Academic Journal of Engineering and Technology Science, 2023, 6(5); doi: 10.25236/AJETS.2023.060509.
1Guangdong Business and Technology University, 526060, Zhaoqing, Guangdong, China
2Philippine Christian University Center for Internatoinal Education, 1004, Manila, Philippine
By optimizing and innovating CST (computer software technology) in the era of BD(big data), BD can be realized as an effective support for the development of CST. Therefore, in the era of BD, the use of CST has a very important practical role. With the advent of the era of BD and cloud computing, CST can process data content in batches, define the application characteristics of data carriers in different application scenarios according to the demand relationship presented by data information ontology, and combine with the preset standards of the system to realize autonomous driving processing. In this case, it is undoubtedly necessary to comprehensively improve the application ability of CST and explore reasonable application methods. The article discusses this. Firstly, this paper summarizes the development status of BD and analyzes the expression of CST. Secondly, it expounds the types of CST in the era of BD; Finally, the application scenarios of CST in the era of BD are analyzed.
Big data; Computer software; Application
Jingbo Duan. Research on the application of computer software technology in the era of big data. Academic Journal of Engineering and Technology Science (2023) Vol. 6, Issue 5: 55-59. https://doi.org/10.25236/AJETS.2023.060509.
 Li Hao, Sharla Cheung, Feng Dengguo, et al. Research on big data access control [J]. Chinese journal of computers, 2017, 40(1):20.
 Chen Jing, Sharla Cheung, Zhang Ling. Research on the teaching content of computer application technology in the era of big data [J]. Automation and Instrumentation, 2015(11):3.
 Hu Yi. Information strategy of enterprises in the era of big data-Comment on Computer and Chemical Data Processing [J]. Plastic Industry, 2020, 48(4):1.
 Wang Guohua, Du Hongzhang, Wu Fenggang, et al. Overview of high-density magnetic recording technology [J]. Computer Research and Development, 2018, 55(9):13.
 Zhou Huikai. Hardware unloading of homomorphic encryption and its application in privacy protection calculation [J]. Miniature Microcomputer System, 2021, 42(3):6.
 Dang Jiaqi. The application of layered technology in computer software development [J]. Education Research, 2021, 4(8):5-6.
 Liu Donglan, Liu Xin, Zhang Hao, et al. Research and application of network security situation awareness and active defense technology based on big data [J]. Computer Measurement and Control, 2019(010):027.
 Cheng Yongxin. Methodology and practice of data asset management in the era of big data [J]. Computer applications and software, 2018, 35(11):4.
 Yu Tongrui, Jin Ran, Han Xiaozhen, Li Jiahui, Yu Ting. Review of the research on the pre-training model of natural language processing [J]. Computer Engineering and Application, 2020, 56(23):11.
 Kong Xiang, Liao Husheng, Wang Yixiong, et al. Research on Distributed Complex Event Flow Processing Platform [J]. Computer Engineering and Application, 2017, 53(8):9.