	{"id":4634,"date":"2014-12-26T00:42:48","date_gmt":"2014-12-25T17:42:48","guid":{"rendered":"http:\/\/science-technology.vn\/?p=4634"},"modified":"2014-12-26T00:42:48","modified_gmt":"2014-12-25T17:42:48","slug":"ki-nang-tuong-lai-viec-lam-tuong-lai","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=4634","title":{"rendered":"K\u0129 n\u0103ng t\u01b0\u01a1ng lai, vi\u1ec7c l\u00e0m t\u01b0\u01a1ng lai"},"content":{"rendered":"<p>Theo m\u1ed9t b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, n\u0103m n\u0103m t\u1edbi s\u1ebd l\u00e0 r\u1ea5t t\u1ed1t cho sinh vi\u00ean trong C\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) v\u00ec c\u00f4ng nghi\u1ec7p ti\u1ebfp t\u1ee5c m\u1edf r\u1ed9ng v\u1edbi t\u0103ng tr\u01b0\u1edfng vi\u1ec7c l\u00e0m nhi\u1ec1u tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi. S\u1ebd c\u00f3 nhi\u1ec1u c\u01a1 h\u1ed9i h\u01a1n bao gi\u1edd khi nhi\u1ec1u vi\u1ec7c l\u00e0m \u0111\u01b0\u1ee3c th\u00eam v\u00e0o v\u00e0 l\u01b0\u01a1ng kh\u1edfi \u0111i\u1ec3m s\u1ebd ti\u1ebfp t\u1ee5c leo cao cho nh\u1eefng c\u00f4ng nh\u00e2n \u0111\u00e1p \u1ee9ng \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u. Tuy nhi\u00ean, ph\u1ea7n l\u1edbn c\u00e1c v\u1ecb tr\u00ed s\u1ebd y\u00eau c\u1ea7u \u00edt nh\u1ea5t l\u00e0 b\u1eb1ng c\u1eed nh\u00e2n hay cao h\u01a1n v\u00ec h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh \u0111ang ng\u00e0y c\u00e0ng l\u1edbn h\u01a1n v\u00e0 ph\u1ee9c t\u1ea1p h\u01a1n \u0111\u00f2i h\u1ecfi c\u00e1c k\u0129 n\u0103ng k\u0129 thu\u1eadt \u0111\u1eb7c bi\u1ec7t. H\u01a1n th\u1ebf n\u1eefa, khi c\u00f4ng ngh\u1ec7 thay \u0111\u1ed5i, c\u00f4ng nh\u00e2n ph\u1ea3i n\u00e2ng c\u1ea5p k\u0129 n\u0103ng c\u1ee7a h\u1ecd, n\u1ebfu kh\u00f4ng h\u1ecd s\u1ebd kh\u00f4ng c\u00f3 kh\u1ea3 n\u0103ng t\u00ecm \u0111\u01b0\u1ee3c c\u00f4ng vi\u1ec7c. M\u1ed9t ng\u01b0\u1eddi qu\u1ea3n l\u00ed c\u1ea5p cao gi\u1ea3i th\u00edch: \u201cTh\u1eddi c\u1ee7a ng\u01b0\u1eddi l\u1eadp tr\u00ecnh v\u00e0 ng\u01b0\u1eddi ki\u1ec3m th\u1eed ch\u1ec9 c\u00f3 v\u00e0i th\u00e1ng \u0111\u00e0o t\u1ea1o \u0111\u00e3 qua r\u1ed3i. N\u1ebfu b\u1ea1n kh\u00f4ng chuy\u00ean m\u00f4n ho\u00e1, b\u1ea1n s\u1ebd kh\u00f4ng c\u00f3 \u0111\u01b0\u1ee3c vi\u1ec7c l\u00e0m. Ngay c\u1ea3 nh\u1eefng c\u00f4ng nh\u00e2n c\u00f3 nhi\u1ec1u n\u0103m kinh nghi\u1ec7m, n\u1ebfu h\u1ecd kh\u00f4ng h\u1ecdc k\u0129 n\u0103ng m\u1edbi, h\u1ecd c\u00f3 th\u1ec3 kh\u00f4ng gi\u1eef \u0111\u01b0\u1ee3c vi\u1ec7c l\u00e0m c\u1ee7a h\u1ecd. Ng\u00e0y nay c\u00f4ng nghi\u1ec7p c\u00f4ng ngh\u1ec7 th\u00f4ng tin \u0111\u00f2i h\u1ecfi c\u00e1c k\u0129 n\u0103ng chuy\u00ean m\u00f4n ho\u00e1, hi\u1ebfm khi t\u00ecm \u0111\u01b0\u1ee3c vi\u1ec7c l\u00e0m m\u1edf ra m\u00e0 kh\u00f4ng y\u00eau c\u1ea7u b\u1eb1ng \u0111\u1ea1i h\u1ecdc hay k\u0129 n\u0103ng \u0111\u1eb7c bi\u1ec7t.\u201d<\/p>\n<p>M\u1ed9t ng\u01b0\u1eddi \u0111i\u1ec1u h\u00e0nh ph\u1ea7n m\u1ec1m h\u00e0ng \u0111\u1ea7u n\u00f3i: \u201cCh\u00fang t\u00f4i d\u1ef1 b\u00e1o r\u1eb1ng n\u0103m n\u0103m n\u1eefa s\u1ebd c\u00f3 nhi\u1ec1u thay \u0111\u1ed5i v\u1edbi nhi\u1ec1u c\u00f4ng vi\u1ec7c d\u1ef1a tr\u00ean d\u1ef1 \u00e1n, v\u00e0 ch\u00fang t\u00f4i \u0111ang d\u1ef1 ki\u1ebfn r\u1eb1ng s\u1ebd c\u00f3 nhi\u1ec1u ph\u00e1t tri\u1ec3n m\u1edbi. Ng\u00e0y nay nhi\u1ec1u c\u00f4ng ti \u0111ang l\u1eadp k\u1ebf ho\u1ea1ch l\u00e0m nh\u1eefng d\u1ef1 \u00e1n l\u1edbn h\u01a1n nh\u01b0ng h\u1ecd ph\u1ea3i thi\u1ebft l\u1eadp k\u1ebft c\u1ea5u n\u1ec1n n\u00e0o \u0111\u00f3 \u0111\u1ec3 ch\u1eafc r\u1eb1ng h\u1ecd \u0111\u01b0\u1ee3c an ninh tr\u01b0\u1edbc khi b\u1eaft \u0111\u1ea7u d\u1ef1 \u00e1n c\u1ee7a m\u00ecnh. Trong v\u00e0i n\u0103m t\u1edbi, ph\u1ea7n l\u1edbn c\u00e1c c\u00f4ng ti s\u1ebd b\u1eadn r\u1ed9n h\u01a1n h\u01a1n bao gi\u1edd \u0111\u1ec3 t\u1ef1 \u0111\u1ed9ng ho\u00e1 c\u00e1c qui tr\u00ecnh c\u1ee7a h\u1ecd \u0111\u1ec3 t\u0103ng hi\u1ec7u qu\u1ea3.\u201d M\u1ed9t ng\u01b0\u1eddi qu\u1ea3n l\u00ed thu\u00ea ng\u01b0\u1eddi n\u00f3i v\u1edbi b\u00e1o ch\u00ed: \u201cS\u1ebd c\u00f3 nhi\u1ec1u vi\u1ec7c l\u00e0m m\u1edf ra trong CNTT nh\u01b0ng th\u1ecb tr\u01b0\u1eddng \u0111\u00e3 thay \u0111\u1ed5i. Ph\u1ea7n l\u1edbn c\u00e1c vi\u1ec7c l\u00e0m s\u1ebd y\u00eau c\u1ea7u nhi\u1ec1u h\u01a1n ch\u1ec9 c\u00e1c k\u0129 n\u0103ng k\u0129 thu\u1eadt. B\u1ea5t k\u00ec ai c\u0169ng c\u00f3 th\u1ec3 h\u1ecdc c\u00e1c k\u0129 n\u0103ng k\u0129 thu\u1eadt nh\u01b0ng ch\u1eebng n\u00e0o h\u1ecd c\u00f2n ch\u01b0a c\u00f3 k\u0129 n\u0103ng m\u1ec1m, t\u00ednh tr\u00e1ch nhi\u1ec7m v\u00e0 t\u00ednh ph\u1ee5 thu\u1ed9c, h\u1ecd c\u00f3 th\u1ec3 kh\u00f4ng \u0111\u01b0\u1ee3c thu\u00ea. Ch\u00fang t\u00f4i mu\u1ed1n thu\u00ea nh\u1eefng ng\u01b0\u1eddi c\u00f3 k\u1ebf ho\u1ea1ch ngh\u1ec1 nghi\u1ec7p v\u1eefng v\u00ec ch\u00fang t\u00f4i s\u1ebd h\u1ecfi h\u1ecd xem h\u1ecd th\u1ea5y b\u1ea3n th\u00e2n h\u1ecd \u1edf \u0111\u00e2u h\u00f4m nay, h\u1ecd s\u1ebd \u1edf \u0111\u00e2u sang n\u0103m, h\u1ecd s\u1ebd \u1edf \u0111\u00e2u trong n\u0103m n\u0103m. Nh\u1eefng \u0111i\u1ec1u \u0111\u00f3 l\u00e0 nh\u1eefng kh\u00eda c\u1ea1nh r\u1ea5t quan tr\u1ecdng c\u1ee7a vi\u1ec7c hi\u1ec3u b\u1ea3n k\u1ebf ho\u1ea1ch ngh\u1ec1 nghi\u1ec7p c\u1ee7a h\u1ecd v\u00e0 h\u1ecd s\u1ebd l\u00e0 c\u00e1i g\u00ec. Nh\u1eefng ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng k\u0129 thu\u1eadt m\u00e0 th\u01b0\u1eddng \u0111\u1ed5i vi\u1ec7c l\u00e0m \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c l\u01b0\u01a1ng t\u1ed1t h\u01a1n s\u1ebd h\u1ea7u h\u1ebft b\u1ecb lo\u1ea1i b\u1ecf.&#8221;<\/p>\n<p>M\u1eb7c d\u1ea7u Ng\u01b0\u1eddi ph\u00e2n t\u00edch Big Data v\u00e0 c\u00e1c chuy\u00ean vi\u00ean T\u00ednh to\u00e1n m\u00e2y \u0111ang c\u00f3 nhu c\u1ea7u cao nh\u01b0ng nhu c\u1ea7u cao nh\u1ea5t l\u00e0 chuy\u00ean vi\u00ean An ninh th\u00f4ng tin. B\u00e1o c\u00e1o n\u00e0y n\u00f3i r\u1eb1ng an ninh t\u00ednh to\u00e1n s\u1ebd r\u1ea5t m\u1ea5u ch\u1ed1t cho m\u1ecdi n\u01b0\u1edbc nh\u01b0ng c\u00f3 \u00edt c\u00f4ng nh\u00e2n \u0111\u1ee7 t\u01b0 c\u00e1ch cho n\u00ean c\u00f4ng ti s\u1ebd ph\u1ea3i tr\u1ea3 nhi\u1ec1u ti\u1ec1n \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c h\u1ecd v\u00ec th\u1ecb tr\u01b0\u1eddng c\u00f3 t\u00ednh c\u1ea1nh tranh. Ng\u01b0\u1eddi ta \u01b0\u1edbc l\u01b0\u1ee3ng r\u1eb1ng th\u1ebf gi\u1edbi s\u1ebd c\u1ea7n n\u1eeda tri\u1ec7u chuy\u00ean vi\u00ean an ninh tr\u01b0\u1edbc n\u0103m 2015. Ngay c\u1ea3 ng\u00e0y nay, c\u00e1c c\u00f4ng ti \u0111ang g\u1eb7p kh\u00f3 kh\u0103n t\u00ecm \u0111\u01b0\u1ee3c \u1ee9ng c\u1eed vi\u00ean \u0111\u1ec3 l\u1ea5p v\u00e0o v\u1ecb tr\u00ed n\u00e0y cho n\u00ean r\u1ea5t c\u00f3 th\u1ec3 l\u00e0 nhi\u1ec1u n\u01b0\u1edbc s\u1ebd ph\u1ea3i \u201cnh\u1eadp kh\u1ea9u\u201d c\u00f4ng nh\u00e2n n\u01b0\u1edbc ngo\u00e0i, ng\u01b0\u1eddi chuy\u00ean m\u00f4n ho\u00e1 trong l\u0129nh v\u1ef1c n\u00e0y \u0111\u1ec3 \u0111\u00e1p \u1ee9ng nhu c\u1ea7u n\u00e0y. Theo b\u00e1o c\u00e1o n\u00e0y, nh\u1eefng vi\u1ec7c l\u00e0m h\u00e0ng \u0111\u1ea7u l\u00e0:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0\u00a0 Chuy\u00ean vi\u00ean an ninh th\u00f4ng tin<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi ph\u00e2n t\u00edch Big data<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0\u00a0 Chuy\u00ean vi\u00ean t\u00ednh to\u00e1n m\u00e2y<\/p>\n<p>4)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n app di \u0111\u1ed9ng<\/p>\n<p>5)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi ph\u00e2n t\u00edch h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh<\/p>\n<p>6)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n Web (c\u1ea3 m\u1eb7t ti\u1ec1n v\u00e0 m\u1eb7t h\u1eadu)<\/p>\n<p>7)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m,<\/p>\n<p>8)\u00a0\u00a0\u00a0\u00a0\u00a0 Ng\u01b0\u1eddi qu\u1ea3n tr\u1ecb c\u01a1 s\u1edf d\u1eef li\u1ec7u<\/p>\n<p>V\u1ecb tr\u00ed c\u00f3 nhu c\u1ea7u cao nh\u1ea5t, An ninh th\u00f4ng tin, y\u00eau c\u1ea7u c\u00f4ng nh\u00e2n c\u00f3 c\u1ea3 k\u0129 n\u0103ng gi\u1ea3i quy\u1ebft v\u1ea5n \u0111\u1ec1 v\u00e0 ph\u00e2n t\u00edch. H\u1ecd ph\u1ea3i c\u00f3 hi\u1ec3u bi\u1ebft m\u1ea1nh v\u1ec1 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh v\u00e0 c\u00e1c qyu ch\u1ebf v\u00e0 chu\u1ea9n an ninh. Chuy\u00ean vi\u00ean An ninh th\u00f4ng tin ph\u1ea3i l\u1eadp k\u1ebf ho\u1ea1ch v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p an ninh \u0111\u1ec3 b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh, mahng v\u00e0 d\u1eef li\u1ec7u c\u1ee7a c\u00f4ng ti. H\u1ecd ph\u1ea3i duy tr\u00ec c\u1eadp nh\u1eadt v\u1ec1 nh\u1eefng tin t\u1ee9c m\u1edbi nh\u1ea5t bao quanh ph\u01b0\u01a1ng ph\u00e1p lu\u1eadn c\u1ee7a c\u00e1c hacker \u0111\u1ec3 cho h\u1ecd c\u00f3 th\u1ec3 d\u1ef1 b\u00e1o v\u00e0 ng\u0103n c\u1ea3n vi ph\u1ea1m an ninh. H\u1ecd c\u0169ng ch\u1ecbu tr\u00e1ch nhi\u1ec7m ng\u0103n c\u1ea3n m\u1ea5t m\u00e1t d\u1eef li\u1ec7u v\u00e0 ng\u1eaft d\u1ecbch v\u1ee5 b\u1edfi li\u00ean t\u1ee5c h\u1ecdc c\u00e1c c\u00f4ng ngh\u1ec7 m\u1edbi m\u00e0 s\u1ebd b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng CNTT. M\u1ed9t trong nh\u1eefng l\u00ed do cho vi\u1ec7c thi\u1ebfu h\u1ee5t c\u00f4ng nh\u00e2n trong l\u0129nh v\u1ef1c n\u00e0y l\u00e0 ch\u1ec9 v\u00e0i \u0111\u1ea1i h\u1ecdc cung c\u1ea5p \u0111\u00e0o t\u1ea1o chuy\u00ean m\u00f4n ho\u00e1 v\u00e0 h\u1ecd th\u01b0\u1eddng c\u00f3 t\u00ednh r\u1ea5t ch\u1ecdn l\u1ecdc.<\/p>\n<p>Ng\u01b0\u1eddi ph\u00e2n t\u00edch Big data l\u00e0 v\u1ecb tr\u00ed c\u00f3 nhu c\u1ea7u cao kh\u00e1c y\u00eau c\u1ea7u c\u00f4ng nh\u00e2n c\u00f3 k\u0129 n\u0103ng ch\u1eafc trong to\u00e1n h\u1ecdc v\u00e0 th\u1ed1ng k\u00ea. B\u00ean c\u1ea1nh c\u00e1c k\u0129 n\u0103ng t\u00ednh to\u00e1n h\u1ecd c\u0169ng ph\u1ea3i hi\u1ec3u c\u00e1c ng\u1ee5 \u00fd doanh nghi\u1ec7p c\u1ee7a t\u1eadp d\u1eef li\u1ec7u l\u1edbn. K\u0129 n\u0103ng m\u1ec1m c\u0169ng \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng cho vi\u1ec7c l\u00e0m n\u00e0y v\u00ec h\u1ecd th\u01b0\u1eddng xuy\u00ean trao \u0111\u1ed5i v\u00e0 l\u00e0m vi\u1ec7c v\u1edbi nh\u1eefng ng\u01b0\u1eddi qu\u1ea3n l\u00ed, ng\u01b0\u1eddi \u0111i\u1ec1u h\u00e0nh v\u00e0 ng\u01b0\u1eddi ph\u00e2n t\u00edch doanh nghi\u1ec7p. B\u00ean ngo\u00e0i vi\u1ec7c ph\u00e2n t\u00edch d\u1eef li\u1ec7u hi\u1ec7n c\u00f3 v\u00e0 d\u1eef li\u1ec7u c\u00f4ng nghi\u1ec7p, h\u1ecd ph\u1ea3i c\u00f3 kh\u1ea3 n\u0103ng hi\u1ec3u d\u1eabn l\u00e1i then ch\u1ed1t c\u1ee7a c\u00f4ng ti v\u00e0 c\u00e1ch d\u1eef li\u1ec7u c\u00f3 th\u1ec3 \u0111\u00f3ng g\u00f3p cho chi\u1ebfn l\u01b0\u1ee3c doanh nghi\u1ec7p v\u00e0 th\u00e0nh c\u00f4ng c\u1ee7a c\u00f4ng ti. V\u00ec \u0111\u00e0o t\u1ea1o Big data l\u00e0 m\u1edbi v\u00e0 ch\u1ec9 \u00edt \u0111\u1ea1i h\u1ecdc c\u00f3 ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o, kh\u00f3 t\u00ecm \u0111\u01b0\u1ee3c \u1ee9ng c\u1eed vi\u00ean \u0111\u1ee7 t\u01b0 c\u00e1ch.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;English version&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>Future skills, future jobs<\/p>\n<p>According to an industry report, the next five years will be very good for students in Information Technology (IT) as the industry continues to expand with significant job growth all over the world. There will be more opportunities than ever as more jobs are added and starting salary will continue to climb for qualified workers. However, most positions will require at least a Bachelor\u2019s degree or higher because computer systems are getting larger and more complex which require special technical skills. More than that, as technology is changing, workers must upgrade their skills, and else they will not be able to find works. A senior manager explained: \u201cThe time of programmers and testers who only have few months of training is over. If you do not specialize, you will not get job. Even workers that have several years of experience, if they do not learn new skills, they may not be able to keep their job. Today information technology industry demands specialized skills, it is rare to find job openings that do not require a college degree or special skills.\u201d<\/p>\n<p>A top software executive said: \u201cWe anticipate that the next five years will have many changes with a lot of project-based work, and we are predicting that it will be more on new development. Today many companies are planning to do bigger projects but they must set up certain infrastructure to make sure that they are secured before starting their projects. In the next few years, most companies will be busier than ever to automate their processes to increase efficiency.\u201d A top hiring manager told newspapers: \u201cThere will be a lot of job openings in IT but the market has changed. Most jobs will require more than just technical skills. Anyone can learn technical skills but unless they also have soft-skills, responsibility and dependability, they may not get hired. We want to hire people with strong career plan as we will ask them where they see themselves today, where they will be next year, where they will be in five years. Those are very important aspects of understanding their career plan and what they will be. People with technical skills who often change job to get better salary will mostly be eliminated.&#8221;<\/p>\n<p>Although Big Data Analysts and Cloud Computing Specialists are in high demand but the highest demand is Information Security specialists. The report stated that computing security will be very critical for every country but there are so few qualified workers so company will have to pay a lot to get them as the market is competitive. It is estimated that the world will need half million of security specialists by 2015. Even today, companies are having a difficulty finding candidates to fill this position so it is very likely that many countries will have to \u201cimport\u201d foreign workers who specialize in this field to meet this need. According to the report, the top jobs are:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0\u00a0 Information security specialists<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0\u00a0 Big data analysts<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud computing specialists<\/p>\n<p>4)\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile apps developers<\/p>\n<p>5)\u00a0\u00a0\u00a0\u00a0\u00a0 Computer systems analysts<\/p>\n<p>6)\u00a0\u00a0\u00a0\u00a0\u00a0 Web developers (Both front end and back end)<\/p>\n<p>7)\u00a0\u00a0\u00a0\u00a0\u00a0 Software developers,<\/p>\n<p>8)\u00a0\u00a0\u00a0\u00a0\u00a0 Database administrators<\/p>\n<p>The highest demand position, Information Security requires workers to possess both problem-solving and analytical skills. They must have strong understanding of computer systems and security regulations and standards. Information Security specialists must plan and implement security measures to protect company\u2019s computer systems, networks and data. They must stay up-to-date on the latest news surrounding hackers&#8217; methodologies so they can anticipate and prevent security breaches. They also are responsible for preventing data loss and service interruptions by continue to learn new technologies that will protect the IT systems. One of the reasons for the shortage of workers in this field is only few universities offer specializing trainings and they often very selective.<\/p>\n<p>Big data analyst is another high demand position that requires workers to have strong skills in mathematics and statistics. Besides computing skills they must also understand the business implications of complex data sets. Soft skills also play an important role for this job as they are constantly communicating and working with managers, executives and business analysts. Beyond analyzing existing data and industry data, they must be able to understand key driver of the company and how the data can contribute to business strategy and success of the company. Since Big data training is new and only few universities have training program, it is difficult to find qualified candidates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Theo m\u1ed9t b\u00e1o c\u00e1o c\u00f4ng nghi\u1ec7p, n\u0103m n\u0103m t\u1edbi s\u1ebd l\u00e0 r\u1ea5t t\u1ed1t cho sinh vi\u00ean trong C\u00f4ng ngh\u1ec7 th\u00f4ng tin (CNTT) v\u00ec c\u00f4ng nghi\u1ec7p &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4634","post","type-post","status-publish","format-standard","hentry","category-xu-huong-toan-cau"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4634"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4634\/revisions"}],"predecessor-version":[{"id":4635,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/4634\/revisions\/4635"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}