GregoryCarter
1+ Views

300-070 Exam Simulator Very best Method to Pass 300-070 Exam in 1st Shot

As to produce a stand inside the CCNP Collaboration world 1 has to take probably the most efficient and most worthwhile certification exam like Cisco 300-070 certification exam. CIPTV1 300-070 exam can help you in getting your career to a brand new level. One more side in the coin is fairly harsh, i.e. passing the Cisco 300-070 exam questions is among the troublesome tasks. Should you want to pass the 300-070 new questions, then you definitely must take into account taking essentially the most updated 300-070 exam simulator and pdf dumps questions offered by the reputed firm. If you're within the want of the newest 300-070 braindumps questions, then you definitely ought to get the 300-070 dumps questions in the Braindumps4Exams.

Practice For 300-070 New Questions With 300 070 Exam Simulator
Besides Cisco 300-070 exam dump Braindumps4Exams also gives the new updated CIPTV1 300-070 exam simulator that will help you in obtaining the perfect notion of the Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) actual exam. Together with the aid in the Cisco 300-070 exam simulator you will get your self-assessment for the Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) new questions. You can also get the correct understanding from the actual Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) exam because the Braindumps4Exams exam simulator follows the true exam guidelines and interface.

Newest Cisco 300-070 PDF Dumps Of Braindumps4Exams
Latest Cisco 300-070 pdf dumps provided by the Braindumps4Exams will be the complete approach to prepare and pass the 300 070 new questions. Cisco 300-070 pdf dumps cover each and every subject in the Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) exam syllabus. Theses top-notched 300-070 exam dumps have been prepared by the Cisco specialists that have utilized their encounter to give you the finish item within the type of Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) exam dumps which will certainly assist you to in acquiring the Implementing Cisco IP Telephony and Video Part 1 (CIPTV1) certification in the very first attempt. A lot more together with the assist in the Cisco 300-070 exam simulator you'll be able to prepare for the CIPTV1 300-070 exam questions in accordance with your personal timetable.

Check The Testimonials Of Cisco 300-070 Exam Dumps For More Credibility
In case you are nevertheless feeling hesitant in choosing the Cisco 300-070 exam dumps as your preparation material, then you must check the 300-070 testimonials where the CCNP Collaboration professionals have shared their expertise. With 300-070 preparation material you will get the 90 daysโ€™ cost-free updates with all the 300 070 braindumps. You may also get the 100% passing assure with the 300-070 dumps questions. All in all, get the 300-070 exam simulator of Braindumps4Exams and joins the family of greater than 50,000+ happy customers.
0 Likes
0 Shares
Comment
Suggested
Recent
Cards you may also be interested in
Incorrect Question 2 of 8 ncorrect EA Sapling Learning Joey, David, Tracy, and Surly own one track
Incorrect Question 2 of 8 ncorrect EA Sapling Learning Joey, David, Tracy, and Surly own one track bicycle apiece, and they've each modified to sell them as fixed- gear bikes or "fixies." Joey is willing to sell his bike at $100 or more. Likewise, David will sell his fixie for $150, Tracy at $200, and Surly for $350. Currently, all fixies sell for $250. On the graph below, move the gray Price line from $0 to the market price for fixies. Then, draw each person's producer surplus (PS) by moving the areas assigned to each seller. Place the seller with the largest producer surplus the furthest to the left. If a seller would not sell a bike, leave their shaded area where it is. Maintain the orientation of each area when creating the graph (i.e., the lower left corner of a shaded area should remain that area's lower left corner, and likewise for the other corners). Also pay attention to the quantity axis and make sure the shaded areas have a width of 1 The total producer surplus is 450 Number 400 300 350 300 Price 250 200 Incorrect Joey's cost of $100 is the lowest, so make sure 15 you place his PS bar furthest to the left. This 00 means the upper left and bottom left points should both be somewhere on the vertical axis. David Tracy Joey The producer surplus for an individual seller is 0.5 T 1.5 2 2.5 3.5 4 4.5 5 their cost subtracted from what value? That value is where the upper left point should go Quantity (number of fixies) A Previous Give Up & View Solution Try Again Next Exit
Why join a graphic design course?
Many universities and colleges are now leaning towards the practical and technical courses. The reason behind taking such a step is that now student likes to focus more on creative thinking. Students need more conceptualization and creative work to be processed so that they can attain more practical knowledge. About the Graphic designing course There are many courses available which are on peak but only a few are there who are able to attain more students. The graphic design courses in India is one of them, in which students get to personally create their own work. Graphic design courses in India focus less on theoretical aspects as they work actively towards imparting knowledge practically. Students during the course get along with the different activities which guide them in bringing the best design work from their end. More Information about the course and Colleges There are many colleges that offer graphic design courses in India which imparts knowledge about the designing work. The course is done in either bachelors or masters which is termed as B. des and M.des respectively. In these years student transform themselves from no one to a supreme graphic designer. The skills learned in the whole course and also attending some seminars, workshops, and also visiting fashion houses, or digital marketing houses, and many more places where the graphic design work takes place. During the whole course, students get along with many techniques that involve multimedia, abode premiere, adobe after effects, sound forge, and many more techniques that are used by the designer while working on a particular project. Career options after the course There are many opportunities after having the degree of graphic design courses in India. Having the degree of graphic designing one should access it with analytical skills, artistic skills, communication skills, computer skills, etc as it allows the student to enter the best industry who is governing graphic designing. Some career options that students can follow are art directors, draft publishers, web developers, animators.
DIGITAL FORENSICS: KEY SKILLS OF A CERTIFIED INVESTIGATOR
The terms โ€˜forensicsโ€™, โ€˜digital forensicsโ€˜, โ€˜computer forensicsโ€˜, or โ€˜cyber forensicsโ€™ gives the impression of law enforcement. Whereas, in reality, digital forensics plays an important role in cybersecurity. Digital forensic is an independent team of cyber forensic is an expertise similar to other cybersecurity teams. Proficient standards to be a certified cyber forensic investigator Owing to a continuous demand for digital forensic training by the companies, appreciable number of certifications are available. Employers preferably look for certified forensic investigators having key-skills on digital forensic. The most common standards that a certified digital forensic investigator should have are as follows: โ€œPractitioners require technical and professional training in digital forensics principles and processes.โ€ โ€“ Jason Jordaan, principal forensic scientist at DFIRLABS, at the ITWeb Security Defeating anti-forensics techniques Computer forensic tools allow cyber forensic investigators to retrieve deleted files. On other hand, anti-forensic tools do the reverse. Anti-forensic tools and techniques work against cyber forensic tools. The anti-forensic tools alters, hides, or deletes the information. Anti-forensic tools also implicate users by introducing fake evidences, or by exploiting bugs in the tools, and more. A digital forensic investigator is the one who should have the knowledge and skill to identify and mitigate anti-forensic tools and techniques. Understanding hard disks and file systems Hard disk and internal files serve as important sources of information to the forensic investigator. Hence, an investigator should be aware of behavior and structure of hard disk. A cyber forensic investigator should be able to retrieve, protect, and store the information from the hard disk drive. The procedure of file system is also important during investigation as it relates with the hard disk again. Operating system forensics Operating system forensic is the process of identifying evidences from the operating system. It involves extracting and analyzing information from the operating systems of any device. The common operating systems like MAX, Windows, and Linux are usually targeted for criminal activities. A cyber forensic investigator should have a complete knowledge of these systems to trace the cyberattacks. Investigating email crimes Due to large dependency on the electronic communication channels, email has evolved as a preferred source of communication. The reliable nature of emails has become a powerful tool for criminals. They use emails to perform phishing and other common cyberattacks in large volumes. Regional laws govern email crimes except those that are agreed globally. The trailing emails can be a great source of information to the forensic investigators. Cloud forensic Cloud computing is an emerging technology, which many organizations are adopting the trend. On another hand, due to their potential repository of data, attackers perpetrate various attacks. The attackers make their attempts continuously to gain anonymous access over the cloud networks and retrieve the information. A cloud forensic implies the application of forensic investigation in a cloud environment. The cloud network involves both public and private networks. A digital forensic investigator is well-versed with cloud forensic to get through the investigation process. Dawie Wentzel, Head of Cyber Forensics Investigation at Absa Group has shared immense information on the latest tools and methods to collect cloud-stored data in accordance with evidentiary requirements. During his webinar via Cyber Talks, Dawie talked about the numerous challenges of legally obtaining cloud-stored electronic evidence and possible solutions. Watch the full Cyber Talk here: https://www.eccu.edu/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps/ Mobile forensics Mobile device forensics is the process of recovering digital evidence from mobile phones during the investigation process. A certified digital forensic investigator can examine and report possible digital evidence sources from mobile phones. The investigator collects the evidence to present in the court of law. The certified forensic investigators analyze the mobile phones for message history, call history, pictures, or other data on the memory to trace the perpetrators of crimes. The Computer Forensic Hacking Investigation (C|HFI) is a recognized certification on cyber forensic from EC-Council. The certification validates the candidatesโ€™ skills in identifying perpetratorsโ€™ footprints and gather the evidence to produce in the court of law. C|HFI is a vendor-neutral certification that fortifies the application knowledge of law enforcement personnel, security officers, military personnel, system administrators and everyone concerned of the integrity of the network infrastructure.
84% OF EMPLOYERS FIND CYBERSECURITY CERTIFICATIONS THAT ALIGN WITH MILITARY JOB ROLES AS THE GOLD STANDARD FOR HIRING
University of Phoenix and EC-Council release a joint survey that highlights the cyber certifications employers seek in new candidates A new survey from University of Phoenix and the International Council of E-Commerce Consultants (EC-Council) found that 59% of surveyed companies with 100 or more employees plan to staff information security professionals in 2020. However, candidates in the job market may not have the skills employers are seeking. According to the survey, 67% of IT executives at companies with at least 100 employees or more require industry certifications as a basic requirement for hiring considerations. The joint survey aimed to uncover IT employersโ€™ perceptions during the hiring process. The findings highlighted the importance of cybersecurity degree programs paired with stackable credentials aligned to military job roles and occupations. Of the 256 IT employers who were polled, 86% said that industry certifications aligned to cyber-affiliated U.S. military job roles and occupations play an important role when hiring candidates. In fact, almost half (48%) agreed they are either very important or absolutely essential and 84% consider them to be the โ€œgold standardโ€ when hiring โ€œCyber threats are growing exponentially, and IT employers must ensure that the candidates they are hiring possess the proper education and skills to take on these threats,โ€ said Stephanie Benoit-Kurtz, lead cybersecurity faculty at the Universityโ€™s Las Vegas Campus. โ€œOrganizations often donโ€™t have the time or funding to invest in developing employees, and these industry certifications often provide the minimum standards to prepare professionals to combat todayโ€™s cyber threats.โ€ Highly regarded cybersecurity industry certifications with aligned job roles and outcomes may be easier to obtain than you think. The survey found that nearly all IT executives (91%) said that they would be likely to provide tuition assistance to an employee seeking to earn a degree that helps prepare for industry certification aligned to U.S. military job roles and occupations. โ€œWe tend to look at the bigger picture of career opportunities as a nation, when we should be focusing on what skills and credentials employersโ€™ value most when considering a candidate,โ€ said Wesley Alvarez, director of academics, EC-Council. โ€œAs much as they love to hack, it is paramount that graduating students who achieved these challenging credentials understand how to harness their skills in a professional environment.โ€ To help prepare the workforce for todayโ€™s cybersecurity positions, the University of Phoenix and EC-Council have worked together to provide students with opportunities that focus on degrees that help prepare students for industry certifications. The University offers an Associate in Cybersecurity and electives that are aligned to EC-Council certifications. In October, the University received the EC-Council Academia Circle of Excellence Award for its suite of EC-Council certifications. They include: End-user security aligned to the Certified Secure Computer User Certification (CSCU) Cybersecurity and network defense aligned to the Certified Network Defender Certification (CND) Ethical hacking aligned with the Certified Ethical Hacker Certification (CEH) In addition to these offerings, the University of Phoenix this month announced the launch of a certificate in cybersecurity policy and governance aligned to the Certified Chief Information Security Officer Certification (CCISO). The CCISO is an industry-leading certification that helps prepare professionals to succeed in the highest level of information security. During the polling, IT employers were asked which industry certifications they believe employees should possess and 44% said the Certified Chief Information Security Officer certification. The Certified Network Defender received 38% and Certified Ethical Hacker received 23%. โ€œThe College of Business and Information Technology is dedicated to providing working adult learners access to the education and skills that are in high demand in todayโ€™s industries. These certifications can help prepare professionals to stay one step ahead of cyberattackers,โ€ said Kevin Wilhelmsen, dean of the College of Business and Information Technology. โ€œThe CCISO and other certification aligned programs are designed to help working adults balance work and life. Not only will they receive the technical foundation but be able to continue to work in their industry while pursuing their program.โ€ To learn more about the cybersecurity degrees and certificates offered at the University of Phoenix, visit phoenix.edu/degrees/technology/cybersecurity. For more information on EC-Council offerings, visit http://www.eccouncil.org. Survey Methodology This survey was conducted online within the United States by The Harris Poll on behalf of the University of Phoenix from October 10 โ€“ 21, 2019 among 256 U.S. adults aged 18 and older who are employed full-time at a company with 100 or more employees, work in IT and have the job titles of CTO, CIO, Chief Security Officer, Chief Information Security Officer, Information Security Manager, Director of Information Security, or Cybersecurity Manager. Data were weighted where necessary by employee size to bring them into line with their actual proportions in the population. For the purposes of this report, qualified respondents will be referred to as โ€œIT executives.โ€ For complete survey methodology, please contact cooper.nelson@phoenix.edu. About University of Phoenix The University of Phoenix is innovating to help working adults move efficiently from education to careers in a rapidly changing world. Flexible schedules, relevant and engaging courses, and interactive learning can help students more effectively pursue the career and personal aspirations while balancing their busy lives. The University of Phoenix serves a diverse student population, offering associate, bachelorโ€™s, masterโ€™s and doctoral degree programs online and from select campuses and learning centers. For more information, visit phoenix.edu. About EC-Council EC-Councilโ€™s sole purpose is to build and refine the Cybersecurity profession, globally. We help individuals, organizations, educators, and governments address global workforce problems through the development and curation of world-class Cyber Security Education programs and their corresponding certifications and provide cybersecurity services to some of the largest businesses globally. Trusted by 7 of the Fortune 10, 47 of the Fortune 100, the Department of Defense, Intelligence Community, NATO, and over 2000 of the best Universities, Colleges, and Training Companies, our programs have proliferated through over 140 Countries and have set the bar in Cyber Security Education. Best known for the Certified Ethical Hacker program, we are dedicated to equipping over 230,000 information age soldiers with the knowledge, skills, and abilities required to fight and win against their black hat adversaries. EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program, followed by a variety of other Cyber programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer. We are an ANSI 17024 accredited organization and have earned recognition by the DoD under Directive 8570/8140, in the UK by the GCHQ, CREST, and a variety of other authoritative bodies that influence the entire profession. Founded in 2001, EC-Council employs over 400 people worldwide with 10 offices in the USA, UK, Malaysia, Singapore, India, and Indonesia. Our US offices are in Albuquerque, NM, and Tampa, FL. Learn more at http://www.eccouncil.org.
73% of cyber attacks occur on Microsoft Office products
Microsoft Office products were the most commonly exploited by cybercriminals around the world and nearly 73 percent of cyber exploits were performed in MS Office products in the third quarter of this year, a new report has said. According to information gathered by PreciseSecurity.com, other exploited applications by cybercriminals included browsers and operating systems, among others. โ€œData shows that exactly 72.85 percent of cyber exploits were performed in MS Office products as of the third quarter of this year,โ€ Marco Mathew from the computer security website said in a statement on Wednesday. MS Office products were followed by Browsers with 13.47 percent of the total number of exploits by cybercriminals, Android with 9.09 percent, Java with 2.36 percent, Adobe Flash with 1.57 percent and PDF with 0.66 percent. Some of the most common vulnerabilities in MS office.com/setup were related to stack overflow errors in the Equation Editor application. Other vulnerabilities were CVE-2017-8570, CVE-2017-8759, and CVE-2017-0199, among others. Another important vulnerability was related to a zero-day issue CVE-2019-1367 that produced memory corruption and allowed remote code execution on the target system, the report mentioned. The top five countries that are sources of web-based attacks include the US with 79.16 percent of the market share, followed by the Netherlands with 15.58 percent, Germany with 2.35 percent, France with 1.85 percent and Russia 1.05 percent. In computer security, an exploit makes reference to individuals such as hackers or criminals that make use and take advantage of a bug or vulnerability in a specific software or computer program.
what is career counselling
Career Counselling is the process through which one can understand oneโ€™s own self and the world around him/her to be able to chalk out a career path by making an informed decision around the same. Through Career Counselling, a student might overcome the uncertainties around his/her career, the lack of knowledge on the same, any disagreement with his/her parents, and come closer to fulfilling his/her dreams.ย  Why do we need a Career Counsellor?ย  We spend a good 40 years of our lives working on our careers. Thatโ€™s almost 36,000 hours. Shouldnโ€™t we ensure that we spend this precious time on something we enjoy? In order for us to identify what we like, and what our strengths are and how well they are aligned- we need the help of a career counsellor.ย  Clarity of thought School is a time when options are many. Children are surrounded by aspiring doctors, lawyers, singers, actors, sports stars. Whatโ€™s more, teenagers are typically more impressionable which means they need more careful supervision. Here is when a career counselling session can really be of help to them. By asking the right questions and showcasing reality, a career counsellor can help erase some of the confusion in a studentโ€™s mind.ย  The direction towards the right pathย  Once the studentโ€™s confusion has been eased, the career counsellor can help him/her find the right path. Through multiple interactions, the studentโ€™s interests, aptitude, and personality can be concluded. In the process, the career counsellor also listens in and establishes a good rapport with the student which then puts them in a position to direct the student towards a path that is most suited to him/her.ย  Technology-aided assistance thereby reducing biasย  It is likely that some career counsellors are influenced by their own personal bias while counselling. However, with the help of online psychometric assessments, the results are quite evident. They make the counsellorโ€™s task easier because they can then base their recommendations on the assessments. Thus, the student receives an objective suggestion.ย  Awareness of lesser-known and more obvious choices It is impossible for a student to keep track of all the possible career paths available to him/her. Due to the extensive research they conduct, career counsellors are often able to shed light on the not very popular choices of careers. These unknown paths might end up being the ideal career for the student!ย  Who needs counselling? The CBSE requires that there be a career counsellor in every affiliated school. Every child who goes to school requires a career guidance counsellor. If children are to break free from traditions and create their own lives by not following their parentsโ€™ footsteps, they must counsel a career guidance specialist. Even children who have supportive parents can benefit from career counseling sessions because they can learn a lot more about themselves and make a more informed decision about their careers.ย  Who does Career Counseling?ย  In schools, there is supposed to be a designated career counsellor who handles queries. However, most schools are in acute shortage. As a result, schools outsource counseling work to private companies. There are several career counselling companies that shoulder the responsibility. They offer professional assessment, guidance, college shortlisting and application assistance. There are also independent career counsellors who perform the same functions on a freelance basis.ย  What is required to do counselling?ย  Most career counsellors have a Bachelorโ€™s degree in Behavioral Sciences or Psychology or in a related discipline and they top that up with a Masterโ€™s degree in Counselling, after which, they take some more steps to earn their license to practice. After they have earned their certification and license, they can start practicing. This is the long route to becoming a Career Counsellor which involves several years of academic study and a few years of practice too.ย  Another way to do career counsellingย  Letโ€™s say youโ€™re genuinely interested in career counseling but havenโ€™t had the necessary education to support a career in it. Fret not, you can do the Global Career Counsellor certification program and start practicing anywhere in the world. It is Asiaโ€™s first career counseling program in partnership with UCLA Extension. Take control of your career, become a Global Career Counsellor today!
The 2020 Final Guide to Finding the Right Content Writer for Your Business
This is a modern and fast-changing era that require changes based on trends, patterns, and targets. Big or small, old or new, all businesses require marketing strategies to follow to achieve their desired goals. Content marketing is a recent and basic requirement to promote business. It is considered as the most effective way of digital marketing and has become a necessity for every company. There is a large number of online buyers who get attracted through content marketing. One cannot compromise on its content marketing strategies and needs an experienced content writer to perform task significantly. There are certain ways discussed below to help you find and choose the right content writer for your business. There are certain basic required steps to be followed to select the best content writer, but before that, you should know the qualities and skills required for a good content writer. Elements of a good content writer Command on the English language A good content writer must have the ability to be good in grammar, spelling, and construction of sentences. Poor writing with grammar and spelling mistakes can divert the mind of the readers at first instance. Research Abilities Writers stayed well updated with the fast-moving world. Before writing about anything, writer needs to review research articles and different pieces of information required. A good writer must have the ability to research before write. Experience and expertise Experience in writing gives an edge to a writer, as it already has gone through a lot of different topics. Experience of writing leads them to acquire and retain knowledge from different aspects. As an expert essay writers UK to stay on the top, it must follow the industryโ€™s trend and news daily. Ease of adaptability A good content writer must be flexible and able to work in any capacity of writing such as blog writing, research articles, press release, etc. There should be no limitations regarding writing. There should be easiness to adopt different things regarding writing. Inventive and Storyteller Readers donโ€™t have patience, a little mistake, misleading to the concept or unnecessary writing and they are gone. A content writer should compose its content user-friendly and easy to read so that readers donโ€™t switch and understand the context easily. Steps to find a good content writer The following are the steps needs to be considered while selecting a good content writer for your services. Be certain with required services Be certain of your requirements. Ask yourself, how and what exactly you want your content writer to do for your business. There are two kinds of content writers, one that strictly follows the track provided by you, while others will provide you a variety of suggestions to make your content better. Both approaches are right in their own ways. If you already have done your basic homework for your business, you can easily choose what exactly you want from your content writer to help you with your content marketing strategies. Be specific with your budget Be specific to the needs of your content writing. If you think you need an experienced content marketing strategist and cannot pay as per its caliber and work, I suggest you waiting for the right time and donโ€™t hire a low paid content writer, as this will be a wastage of money, time and effort. Similarly, if you need someone who can provide you a great copy from a brief content, donโ€™t hire anyone with high pay rates. It all depends on what you want them to do and what they charge you against your required services. Select experience you require You should be known to your requirements, as to what exact experience you require for your content writing and working strategies. Hire a niche writer If you need people who regulate what you do. If you are writing content for the people who will buy what you do, you need a content writer with business and marketing expertise. Watch writerโ€™s site from every perspective Pay deep attention to the writerโ€™s website check out the language they used in communication to describe themselves. Analyse the tone they are talking about themselves and their services. Do they talk about how successful they are or how they can provide the services according to the clientโ€™s needs? Check out the web content and blogs, see the writing language they used. Their writing language can describe a lot as if those writing skills can meet your requirements or not. Shortlist candidates and select After screening all of the requirements, call out the shortlist candidates for the final interview. Tell them how you get interested in their writing skills. Tell them the needs of your business. Be very specific and certain about the work you need them to do. Discuss the budget you have for the content writer. If you already had selected throughout the screening, you donโ€™t have to follow this step. Conclusion It is a need of every business to find the right content writer in its capacity. You need to search hard and specific about your needs. Hiring an inefficient content writer can spoil your recent customers and can act as a barrier for improve customer experience as well. Be specific and certain about your needs, do your homework. Instead of being in a hurry you should spend some time in finding and hiring the right person for your needs or it will be a waste of time and money.
3 Korean Authors To Add To Your Reading List
I recently made a video about Haruki Murakami, and a few of oyu asked about some Korean authors you might like. Here are 3 and a half suggestions First is Kyungsook Shin, who I haven't read yet. She wronte "Please Look After Mom" which was a huge success internationally. She has had some scandals surrounding her though, because she plagarized a bit of her work from other authors... Now onto the authors I HAVE read! 1. Han Kang Most recently known for The Vegetarian, she writes in a creepy but realistic style. Everything that happens is believeable which makes it so much scarier. I'm about to read her historical fiction piece, Human Acts! 2. Chang Rae Lee I read On Such A Full Sea sometime last year and really enjoyed it. It takes place in a distopian society and is a really interesting look into how we interact with people around us! 3. Young Ha Kim I adore this author and if you're going to read anything on this list make sure you read Black Flower. It is about the true history of hundreds to thousands of Koreans being brought over to Mexico to essentially be slaves on plantations. Its a part of history I never knew about, and Young Ha Kim explains it in a really fascinating way. Have you read any of these authors?! Here are links to the books if you're interested in picking any of them up^^ Young Ha Kim BLACK FLOWER: http://amzn.to/2mltxHU I Have The Right To Destroy Myself: http://amzn.to/2m1fyGG Han Kang The Vegetarian: http://amzn.to/2lLKvOn Chang Rae Lee On Such A Full Sea: http://amzn.to/2m1jEyQ Kyung Sook Shin Please Look After Mom: http://amzn.to/2m1uXqs
๋…์„œ์˜ ๋‹ฌ ๋งž์ด, ์ฑ… ์‹ซ์–ดํ•˜๋Š” ์ด๊ฐ€ ๋ฐฉ๋ฌธํ•ด๋„ ์ข‹์„ ์ถ”์ฒœ ๊ฐ์„ฑ ์ฑ…๋ฐฉ
Editor Comment ๊ฐ€์„ ํ•˜๋ฉด ๋– ์˜ค๋ฅด๋Š” ๋‹จ์–ด๋Š” โ€˜๋…์„œโ€™. ๋ฌด๋”์› ๋˜ ๋‚ ์”จ๊ฐ€ ํ•œํ’€ ๊บพ์ด๋ฉด์„œ ๋ฐ”์•ผํ๋กœ ์ฑ… ์ฝ๊ธฐ ์ข‹์€ ๊ณ„์ ˆ์ด ์™”๋‹ค. ์„ ์„ ํ•œ ๋‚ ์”จ์™€ ํ•จ๊ป˜ ํ‘ธ๋ฅด๋ฅธ ํ•˜๋Š˜์„ ๋ฐ”๋ผ๋ณด๋ฉด ์ฑ… ์ฝ๊ธฐ ์‹ซ์–ดํ•˜๋Š” ์ด๋“ค๋„ ์ž์—ฐ์Šค๋ ˆ ์†์ด ๊ฐ€๊ธฐ ๋งˆ๋ จ. 9์›” โ€˜๋…์„œ์˜ ๋‹ฌโ€™์„ ๋งž์ดํ•ด <์•„์ด์ฆˆ๋งค๊ฑฐ์ง„>์ด ์ „๊ตญ ๊ณณ๊ณณ์˜ ๋งˆ์Œ์„ ์‚ฌ๋กœ์žก์„ ๊ฐ์„ฑ ์ฑ…๋ฐฉ๋“ค์„ ๋ชจ์•„๋ดค๋‹ค. ์ผ๋…„์ด ์ €๋ฌผ์–ด๊ฐ€๋Š” ๊ฐ€์„, ๋‚™์—ฝ ๋ฌผ๋“œ๋Š” ์ฐฝ๊ฐ€์— ์•‰์•„ ํ‰์†Œ ๊ด€์‹ฌ ์žˆ๋˜ ์ฑ…์„ ์ฝ์œผ๋ฉฐ ์ทจํ–ฅ ๋งž๋Š” ์ด๋“ค๊ณผ ํ•จ๊ป˜ ์—ฌ์œ ๋ฅผ ๋งŒ๋ฝํ•ด๋ณด๋Š” ๊ฒƒ์€ ์–ด๋–จ๊นŒ. ๋„์„œ๊ด€ ์ฑ… ํ•œ ๊ถŒ์˜ ์—ฌ์œ ๋ผ๋Š” ๋ง์ด ๋”ฑ ๋“ค์–ด๋งž๋Š” ์‹ฌ์•ผ ์„œ์  โ€˜์ฑ…๋ฐ”โ€™๋Š” ์ˆ ๊ณผ ํ•จ๊ป˜ ์ฑ…์„ ๋ณผ ์ˆ˜ ์žˆ๋Š” ์ด์ƒ‰ ๊ณต๊ฐ„์ด๋‹ค. ์„ผ์Šค ์žˆ๋Š” ๋ฉ”๋‰ดํŒ๊ณผ ์ฑ…์†์—์„œ ๋‚˜์™”๋˜ ์นตํ…Œ์ผ๋“ค์„ ์ œ์กฐํ•˜์—ฌ ํŒ๋งคํ•˜๋Š” ๋งค์žฅ์€ ์ฑ…๊ณผ ๋”์šฑ ๊ต๊ฐํ•  ์ˆ˜ ์žˆ๋Š” ์ •์„œ์ ์ธ ์•ˆ์ •๊ฐ์„ ์ œ๊ณตํ•˜๋Š” ๊ฒƒ์ด ํŠน์ง•. ๊ณต๊ฐ„ ํŠน์„ฑ์ƒ 3์ธ ์ด์ƒ๋ถ€ํ„ฐ๋Š” ์ž…์žฅ์— ์ œํ•œ์ด ๋˜๊ฑฐ๋‚˜, ๋”ฐ๋กœ ์•‰์•„์•ผ ํ•  ์ˆ˜๋„ ์žˆ์œผ๋‹ˆ ํ˜ผ์ž ํ˜น์€ 2์ธ์ด ๊ฐ€๋Š” ๊ฒƒ์„ ์ถ”์ฒœํ•œ๋‹ค. ๊ฒฐ์ฝ” ์ ์ง€ ์•Š์€ ์ˆ˜์˜ ์„œ์ ๋“ค์ด ๋ฐฐ์น˜๋˜์–ด ์žˆ์œผ๋‹ˆ, ์ง€์นœ ํ•˜๋ฃจ์˜ ๋์— ๋ฌด๋“œ ์žˆ๊ฒŒ ์ฑ…์„ ๋ณด๊ณ  ์‹ถ๋‹ค๋ฉด ์ด๋งŒํ•œ ๊ณณ์ด ์—†์„ ํ„ฐ. ์ฑ…๋ฐ” ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์„œ๋Œ€๋ฌธ๊ตฌ ์—ฐํฌ๋™ 188-71 1์ธต 101ํ˜ธ ์˜์—…์‹œ๊ฐ„ ใ…ฃํ™” โ€“ ํ† ์š”์ผ 19:00 โ€“ 1:30 โ€˜๊ธฐ์กด์˜ ๊ฒƒ์„ ๋‹ค๋ฅด๊ฒŒ ์žฌํ•ด์„ํ•œ๋‹คโ€™๋Š” ์ฒ ํ•™์œผ๋กœ ์žŠํ˜€์ง„ ์•„๋‚ ๋กœ๊ทธ์˜ ๊ฐ์„ฑ๊ณผ ์˜๊ฐ์„ ์ž๊ทนํ•˜๋Š” ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ๊ฐ€ ์žˆ๋‹ค. ์„œ์šธ ๋ถ์ดŒ์— ์œ„์น˜ํ•œ โ€˜ํ˜„๋Œ€์นด๋“œ ๋””์ž์ธ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌโ€™๋Š” ๋„์‹œ์˜ ๋น ๋ฅธ ์†๋„์—์„œ ๋ฒ—์–ด๋‚˜ ์ผ์ƒ์„ ์‚ฌ์œ ํ•˜๋Š” ์ƒˆ๋กœ์šด ๋ผ์ดํ”„ ์Šคํƒ€์ผ์„ ์ œ์•ˆํ•œ๋‹ค. ํ˜„๋Œ€๋ฏธ์ˆ , ๋””์ž์ด๋„ˆ๋ถ, ์‹œ๊ฐ ๋””์ž์ธ, ๊ฑด์ถ•๊ณต๊ฐ„ ๋””์ž์ธ ๋“ฑ ์ˆœ์ˆ˜ ์˜ˆ์ˆ ์—์„œ ์ƒ์—… ์˜ˆ์ˆ ๊นŒ์ง€ ๋””์ž์ธ์˜ ๊ณผ๊ฑฐ์™€ ํ˜„์žฌ, ๋ฏธ๋ž˜๋ฅผ ๋‹ด๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ๊ตญ๋‚ด์—์„œ ์ฐพ๊ธฐ ํž˜๋“  ๊ฐ€์น˜ ๋†’์€ ํฌ๊ท€ ๋„์„œ๋“ค์ด ๋งŽ๋‹ค๋Š” ๊ฒƒ๋„ ๋ˆˆ์—ฌ๊ฒจ๋ณผ ์ . 1์ธต โ€˜Rare Book Collectionโ€™ ์—์„œ ํฌ๊ท€๋ณธ์„ ์ง์ ‘ ๋ณด๊ณ , ์ฝ๊ณ , ์˜๊ฐ์„ ๋ฐ›๋Š” ๊ธฐํšŒ๋ฅผ ๋†“์น˜์ง€ ๋ง์ž. ๋งค ์›” ์†Œ๊ฐœํ•˜๋Š” ๋ ˆ์–ด ์ปฌ๋ ‰์…˜์ด ๋‹ค๋ฅด๋‹ˆ ํ˜„๋Œ€์นด๋“œ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ์›น ์‚ฌ์ดํŠธ(library.hyundaicard.com)์—์„œ ํ™•์ธ ํ›„ ๋ฐฉ๋ฌธํ•˜๋Š” ๊ฒƒ์„ ์ถ”์ฒœํ•œ๋‹ค. ํ˜„๋Œ€์นด๋“œ DESIGN LIBRARY ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์ข…๋กœ๊ตฌ ๋ถ์ดŒ๋กœ 31-18 ์˜์—…์‹œ๊ฐ„ ใ…ฃํ™” โ€“ ํ† ์š”์ผ 12:00 โ€“ 21:00 / ์ผ์š”์ผ ๋ฐ ๊ณตํœด์ผ 12:00 โ€“ 18:00 ํŒŒ์ฃผ ์ถœํŒ ๋‹จ์ง€ ๋‚ด์— ์œ„์น˜ํ•œ โ€˜์ง€ํ˜œ์˜ ์ˆฒโ€™์€ ๊ฐ€์น˜ ์žˆ๋Š” ์ฑ…์„ ๋ณด์กด, ๋ณดํ˜ธํ•˜๊ณ  ๊ด€๋ฆฌํ•˜๋ฉฐ ํ•จ๊ป˜ ๋ณด๋Š” ๊ณต๋™ ์„œ์žฌ๋‹ค. ํฌ๊ฒŒ ์„ธ ๊ฐœ์˜ ๊ด€์œผ๋กœ ๊ตฌ์„ฑ๋œ ์ด๊ณณ์€ ํ•™์ž ๋ฐ ์ง€์‹์ธ, ์—ฐ๊ตฌ์†Œ์—์„œ ๊ธฐ์ฆํ•œ ๋„์„œ๋ฅผ ์†Œ์žฅํ•œ 1๊ด€๊ณผ ์šฐ๋ฆฌ๋‚˜๋ผ ์ถœํŒ์˜ ์—ญ์‚ฌ๋ฅผ ์‚ดํŽด๋ณผ ์ˆ˜ ์žˆ๋Š” 2๊ด€, ์œ ํ†ต์‚ฌ์™€ ๋ฐ•๋ฌผ๊ด€, ๋ฏธ์ˆ ๊ด€์—์„œ ๊ธฐ์ฆํ•œ ๋„์„œ์™€ ๊ฒŒ์ŠคํŠธํ•˜์šฐ์Šค โ€˜์ง€์ง€ํ–ฅโ€™์˜ ๋กœ๋น„๋กœ ์ด๋ฃจ์–ด์ ธ ์žˆ๋Š” 3๊ด€์œผ๋กœ ๋‚˜๋ˆ ์ ธ ์žˆ๋‹ค. ์ฑ…๊ณผ์˜ ๊ต๊ฐ์„ ๊ฐ€์žฅ ์ค‘์š”์‹œํ•˜๋Š” โ€˜์ง€ํ˜œ์˜ ์ˆฒโ€™์€ ๋…์ž์—๊ฒŒ ๊ฐ€์žฅ ์ตœ์ ํ™”๋œ ๋…์„œ ํ™˜๊ฒฝ์„ ์กฐ์„ฑํ•˜๊ณ ์ž ํ•˜๋Š” ๋ณตํ•ฉ๋ฌธํ™”๊ณต๊ฐ„. ์ง€ํ˜œ์˜ ์ˆฒ ์ฃผ์†Œ ใ…ฃ ๊ฒฝ๊ธฐ ํŒŒ์ฃผ์‹œ ํšŒ๋™๊ธธ 145 ์˜์—…์‹œ๊ฐ„ ใ…ฃํ‰์ผ 10:00 โ€“ 20:00 ์ฑ…์„ ์ฝ๊ณ  ์‹ถ๊ฒŒ ๋งŒ๋“œ๋Š” ๊ฐ๊ฐ์ ์ธ ์ธํ…Œ๋ฆฌ์–ด๊ฐ€ ์ธ์ƒ์ ์ธ ์ด๊ณณ์€ ๋ช…๋™ โ€˜์”จ๋„ค๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌโ€™๋‹ค. ํ•ด์™ธ์˜ ๋„์„œ๊ด€์„ ๋– ์˜ฌ๋ฆฌ๊ฒŒ ๋งŒ๋“œ๋Š” ๊ณ„๋‹จ์‹ ๊ตฌ์กฐ์™€ ๋†’์€ ์ฒœ์žฅ์ด ๋งค๋ ฅ์ ์ธ ๊ณณ. ๋ฒฝ์„ ํ•œ๊ฐ€๋“ ์ฑ„์šด ์ˆ˜๋งŽ์€ ์„œ์ ์€ ํ‰์†Œ ์ฑ…์„ ์ฆ๊ฒจํ•˜์ง€ ์•Š๋”๋ผ๋„ ๋…์„œ ์š•๊ตฌ๋ฅผ ๋ถˆ๋Ÿฌ์ผ์œผํ‚ค๊ธฐ์— ์ถฉ๋ถ„ํ•˜๋‹ค. ๋งˆ์Œ์— ๋“œ๋Š” ์ฑ…์ด ๋†’์€ ๊ณณ์— ์žˆ๋‹ค๋ฉด, ๊ณ ์†Œ ๊ณตํฌ์ฆ์„ ์ด๊ฒจ๋‚ด๊ณ  ์‚ฌ๋‹ค๋ฆฌ๋ฅผ ํƒ€๊ณ  ์˜ฌ๋ผ๊ฐ€ ๋ณด์ž. ์ง€์‹๊ณผ ํ•จ๊ป˜ ์„ฑ์ทจ์š•๊นŒ์ง€ ๊ฐ€์ ธ๊ฐˆ ์ˆ˜ ์žˆ๋Š” ํŠน๋ณ„ํ•œ ์žฌ๋ฏธ๋ฅผ ๋”ํ•ด์ค„ ํ…Œ๋‹ˆ. CGV ๋ช…๋™ ์”จ๋„ค๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์ค‘๊ตฌ ์ถฉ๋ฌด๋กœ2๊ฐ€ 65-9 ํ•˜์ดํ•ด๋ฆฌ์—‡ 10์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 13:00 โ€“ 21:00 / ์ฃผ๋ง 11:0 0 โ€“ 21:00 ๋„ค์ด๋ฒ„ ์‚ฌ์˜ฅ ๋กœ๋น„์— ์œ„์น˜ํ•œ โ€˜๋„ค์ด๋ฒ„ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌโ€™๋Š” โ€˜๋„์„œ๊ด€์€ ์ •์ˆ™ํ•ด์•ผ๋งŒ ํ•œ๋‹คโ€™๋Š” ํŽธ๊ฒฌ์„ ๊นจ๊ณ ์ž ๋‚˜ํƒ€๋‚œ ๊ณต๊ฐ„์ด๋‹ค. ๋”ฑ๋”ฑํ•œ ๋ฌด๋“œ์˜ ๋„์„œ ๋ฌธํ™”๋ฅผ ํƒˆํ”ผํ•˜๊ณ ์ž ๋„ค์ด๋ฒ„์˜ ๋ฉ”์ธ ์ปฌ๋Ÿฌ์ธ ๊ทธ๋ฆฐ์„ ํฌ์ธํŠธ๋กœ ํ•˜๊ณ  ์ฑ…๊ณผ ์ปคํ”ผ, ๋Œ€ํ™”๊ฐ€ ํ•จ๊ป˜ํ•  ์ˆ˜ ์žˆ๋Š” ์žฅ์†Œ๋ฅผ ์—ฐ์ถœํ–ˆ๋‹ค. ์„ธ๊ณ„ 3๋Œ€ ๋””์ž์ธ ์–ด์›Œ๋“œ์—์„œ๋„ ์ˆ˜์ƒํ•œ ์ธํ…Œ๋ฆฌ์–ด๋กœ ๊ผญ ๋…์„œ ๋ชฉ์ ์ด ์•„๋‹ˆ๋”๋ผ๋„ ๋“ค๋Ÿฌ๋ณผ ๋งŒํ•œ ๊ณณ. ํ•œ๊ตญ์˜ ํฌํ„ธ ์‚ฌ์ดํŠธ๋ฅผ ๋Œ€ํ‘œํ•˜๊ณ  ์žˆ๋Š” ๊ธฐ์—…๋‹ต๊ฒŒ ๊ตญ๋‚ด์™ธ ์žก์ง€ 270์—ฌ ์ข…, ๋””์ž์ธ ์žฅ์„œ 17000์—ฌ ๊ถŒ, ์ „ ์„ธ๊ณ„ ์ „๋ฌธ ๋ฐฑ๊ณผ์‚ฌ์ „ 2500์—ฌ ๊ถŒ์„ ์†Œ์œ ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ๊ฐœ์ธ์ด ๊ตฌ๋งคํ•˜๊ธฐ ๋ถ€๋‹ด์Šค๋Ÿฌ์šด ๊ณ ๊ฐ€ ํฌ๊ท€ ์žฅ์„œ, ์ž˜ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ํฌ์†Œ๊ฐ€์น˜ ์žˆ๋Š” ์ฑ…๋“ค๋„ ๊ตฌ๋น„ํ•˜๊ณ  ์žˆ๋‹ค.ย  ๋„ค์ด๋ฒ„ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ์ฃผ์†Œ ใ…ฃ ๊ฒฝ๊ธฐ ์„ฑ๋‚จ์‹œ ๋ถ„๋‹น๊ตฌ ์ •์ž๋™ ๋ถˆ์ •๋กœ 6 NAVER ๊ทธ๋ฆฐํŒฉํ† ๋ฆฌ 1์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 09:00 โ€“ 19:30 / ์ฃผ๋ง 10:00 โ€“ 19:30 ์„œ์  ํ”„๋ž‘์Šค ํŒŒ๋ฆฌ ๋งˆ๋ ˆ ์ง€๊ตฌ์— ์œ„์น˜ํ•œ ๊ฐ์„ฑ์„ ํŒŒ๋Š” ์„œ์  โ€˜Ofr.โ€™. ์ „ ์„ธ๊ณ„ ๊ด€๊ด‘๊ฐ๋“ค์˜ ๋ช…์†Œ๊ฐ€ ๋œ ๋งค์žฅ์ด โ€˜Ofr.Seoulโ€™์ด๋ผ๋Š” ์ด๋ฆ„์œผ๋กœ ์„œ์šธ ์„ฑ์ˆ˜๋™์— ์ƒ๋ฅ™ํ–ˆ๋‹ค. ์ž‘๊ณ  ์•„๋‹ดํ•˜์ง€๋งŒ ๋ˆ„๊ตฌ๋‚˜ ์‰ฝ๊ฒŒ ์ฑ…์„ ๋ณผ ์ˆ˜ ์žˆ์–ด ํŒŒ๋ฆฌ์˜ ๋ถ„์œ„๊ธฐ๋ฅผ ์žƒ์ง€ ์•Š๋Š” ์„ฑ์ˆ˜ ์•ˆ์˜ ํŒŒ๋ฆฌ. ์ •๊ธฐ์ ์œผ๋กœ ํŒŒ๋ฆฌ์—์„œ ๋ณด๋‚ด๋Š” ์ฑ…๋“ค๋กœ ๊ฐ€๋“ํ•œ ๊ณต๊ฐ„์€ ๊ตญ๋‚ด์—์„œ ์ฐพ์•„๋ณผ ์ˆ˜ ์—†๋˜ ์˜ˆ์ˆ  ์„œ์ ๊ณผ ๋…๋ฆฝ ์ถœํŒ๋ฌผ๋“ค์ด ์ค€๋น„๋˜์–ด ์žˆ๋‹ค. ๋˜ํ•œ ํ•จ๊ป˜ ์šด์˜ํ•˜๋Š” ํŽธ์ง‘์ˆ โ€˜๋ฏธ๋ผ๋ฒจ(mirabelle)โ€™๋„ ์ฃผ๋ชฉํ•  ์ . ๋‹ค์–‘ํ•œ ์˜๋ฅ˜, ์—์ฝ”๋ฐฑ, ์†Œํ’ˆ, ์•ก์„ธ์„œ๋ฆฌ๋ฅ˜ ๋“ฑ ๊ฐ๊ฐ์ ์ธ ์†Œํ’ˆ๋“ค๋„ ๋งŒ๋‚˜๋ณผ ์ˆ˜ ์žˆ์–ด ๋” ์ด์ƒ ๋ฒˆ๊ฑฐ๋กœ์šด ๊ตฌ๋งค ๋Œ€ํ–‰ ์—†์ด ์‰ฝ๊ฒŒ ๊ตฌ๋งค ๊ฐ€๋Šฅํ•˜๋‹ค. ์ฐธ๊ณ ๋กœ ๊ณต์‹ ์ธ์Šคํƒ€๊ทธ๋žจ @Ofrseoul์„ ํ†ตํ•ด ์ œํ’ˆ ์ž…๊ณ  ์†Œ์‹์ด ์—…๋ฐ์ดํŠธ๋˜๋‹ˆ ์„œ๋‘˜๋Ÿฌ ํ™•์ธํ•ด๋ณด์ž. Ofr. Seoul ์ฃผ์†Œ ใ…ฃ ์„œ์šธย ์„ฑ๋™๊ตฌ ์„œ์šธ์ˆฒ2๊ธธ 19-18 2์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃ ์ˆ˜ โ€“ ์ผ์š”์ผ 13:00 โ€“ 19:00 ์‹๋ฌผ๊ณผ ์œ ๋Ÿฝ ๋นˆํ‹ฐ์ง€ ๊ฐ€๊ตฌ๋“ค๋กœ ๊พธ๋ฉฐ์ ธ ํŽธ์•ˆํ•˜๊ณ  ์กฐ์šฉํ•œ ๋ถ„์œ„๊ธฐ์˜ ํ‰์ฐฝ๋™ ์ฑ…๋ฐฉ โ€˜๋ถ์ปค์Šคโ€™. ๊ฐœ์„ฑ ์žˆ๋Š” ์ปจ์…‰์˜ ์™ธ๊ตญ ์žก์ง€๋Š” ๋ฌผ๋ก  ์‹ค์ƒํ™œ์ ์ธ ์ฃผ์ œ๋“ค์˜ ์ฑ…๋„ ๋งŽ์ด ์ทจ๊ธ‰ํ•˜๋Š” ์ด๊ณณ์—๋Š” ํŠน๋ณ„ํ•œ ๋น„๋ฐ€์ด ์ˆจ๊ฒจ์ ธ ์žˆ๋‹ค. ๋ฐ”๋กœ ๋ช‡๋ช‡ ์„œ์ ์—๋Š” ์ฃผ์ธ์˜ ์†๊ธ€์”จ ์ฝ”๋ฉ˜ํŠธ๊ฐ€ ๋ถ™์–ด ์žˆ์–ด ์ฑ…์„ ๊ณ ๋ฅด๋Š” ์žฌ๋ฏธ๋ฅผ ๋Š๋‚„ ์ˆ˜ ์žˆ๋Š” ๊ฒƒ. ๋˜ํ•œ ์ฑ…๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ํ•œ์ผ ์— ๋งˆ๋ จ๋œ ๋‹ค์–‘ํ•œ ์†Œํ’ˆ ์žกํ™”๋ฅผ ํŒ๋งคํ•˜๋Š” ๊ณต๊ฐ„๊ณผ ๋”๋ถˆ์–ด ์—ฌ์œ ๋กœ์šด ํด๋ž˜์‹ ๋…ธ๋ž˜๊ฐ€ ํ˜๋Ÿฌ๋‚˜์˜ค๋Š” ์นดํŽ˜๋„ ๊ฐ–์ถฐ์ ธ ์žˆ๋‹ค. ์„œ์  ์ฃผ์ธ์˜ ์ทจํ–ฅ์ด ๊ณ ์Šค๋ž€ํžˆ ๊นƒ๋“  โ€˜๋ถ์ปค์Šคโ€™, ํ•œ ๋ฒˆ ๋ฐฉ๋ฌธํ•˜๋ฉด ์˜ค๋ž˜์˜ค๋ž˜ ๋จธ๋ฌด๋ฅด๊ณ  ์‹ถ์€ ๊ทธ๋Ÿฐ ๊ณณ์ด๋‹ค. ๋ถ์ปค์Šค ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์ข…๋กœ๊ตฌ ํ‰์ฐฝ 30๊ธธ 10 ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 11:00 โ€“ 21:00ย  / ์›”์š”์ผ ํœด๋ฌด ํ•œ์ ํ•œ ๋‹จ์–‘ ์ˆฒ์†์— ์œ„์น˜ํ•œ โ€˜์ƒˆํ•œ์„œ์ โ€™์€ ์˜ํ™” <๋‚ด๋ถ€์ž๋“ค> ์ดฌ์˜์ง€๋กœ ์œ ๋ช…ํ•ด์ง„ ์žฅ์†Œ๋‹ค. ๋ชจ๋“  ๊ฒƒ์ด ์ •์ง€๋œ ๋“ฏ ์˜ค๋ž˜๋œ ๋Š๋‚Œ์„ ์ฃผ๋Š” ์„œ์ ์—๋Š” ๋ณด๊ด€ํ•˜๊ณ  ์žˆ๋Š” ์ฑ…๋“ค๋งŒ ๋ฌด๋ ค 13๋งŒ ๊ถŒ. ์ฑ…๋ฐฉ์„ ๊ฐ€๋“ ์ฑ„์šฐ๋Š” ์„ธ์›”์ด ๋‹ด๊ธด ๊ฐ€์น˜ ์žˆ๋Š” ํ—Œ์ฑ…๊ณผ ๊ณณ๊ณณ์— ๋ถ™์–ด ์žˆ๋Š” ์˜๋ฏธ ์žˆ๋Š” ๊ธ€๊ท€๋“ค. ํŠนํžˆ๋‚˜ ์ „๋ฌธ์„œ์ ๊ณผ ์›์„œ ๋…ผ๋ฌธ ์ž๋ฃŒ๋ฅผ ๋งŽ์ด ์ทจ๊ธ‰ํ•˜๋ฉฐ, ์†Œ์žฅ ๊ฐ€์น˜ ์žˆ๋Š” ๊ธฐ๋…ํ’ˆ๋“ค๊ณผ ๋ฌธ๊ตฌ๋ฅ˜๋“ค๋„ ํŒ๋งคํ•ด ๋ˆˆ๊ธธ์„ ๋ˆ๋‹ค. ์‚ฐ์†์— ์ž‘์ง€๋งŒ ์˜ค๋žœ ์‹œ๊ฐ„์„ ๋‹ด๊ณ  ์žˆ๋Š” โ€˜์ƒˆํ•œ์„œ์ โ€™์€ ์ฑ…๊ณผ ์˜ค์ง ๋‚˜์—๊ฒŒ๋งŒ ์ง‘์ค‘ํ•  ์ˆ˜ ์žˆ๋Š” ํŠน๋ณ„ํ•œ ๋ฌธํ™”๊ณต๊ฐ„์ด๋‹ค. ์ƒˆํ•œ์„œ์  ์ฃผ์†Œ ใ…ฃ ์ถฉ๋ถ ๋‹จ์–‘๊ตฐ ์ ์„ฑ๋ฉด ํ˜„๊ณก๋ณธ๊ธธ 46-106 ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 09:00 โ€“ 19:00 / ์—ฐ์ค‘๋ฌดํœด ๋™๊ตด ์„œ์ ์œผ๋กœ ์œ ๋ช…ํ•œ ์„์ง€๋กœ์˜ โ€˜์•„ํฌ์•ค๋ถโ€™. ์„œ์ ๊ณผ ๋ผ์ดํ”„์Šคํƒ€์ผ์ƒต์ด ๊ฒฐํ•ฉ๋œ ์ด๊ณณ์€ ์ฑ…์„ ๋งค๊ฐœ๋กœ ๋‹ค์–‘ํ•œ ๋ฌธํ™”๋ฅผ ์ฆ๊ธฐ๋Š” โ€˜๋ฆฌ๋”ฉํ…Œ์ธ๋จผํŠธโ€™๋ฅผ ์ง€ํ–ฅํ•œ๋‹ค. ๋„์‹ฌ ์† ํœด์‹๊ณต๊ฐ„์ธ ๋“ฏ ์ผ๋ฐ˜์ ์ธ ์„œ์ ๊ณผ ๋‹ฌ๋ฆฌ ํ”ํžˆ ์ ‘ํ•˜๊ธฐ ํž˜๋“  ํ•ด์™ธ ์ž‘๊ฐ€์˜ ์•„์นด์ด๋ธŒ๋ถ ๋ฐ ์‚ฌ์ง„์ง‘๊ณผ ํ•ด์™ธ ์žก์ง€๋“ค์ด ๋‹ค๋Ÿ‰ ๊ตฌ๋น„๋˜์–ด ์žˆ๋Š” ์ ์ด ํŠน์ง•. ๊ฐ์„ฑ๊ณผ ์ง€์„ฑ ๋ชจ๋‘๋ฅผ ์•„์šฐ๋ฅด๋Š” โ€˜์•„ํฌ์•ค๋ถโ€™์˜ ์ง€ํ–ฅ์ ๊ณผ ๋งž๊ฒŒ ๋‹ค์–‘ํ•œ ์˜ˆ์ˆ  ๊ด€๋ จ ์„œ์ ์ด ๋ˆˆ๊ธธ์„ ๋ˆ๋‹ค. ์•„ํฌ์•ค๋ถ ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์ค‘๊ตฌ ์„์ง€๋กœ 29 B1F ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 10:00 โ€“ 22:00 ๋ฌด์ˆ˜ํžˆ ๋งŽ์€ ์ฑ… ์‚ฌ์ด์—์„œ ๊ฒฐ์ • ์žฅ์• ๋ฅผ ์•“๊ณ  ์žˆ๋Š” ์ด๋“ค์—๊ฒŒ ์ถ”์ฒœํ•˜๋Š” ์žฅ์†Œ๊ฐ€ ์žˆ๋‹ค. ๋ฐ”๋กœ ์„ฑ๋ถ๋™์— ์œ„์น˜ํ•œ ์ฝ๊ณ  ์ถ”์ฒœํ•˜๋Š” ํ๋ ˆ์ด์…˜ ์„œ์  โ€˜๋ถ€์ฟ โ€™. SNS์—์„œ โ€˜์ฑ… ์ฝ์–ด์ฃผ๋Š” ๋‚จ์žโ€™๋กœ 100๋งŒ ๊ตฌ๋…์ž์™€ ์†Œํ†ตํ•˜๋Š” ํ๋ ˆ์ดํ„ฐ์™€ ์ฑ…์„ ์ข‹์•„ํ•˜๋Š” ์‚ฌ๋žŒ๋“ค์ด ๋ชจ์—ฌ ๋งŒ๋“  ์ด๊ณณ์€ 1๋งŒ ์—ฌ ๊ถŒ์˜ ์ถ”์ฒœ ๋„์„œ ๋ฟ ์•„๋‹ˆ๋ผ MD ์ œํ’ˆ, ๋“œ๋ผ์ด ํ”Œ๋ผ์›Œ ๋“ฑ์„ ํ•จ๊ป˜ ๋งŒ๋‚˜๋ณผ ์ˆ˜ ์žˆ๋Š” ๋ถ์นดํŽ˜๋‹ค. ์ฑ…์ด ์ „์‹œ๋˜์–ด ์žˆ๋Š” ๊ณณ๊ณณ์—๋Š” ์† ๊ธ€์”จ๋กœ ์ฑ…์— ๋Œ€ํ•œ ์ฝ”๋ฉ˜ํŠธ๋‚˜ ์ธ์ƒ๊นŠ์€ ๊ตฌ์ ˆ ๋“ฑ์ด ์ ํ˜€์žˆ์–ด ๊ตณ์ด ์ฝ์–ด๋ณด์ง€ ์•Š์•„๋„ ์ทจํ–ฅ์— ๋งž๊ฒŒ ์ฑ…์„ ๊ณ ๋ฅผ ์ˆ˜ ์žˆ๋Š” ์ ์ด ํฌ์ธํŠธ. ๊ทธ๋Ÿผ์—๋„ ์ฑ…์„ ์„ ํƒํ•˜๋Š” ๊ฒƒ์ด ์–ด๋ ต๋‹ค๋ฉด ์ฑ…์˜ ์ œ๋ชฉ๋„ ํ‘œ์ง€๋„ ์•Œ ์ˆ˜ ์—†๊ฒŒ ํฌ์žฅ๋˜์–ด ์žˆ๋Š” โ€˜๋น„๋ฐ€์˜ ์ฑ…โ€™์„ ๊ตฌ๋งคํ•ด๋ณด์ž. ๋งˆ์น˜ ์ž์‹ ์—๊ฒŒ ์„ ๋ฌผ์„ ์ฃผ๋Š” ์ƒ‰๋‹ค๋ฅธ ๊ธฐ๋ถ„์„ ์„ ์‚ฌํ•ด ์ค„ ๊ฒƒ์ด๋‹ค.ย ย  ๋ถ€์ฟ  ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์„ฑ๋ถ๊ตฌ ์„ฑ๋ถ๋กœ 167 ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 10:30 โ€“ 21:00 ์—ฐํฌ๋™์˜ ํ•œ ์ผ๋ฐ˜์ฃผํƒ์„ ๊ฐœ์กฐํ•ด ์—ฌ๋Ÿฌ ์ƒ์ ์œผ๋กœ ๊ณต๊ฐ„์„ ๊ตฌ์„ฑํ•ด๋†“์€ ์ด๊ณณ 2์ธต์—๋Š” ๋…๋ฆฝ ์„œ์ ์„ ํŒ๋งคํ•˜๋Š” โ€˜์œ ์–ด๋งˆ์ธ๋“œโ€™๊ฐ€ ์žˆ๋‹ค. ์ด๋ฏธ 1์„ธ๋Œ€ ๋…๋ฆฝ์„œ์ ์œผ๋กœ ์ตํžˆ ์•Œ๋ ค์ง„ ์ฑ…๋ฐฉ. ์ผ๋ฐ˜ ์„œ์ ์—์„œ๋Š” ๋Š๋‚„ ์ˆ˜ ์—†๋Š” ์ž์œ ๋ถ„๋ฐฉํ•œ ์–‘์‹์„ ๊ฐ€์ง„ ์„œ์ ๋“ค์ด ๊ตฌ๋น„๋˜์–ด ์žˆ์œผ๋ฉฐ, ๋…ํŠนํ•œ ์‚ฌ์ง„์ง‘๊ณผ ๊ท€์—ฌ์šด ์ผ๋Ÿฌ์ŠคํŠธ๊ฐ€ ๊ทธ๋ ค์ง„ ์ฑ…๋“ค์ด ํŠนํžˆ๋‚˜ ๋งŽ์ด ์ฆ๋น„ํ•ด์žˆ๋‹ค. ๋‹จ์ˆœํžˆ ์ฑ…์„ ์‚ฌ๊ณ  ํŒ๋งคํ•˜๋Š” ๊ณต๊ฐ„์ด ์•„๋‹Œ, ์˜์ž์— ์•‰์•„ ๋…๋ฆฝ ์ž‘๊ฐ€๋“ค์˜ ์ง™์€ ๊ฐ์„ฑ์ด ๋‹ด๊ฒจ์žˆ๋Š” ์‚ฌ์ง„์ง‘๊ณผ ์ฑ…์„ ๊ฐ์ƒํ•ด๋ณด๋Š” ๊ฒƒ์€ ์–ด๋–จ๊นŒ. ์œ ์–ด๋งˆ์ธ๋“œ ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์„œ๋Œ€๋ฌธ๊ตฌ ์—ฐํฌ๋กœ11๋ผ๊ธธ 10-6 2์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 13:00 โ€“ 20:00 / ํ™”์š”์ผ ํœด๋ฌด ๋””์ž์ธ ๋ฐ ์˜ˆ์ˆ  ์„œ์ ๋“ค๋กœ ๊ฐ€๋“ํ•œ โ€˜ํฌ์ŠคํŠธ ํฌ์—ํ‹ฑ์Šคโ€™. ๋ฏธ์ˆ , ๊ฑด์ถ•, ๋””์ž์ธ, ์‚ฌ์ง„, ํŒจ์…˜ ๋“ฑ ์˜ˆ์ˆ  ์ „๋ฐ˜์˜ ์ถœํŒ๋ฌผ์„ ๋‹ค๋ฃจ๋Š” ์„œ์ ์€ ์ „ ์„ธ๊ณ„ ํฌ๊ณ  ์ž‘์€ ์ถœํŒ์‚ฌ 200์—ฌ ๊ณณ๊ณผ ๊ฑฐ๋ž˜ํ•˜๋ฉฐ ์ถœํŒ๋ฌผ์„ ์ˆ˜์ž…, ์œ ํ†ต, ํŒ๋งคํ•œ๋‹ค. ๋ˆˆ์— ๋„๋Š” ์ ์€ ์ฒ ์ œ ์„ ๋ฐ˜์— ์ฐจ๊ณก์ฐจ๊ณก ์Œ“์—ฌ์žˆ๋Š” ์ด๊ณณ๋งŒ์˜ ๋…ํŠนํ•œ ์ง„์—ด ๋ฐฉ์‹. ๋งˆ์น˜ ์˜ท์„ ๊ฐœ์–ด ๋„ฃ์€ ๋“ฏ ์ฑ…๋ณด๋‹ค๋Š” ์ž์—ฐ์Šค๋ ˆ ํ‘œ์ง€์— ์‹œ์„ ์ด ๊ฐ€๋Š” ๊ตฌ์กฐ๋Š” ๋งˆ์น˜ ํ•˜๋‚˜์˜ ์˜ˆ์ˆ  ์ž‘ํ’ˆ์„ ๋ณด๋Š” ๊ฒƒ ๊ฐ™๋‹ค. ๊ฐ ์„ ๋ฐ˜๋งˆ๋‹ค ๋‹ค์–‘ํ•œ ํ•ด์™ธ ์ถœํŒ์‚ฌ์˜ ํŠน์ง•์ด ์ ํ˜€ ์žˆ์œผ๋ฉฐ, ์ฑ…๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์—์ฝ”๋ฐฑ, ๋””์ž์ธ ์†Œํ’ˆ๋“ค๋„ ํ•จ๊ป˜ ํŒ๋งคํ•˜๋Š” ๋งค๋ ฅ์ ์ธ ๊ณต๊ฐ„. ํ‰์†Œ ์ ‘ํ•˜๊ธฐ ์–ด๋ ค์šด ํ•ด์™ธ ์„œ์ ๋“ค์„ ๋งŒ๋‚˜๊ณ  ์‹ถ๋‹ค๋ฉด ์ฃผ์ € ์—†์ด ๋ฐฉ๋ฌธํ•ด๋ณด์ž. ํฌ์ŠคํŠธ ํฌ์—ํ‹ฑ์Šค ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์šฉ์‚ฐ๊ตฌ ์ดํƒœ์›๋กœ 240, 1์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃํ‰์ผ 13:00 โ€“ 20:00 / ์ผ์š”์ผ, ๋งˆ์ง€๋ง‰ ์ฃผ ์›”์š”์ผ ํœด๋ฌด ๊ฒฝ๋ณต๊ถ์—ญ ํ•œ ์ž๋ฝ์— ์œ„์น˜ํ•œ โ€˜๋” ๋ถ ์†Œ์‚ฌ์ด์–ดํ‹ฐโ€™. ์„ธ๋ชจ ๋ชจ์–‘์˜ ๋กœ๊ณ ์™€ ๋‘๊บผ์šด ์ดˆ๋ก๋ฌธ์ด ์ธ์ƒ์ ์ธ ์ด๊ณณ์€ ์„œ์ ์ด์ž ์ถœํŒ, ํ๋ ˆ์ดํŒ… ๋“ฑ ๋‹ค์–‘ํ•œ ํ”„๋กœ์ ํŠธ ์ŠคํŽ˜์ด์Šค๋กœ ๋””์ž์ด๋„ˆ์™€ ์˜ˆ์ˆ ๊ฐ€๋“ค์˜ ์˜๊ฐ ๋ณด๋ฌผ์„ฌ์ด๋‹ค. ๊ตญ๋‚ด์™ธ ์‹œ๊ฐ ์˜ˆ์ˆ  ๋ถ„์•ผ์˜ ๋…๋ฆฝ, ์•„ํŠธ๋ถ ์ถœํŒ ์„œ์ ์„ ์ด๊ณณ๋งŒ์˜ ์ทจํ–ฅ์œผ๋กœ ์—„์ค‘ํžˆ ๊ณจ๋ผ ์ฑ„์›Œ ๋„ฃ์€ ๊ณณ. ์‹ฌ์ง€์–ด ๋ฐ”์ฝ”๋“œ๋ฅผ ๋ณผ ์ˆ˜ ์—†๋Š” ์ฑ…๊ณผ DVD ๋“ฑ์ด ์ˆจ๊ฒจ์ ธ ์žˆ์–ด ๋ณด๋ฌผ์ฐพ๊ธฐ๋ฅผ ํ•˜๋Š” ๊ธฐ๋ถ„์ด ๋“ค๊ธฐ๋„ ํ•œ๋‹ค. ์Šคํ„ฐ๋”” ํ”„๋กœ๊ทธ๋žจ๊ณผ ๋””์ž์ด๋„ˆ ํ† ํฌ ๋“ฑ ๋‹ค์ฑ„๋กœ์šด ํ–‰์‚ฌ๋ฅผ ๊ฐœ์ตœํ•˜๋Š” ๋งŒํผ ๊ตญ๋‚ด์™ธ ์•„ํ‹ฐ์ŠคํŠธ๋“ค์ด ์•„์ง€ํŠธ์ฒ˜๋Ÿผ ์ฐพ๋Š” ๊ณต๊ฐ„. ๋” ๋ถ ์†Œ์‚ฌ์ด์–ดํ‹ฐ ์ฃผ์†Œ ใ…ฃ ์„œ์šธ ์ข…๋กœ๊ตฌ ์žํ•˜๋ฌธ๋กœ10๊ธธ 22 2์ธต ์˜์—…์‹œ๊ฐ„ ใ…ฃ ํ‰์ผ 13:00 โ€“ 19:00ย  / ์›”์š”์ผ ํœด๋ฌด by eyesmag supportersย  ๊ฐ•์ง€๋ฏผ / ๊น€๊ฑดํ˜ธ / ๊น€๋ฏผ์„ฑ / ๊น€๋ณด๋ฏธ ๋ฐ•ํ•œ์ค€ / ๋ฐฐ๋ช…ํ˜„ / ์ด์˜์ค€ / ์ •์˜ˆ์ง„ ๋”ย ์ž์„ธํ•œย ๋‚ด์šฉ์€ย <์•„์ด์ฆˆ๋งค๊ฑฐ์ง„>ย ๋งํฌ์—์„œ