ½ºÅ¸: ´Ù¿î·Îµå ¹æ½Ä
2. À©µµ¿ì7,8: À¥½ºÆ®¸®¹Ö ¹æ½Ä
/ ±âÁØÀÏ : 2011³â 11¿ù 18ÀÏ
|
|
| |
|
° »ç : |
¾×¼¾Ãò¾îÄÚ¸®¾Æ CMT
OOO Àü¹«
|
|
| |
|
°¡ °Ý : | 17,600¿ø
(±¸¸ÅÀÏ ÀÌÈÄ 6°³¿ù µ¿¾È ¼ö°ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù)
|
| |
|
|
|
|
|
|
 |
|
|
|
|
- À¥°³¹ß, ½Ã½ºÅÛ °³¹ß, UI °³¹ß ½Ç¹« ´ã´çÀÚ
- ÀÎÅÍ³Ý ºñÁî´Ï½º °ü·Ã ¾÷üÀÇ CEO ¹× °æ¿µÁø
- ÀÎÅÍ³Ý ¼ºñ½º¸¦ °³¹ß, µðÀÚÀÎ, ¸¶ÄÉÆÃÇÏ´Â ½Ç¹« ´ã´çÀÚ
- ÀÎÅͳÝÀÇ »õ·Î¿î Æ®·»µå¿¡ °ü½ÉÀÌ ÀÖ´Â ¾÷°è °ü°èÀÚ ¹× ÀϹÝÀÎ
|
|
|
|
|
|
|
|
|
 |
|
|
|
|
- 2011³â À¥ °ü·Ã À̽´µéÀ» ±â¼ú°³¹ß °üÁ¡¿¡¼ Á¶¸ÁÇÑ´Ù.
- 2011³â À¥ºñÁî´Ï½ºÀÇ °³¹ß °ü·Ã ºÐ¾ß¸¦ Á¤¸®Çϰí 2012³â ÇÙ½É Æ®·»µå¸¦ Àü¸ÁÇÑ´Ù.
- ±¹³» À¥°³¹ß Àü¹®°¡µéÀ» ÅëÇØ ´Ù¾çÇÑ ÀλçÀÌÆ®¿Í ³ëÇϿ츦 ½ÀµæÇÑ´Ù.
|
|
|
|
|
|
|
|
|
 |
|
|
|
|
37ºÐ |
2011³â ±¹³»¿Ü IT µ¿Çâ ¸®ºä ¹× 2012³â Àü¸Á
1. IT Overview
ITÀÇ ¿µ¿ª: Hardware, Software, IT service
IT »ê¾÷ ±Ô¸ð ¹× ¹ßÀü»ç
ITÀÇ ¼ºÀå ¿äÀÎ

2. 2012 IT »ê¾÷ ½ÃÀå Àü¸Á
2012 ¼¼°è IT »ê¾÷ ½ÃÀå Àü¸Á
2012 ±¹³» IT »ê¾÷ ½ÃÀå Àü¸Á

3. 2012 IT »ê¾÷ Æ®·£µå Àü¸Á
Æ®·£µå Àü¸Á Research Methodology
Key1: PlatformÀ¸·Î¼ÀÇ µ¥ÀÌÅÍ
Key2: Analytics
Key3: Clouding Computing
Key4: Service-Centric Architecture
Key5: IT Security
Key6: Data Privacy
Key7: Social Ç÷§Æû
Key8: User Experience

4. Analysis: 2011³â ÇöȲ°ú 2012³â Àü¸ÁÀÇ Æ¯Â¡/Â÷ÀÌÁ¡ ºÐ¼®
|
|
 OOO Àü¹«
¾×¼¾Ãò¾îÄÚ¸®¾Æ CMT |
|
|
|
|
|
|
 |
|
|
|
|
|
 |
|
|
 | Cloud Computing »ç·Ê
|
| |
|
|
|
|
|
 |
|
|
 | Social Business
|
| |
|
|
|
|
|
 |
|
|
 | ´ë¿ë·® Data
|
| |
|
|
|
|
|
|
 |
|
|
 | IT Security
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|