çããªãç´ã«æ¸ãããããã¸ã§ã¯ããªããçãã¾ãããï¼ï¼æå¾ ã®ç®ï¼ 次åã¯ãããã¥ã¡ã³ãä½æãã§ãã âä»ã®ç¨èªè§£èª¬ãèªãã§ã¿ã â ãè¦ä»¶å®ç¾©ãï¼ããããè¨äºã»è¶ ã¾ã¨ã ID管çã·ã¹ãã ãè¦ä»¶å®ç¾©ããåºæ¬è¨è¨ã¾ã§ï¼ï¼ IT Security&Trust 2009å¹´6æï¼ ãã¾ããID管çã·ã¹ãã ãå°å ¥ãããªãã°ãå 人ã®ç¥æµãå®ä¾ãè¸ã¾ããå½¢ã§è¨è¨ãã¹ãã§ãã ãã¼ã¿ãã¼ã¹è¨è¨ã¯ãã¤ãä½ããã¤ã³ãã«è¡ããï¼ï¼ IT Database Expert 2009å¹´7æï¼ ã·ã¹ãã éçºã©ã¤ããµã¤ã¯ã«ã¨ç §ããåãããããããã®ãã§ã¤ãºã§å¿ è¦ã¨ãªããã¼ã¿ãã¼ã¹è¨è¨ã«ã¤ãã¦ãã話ããã¾ãã è¦ä»¶å®ç¾©ã®ãã¤ã³ããåãã3ã¤ã®ãã¯ã¤ããã¼ãã¼ï¼TechTarget Japan 2012å¹´8æï¼ ERPãªã©ã®ã¢ããªã±ã¼ã·ã§ã³éçºãæåãããä¸ã§éè¦ã«ãªãè¦ä»¶å®ç¾©ãè¤æ°ã®é¨éãé¢ä¸ããã ãã«ãã®ä½æã¯ç°¡åã§ã¯ãªããè¦ä»¶
{{#tags}}- {{label}}
{{/tags}}