¡Ø »õ·Î°íħ ¹öÆ°À» ´©¸£½Ã¸é ½Ç½Ã°£ ¾÷µ¥ÀÌÆ® °¡´ä¾ÈÀ» º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
¡Ø ¸ð¹ÙÀϱâ±â(¾ÆÀÌÆù,¾Èµå·ÎÀ̵åÆù)¿¡¼­´Â ÁÖ¼ÒÇ¥½ÃÁÙ »õ·Î°íħÀ» ´©¸£¼¼¿ä.
¡Ø ½º¸¶Æ®Æù¿¡¼­ °¡´ä¾È À̹ÌÁö°¡ º¸ÀÌÁö ¾ÊÀ» °æ¿ì, ÀÎÅͳÝâ > ´õº¸±â > ¼³Á¤ > ±â·Ï»èÁ¦ ¹× ÄíÅ° »èÁ¦¸¦ ÇØÁÖ¼¼¿ä.
2016³â Á¦ 2ȸ Á¤º¸Ã³¸®±â»ç½Ç±â
Á¤º¸Ã³¸®±â»ç ½Ç±â
Á¤º¸Ã³¸®±â»ç ½Ç±â A/B´ä¾È
¾Ë°í¸®Áò
(Á¦1°ú¸ñ)
µ¥ÀÌÅͺ£À̽º
(Á¦2°ú¸ñ)
¾÷¹«ÇÁ·Î¼¼¼­
(Á¦3°ú¸ñ)
½Å±â¼úµ¿Çâ
(Á¦4°ú¸ñ)
Àü»ê¿µ¾î
(Á¦5°ú¸ñ)
133q=small116Meta Data117ERP134Digital Forensics14DRM
218j=small,large,1230Data Warehouse234Enterprice application integration211Cyber Bullying21VPN
340a(j,t)337´ÙÂ÷¿ø324Moment truth340Hadoop331LBS
46large=large-1415OLAP435VOC44LBSNS429DDOS
536large=large+1513Data Mining5518Digital Prosumer539VoIP