	{"id":3053,"date":"2013-07-08T14:51:35","date_gmt":"2013-07-08T07:51:35","guid":{"rendered":"http:\/\/science-technology.vn\/?p=3053"},"modified":"2013-07-08T14:51:35","modified_gmt":"2013-07-08T07:51:35","slug":"giao-duc-va-hoc-tap-lien-tuc","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=3053","title":{"rendered":"Gi\u00e1o d\u1ee5c v\u00e0 h\u1ecdc t\u1eadp li\u00ean t\u1ee5c"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">C\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) ng\u00e0y nay \u0111ang tr\u1ea3i qua bi\u1ebfn \u0111\u1ed5i l\u1edbn nh\u01b0ng nhi\u1ec1u ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m l\u1ea1i kh\u00f4ng \u0111\u01b0\u1ee3c chu\u1ea9n b\u1ecb \u0111\u1ec3 gi\u1ea3i quy\u1ebft v\u1edbi \u0111i\u1ec1u \u0111ang x\u1ea3y ra.<\/span><\/p>\n<p>Khi Internet tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n, k\u1ebft m\u1ea1ng v\u00e0 k\u1ebft c\u1ea5u n\u1ec1n c\u0169ng tr\u1edf th\u00e0nh m\u1ea5u ch\u1ed1t cho m\u1ecdi c\u00f4ng ti. Nhi\u1ec1u ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m tin r\u1eb1ng ch\u1ec9 n\u1ed1i m\u00e1y t\u00ednh v\u1edbi internet th\u00ec m\u1ecdi s\u1ef1 s\u1ebd l\u00e0m vi\u1ec7c nh\u01b0ng v\u1ea5n \u0111\u1ec1 kh\u00f4ng \u0111\u01a1n gi\u1ea3n th\u1ebf. M\u1ecdi c\u00f4ng ti \u0111\u1ec1u c\u1ea7n ki\u1ebfn tr\u00fac h\u1ec7 th\u1ed1ng \u0111\u1ec3 thi\u1ebft k\u1ebf, th\u1ef1c hi\u1ec7n v\u00e0 v\u1eadn h\u00e0nh c\u00e1c m\u1ea1ng, h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh, l\u01b0u gi\u1eef \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng ch\u00fang tu\u00e2n th\u1ee7 v\u1edbi ch\u00ednh s\u00e1ch an ninh, n\u1ebfu kh\u00f4ng th\u00ec m\u1ecdi h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd s\u1ebd mong manh tr\u01b0\u1edbc c\u00e1c hacker, vi r\u00fat v\u00e0 th\u01b0 r\u00e1c.<\/p>\n<p>K\u0129 n\u0103ng k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m ng\u00e0y nay nh\u01b0 ki\u1ebfn tr\u00fac h\u1ec7 th\u1ed1ng, an ninh m\u1ea1ng hi\u1ebfm khi \u0111\u01b0\u1ee3c d\u1ea1y \u1edf \u0111\u1ea1i h\u1ecdc v\u00e0 h\u1ea7u h\u1ebft ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m kh\u00f4ng bi\u1ebft c\u00e1ch ki\u1ebfn tr\u00fac h\u1ec7 th\u1ed1ng m\u1ea1ng m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3 v\u00e0 an ninh h\u01a1n \u0111\u1ec3 cho k\u1ebft n\u1ed1i t\u1eeb m\u00e1y t\u00ednh t\u1edbi internet tr\u1edf th\u00e0nh qu\u00e1 tr\u00ecnh &#8220;l\u00e0m b\u1ea5t k\u00ec c\u00f4ng vi\u1ec7c g\u00ec.&#8221; V\u1edbi nhi\u1ec1u k\u1ebft n\u1ed1i h\u01a1n \u0111\u01b0\u1ee3c c\u1ea7n t\u1edbi khi c\u00e0ng ng\u00e0y c\u00e0ng nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh, c\u00e1c c\u00f4ng ti \u0111ang v\u1eadt l\u1ed9n \u0111\u1ec3 bao qu\u00e1t s\u1ef1 ph\u00e1t tri\u1ec3n nhanh n\u00e0y khi c\u00e1c h\u1ec7 th\u1ed1ng \u0111\u01b0\u1ee3c t\u0103ng th\u00eam. Trong khi \u0111\u00f3, c\u00f4ng nghi\u1ec7p \u0111i\u1ec7n t\u1eed v\u00e0 vi\u1ec5n th\u00f4ng li\u00ean t\u1ee5c \u0111\u01b0a ra th\u1ecb tr\u01b0\u1eddng nhi\u1ec1u m\u00e1y m\u00f3c, thi\u1ebft b\u1ecb v\u00e0 nh\u1eefng c\u00f4ng ngh\u1ec7 m\u1edbi t\u1ea1o ra nhi\u1ec1u v\u1ea5n \u0111\u1ec1 l\u1eabn l\u1ed9n v\u00e0 h\u1ed7n \u0111\u1ed9n h\u01a1n cho ng\u00e0nh c\u00f4ng nghi\u1ec7p thay \u0111\u1ed5i nhanh n\u00e0y.<\/p>\n<p>Kh\u00f4ng c\u00f3 tri th\u1ee9c v\u00e0 k\u0129 n\u0103ng \u0111\u00fang v\u1ec1 m\u1ea1ng, ng\u00e0y c\u00e0ng nhi\u1ec1u c\u00f4ng ti ph\u1ea3i kho\u00e1n ngo\u00e0i m\u1ea1ng, h\u1ec7 th\u1ed1ng, v\u00e0 l\u01b0u gi\u1eef c\u1ee7a h\u1ecd cho nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5. Tuy nhi\u00ean, v\u1edbi ngo\u1ea1i l\u1ec7 c\u1ee7a nh\u00e0 cung c\u1ea5p ch\u1ea5t l\u01b0\u1ee3ng t\u1ed1t v\u1edbi k\u0129 n\u0103ng ki\u1ebfn tr\u00fac m\u1ea1nh, nhi\u1ec1u c\u00f4ng ti l\u00e0m kho\u00e1n ngo\u00e0i th\u1ef1c t\u1ebf \u0111ang l\u00e0m &#8220;vi\u1ec7c v\u00e1 v\u00edu&#8221; m\u00e0 kh\u00f4ng hi\u1ec3u t\u00ednh \u0111\u1ed5i qui m\u00f4, hi\u1ec7u n\u0103ng, t\u00ednh d\u00f9ng \u0111\u01b0\u1ee3c v\u1ed1n l\u00e0 thu\u1ed9c t\u00ednh then ch\u1ed1t c\u1ee7a ki\u1ebfn tr\u00fac h\u1ec7 th\u1ed1ng l\u00e0m ph\u00e1t sinh h\u1ec7 th\u1ed1ng kh\u00f4ng hi\u1ec7u qu\u1ea3, k\u1ebft n\u1ed1i ch\u1eadm khi nhi\u1ec1u thi\u1ebft b\u1ecb \u0111\u01b0\u1ee3c th\u00eam v\u00e0o v\u00e0 k\u00e9m an ninh v\u1edbi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng t\u00ednh to\u00e1n.<\/p>\n<p>Ng\u00e0y nay, g\u1ea7n nh\u01b0 m\u1ecdi c\u00f4ng ti \u0111\u1ec1u d\u1ef1a v\u00e0o Internet \u0111\u1ec3 l\u00e0m kinh doanh, c\u00f3 nhu c\u1ea7u l\u1edbn v\u1ec1 nh\u1eefng ng\u01b0\u1eddi l\u00e0m m\u1ea1ng \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o trong k\u0129 ngh\u1ec7 ph\u1ea7n m\u1ec1m, \u0111\u1eb7c bi\u1ec7t trong an ninh, ki\u1ebfn tr\u00fac v\u00e0 khi c\u00e1c c\u00f4ng ngh\u1ec7 m\u1edbi t\u1edbi nh\u01b0 t\u00ednh to\u00e1n \u0111\u00e1m m\u00e2y, ph\u1ea7n m\u1ec1m nh\u01b0 d\u1ecbch v\u1ee5, c\u00f3 nhi\u1ec1u nhu c\u1ea7u v\u1ec1 k\u0129 ngh\u1ec7 m\u1ea1ng &#8211; v\u00e0 ki\u1ebfn tr\u00fac m\u1ea1ng, thi\u1ebft k\u1ebf v\u00e0 th\u1ef1c hi\u1ec7n. B\u1edfi v\u00ec thay \u0111\u1ed5i trong c\u00f4ng ngh\u1ec7, tri th\u1ee9c v\u00e0 k\u0129 n\u0103ng v\u1ec1 m\u1ea1ng, an ninh thay \u0111\u1ed5i nhanh ch\u00f3ng cho n\u00ean ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m c\u1ea7n li\u00ean t\u1ee5c n\u00e2ng c\u1ea5p k\u0129 n\u0103ng c\u1ee7a h\u1ecd t\u01b0\u01a1ng \u1ee9ng. Ch\u1eb3ng h\u1ea1n, trao \u0111\u1ed5i th\u1ed1ng nh\u1ea5t -Unified Communication &#8211; UC (k\u1ec3 c\u1ea3 vi\u1ec5n h\u1ed9i th\u1ea3o) l\u00e0 xu h\u01b0\u1edbng m\u1edbi v\u1ec1 c\u00e1ch c\u00e1c t\u1ed5 ch\u1ee9c to\u00e0n c\u1ea7u t\u01b0\u01a1ng t\u00e1c v\u1edbi nhau. UC t\u1ea5t c\u1ea3 \u0111\u1ec1u v\u1ec1 k\u1ebft n\u1ed1i nhi\u1ec1u h\u1ec7 th\u1ed1ng t\u1ea1p nham \u0111\u1ec3 l\u00e0m cho n\u00f3 l\u00e0m vi\u1ec7c h\u01b0\u1edbng t\u1edbi chu\u1ea9n chung. \u0110\u1ec3 c\u00f4ng ngh\u1ec7 n\u00e0y l\u00e0m vi\u1ec7c kh\u00f4ng d\u1eebng, t\u1ed5 k\u1ebft m\u1ea1ng ph\u1ea3i c\u00f3 k\u0129 n\u0103ng cao v\u1ec1 ki\u1ebfn tr\u00fac, chi\u1ebfn l\u01b0\u1ee3c v\u00e0 th\u1ef1c hi\u1ec7n UC. V\u1edbi nhi\u1ec1u thi\u1ebft b\u1ecb di \u0111\u1ed9ng \u0111ang \u0111\u01b0\u1ee3c d\u00f9ng ng\u00e0y nay, nhi\u1ec1u h\u00e3ng vi\u1ec5n th\u00f4ng \u0111ang xem x\u00e9t g\u00f3i c\u00e1c thi\u1ebft b\u1ecb di \u0111\u1ed9ng v\u00e0 c\u00e1c ch\u1ee9c n\u0103ng kh\u00e1c l\u1ea1i b\u1edfi v\u00ec \u0111i\u1ec7n tho\u1ea1i di \u0111\u1ed9ng kh\u00f4ng ph\u1ea3i l\u00e0 \u0111i\u1ec7n tho\u1ea1i m\u00e0 c\u00f2n l\u00e0 m\u00e1y t\u00ednh v\u00e0 n\u1ec1n trao \u0111\u1ed5i qua \u0111\u00f3 th\u1ebf h\u1ec7 ti\u1ebfp c\u1ee7a \u1ee9ng d\u1ee5ng ph\u1ea7n m\u1ec1m s\u1ebd \u0111\u01b0\u1ee3c chuy\u1ec3n giao v\u00e0 h\u1ecd c\u1ea7n ki\u1ebfn tr\u00fac x\u00e1c \u0111\u1ecbnh t\u1ed1t. (Ngh\u0129 v\u1ec1 iPhone v\u00e0 h\u00e0ng ngh\u00ecn \u1ee9ng d\u1ee5ng)<\/p>\n<p>T\u1ea5t c\u1ea3 c\u00e1c xu h\u01b0\u1edbng n\u00e0y tr\u1ecf t\u1edbi m\u1ed9t \u0111i\u1ec1u then ch\u1ed1t: Gi\u00e1o d\u1ee5c v\u00e0 \u0111\u00e0o t\u1ea1o li\u00ean t\u1ee5c l\u00e0 b\u1ea3n ch\u1ea5t cho m\u1ecdi ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m. T\u00f4i m\u1ea1nh m\u1ebd khuy\u00ean nh\u1eefng ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m h\u1ecdc c\u00e1c kho\u00e1 \u0111\u00e0o t\u1ea1o th\u00eam \u0111\u1ec3 n\u00e2ng c\u1ea5p k\u0129 n\u0103ng c\u1ee7a m\u00ecnh khi c\u00f4ng ngh\u1ec7 ti\u1ebfp t\u1ee5c thay \u0111\u1ed5i.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Continuous education and learning<\/p>\n<p>Today Information Technology (IT) is undergoing significant transformations but many software people are not preparing to deal with what is happening.<\/p>\n<p>As the Internet became more popular, networking and infrastructure also became critical to all companies. Many software people believe that just connect computer to the internet then everything will work but it is not that simple. Every company needs system architects to design, implement and operate networks, computing systems, storage to ensure that they are in compliance with security policies or else all of their systems will be vulnerable for hackers, viruses, and Spam.<\/p>\n<p>Today software engineering skills such as system architecture, network security are rarely taught at university and most software people did not know how to architect network systems efficiently and more securely so the connection from computers to internet became a process of &#8220;doing whatever work&#8221;. With more connection needed as more and more people using computer, companies are struggling to cope with this fast growth as more systems are added. Meanwhile, the electronic and telecom industry continue to place in the market more machines, devices, and new technologies create more confusing and chaotic problems to the fast changing industry.<\/p>\n<p>Without the proper knowledge and skills in networks, more and more companies are outsourced their networks, systems and storages to services providers. However, with the exception of a well qualified provider with strong architecture skills, many outsourced companies are actually still doing &#8220;patchworks&#8221; without understanding of scalability, performance, usability which are key attributes of system architecture resulting in inefficient systems, slow connections as more devices are added and less secure to computing attacks.<\/p>\n<p>Today, almost all companies are relying on the Internet to do business, there are significant demand in network people trained in software engineering, especially in security, architect and as new technologies come on line such as cloud computing, software as services, there are more demand in network engineering-and architecting, design and implementation. Because the changing in technologies, the knowledge and skills in network, security also change rapidly so software people need to continue to upgrade their skills accordingly. For example, Unified communications (including teleconferencing) is a new trend on how global organizations interact with each others. UC is all about connecting many disparate systems to make it work toward a common standard. For this technology to work seamlessly, networking teams must be highly skilled in UC architecture, strategy and implementation. With many mobile devices are being used today many telecom firms are considering bundling mobile devices and other functions together because cell phone is not a phone but also a Computer and communications platforms across which next-generation of software applications will be delivered and they need a well defined architecture. (Think iPhone and thousands of applications)<\/p>\n<p>All of these trends point to one key thing: Continue education and training are essential to all software people. I strongly advise software people to take additional trainings to upgrade their skills as technology continues to change.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) ng\u00e0y nay \u0111ang tr\u1ea3i qua bi\u1ebfn \u0111\u1ed5i l\u1edbn nh\u01b0ng nhi\u1ec1u ng\u01b0\u1eddi l\u00e0m ph\u1ea7n m\u1ec1m l\u1ea1i kh\u00f4ng \u0111\u01b0\u1ee3c chu\u1ea9n b\u1ecb \u0111\u1ec3 &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3053","post","type-post","status-publish","format-standard","hentry","category-xu-huong-toan-cau"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/3053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3053"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/3053\/revisions"}],"predecessor-version":[{"id":3055,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/3053\/revisions\/3055"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}