当前位置:网站首页>Devops in digital transformation digital risk
Devops in digital transformation digital risk
2022-06-24 17:15:00 【Guhuangliang】
The success or failure of the transformation , It depends on the final transformation effect and value , Whether it's digital or DevOps, It's all about results , We should not transform for the sake of transformation .DevOps As a key built-in stage of digital transformation , To undertake the IT organization “ Value delivery ” The carrier function of , Undertake the data capacity output of digital operation , At the same time, from the perspective of value , Bring digital insight and business contribution to the business unit .DevOps As an enterprise IT The logical starting point of infrastructure and technology operation construction , Realize the cost in the process of comprehensive operation of the enterprise by means of technology 、 Benefits 、 Quality optimization , And new technologies 、 Cultivation of innovative models . In the process of digital transformation ,DevOps Output a series of digital indicators from the perspective of data measurement and feedback , End to end digital touch to software delivery and multiple links of product life cycle , At the same time, the business scenarios 、 Office scene 、 Collaborative scenarios for data-driven transformation . As the enterprise's goal of digital transformation is gradually extended , And managers' understanding of digital empowerment continues to deepen , Encourage enterprises to DevOps The capability requirements for digital full link scenarios are becoming higher and higher , At the same time, the digital transformation gradually entering the deep-water area also brings a series of digital risks , It is embodied in digital visualization and digital operation . stay IT Inside the organization ,IT The transition of architecture from steady state to sensitive state , It brings risks of horizontal process driving and vertical data feedback in the software delivery process , In the business organization , The scene coverage of digital feedback and the prominence of vanity indicators have reduced the ability of risk early warning and disposal , The risks brought by data decision-making are more hidden, leading to the passive avoidance of rules , Within the enterprise ,IT strategic management 、 Organizational structure 、 Digital culture 、 Business lines and IT Customer service and other multi-level data concepts and data caliber also further magnify the digital risk . therefore , Data managers need to manage data prudently and properly , Form a unified data caliber and a full scene data flow link , Ensure positive feedback of figures and continuous clearing of stock data risks .
One 、DevOps Digital risk in the process
stay DevOps Best practice cases , The author thinks , Digital risk is not just focused on measurement and feedback , Lack of high-order scenario of test data 、 The link of safety data is connected 、 Universal prediction of user experience is the manifestation of digital risk , The most common digital risk scenarios are IT Organizational effectiveness evaluation ,IT Post evaluation and cost review of the project , Guarantee feedback during product operation . because DevOps Cultural characteristics ,IT The collaborative environment and responsibility sharing mode of members will transfer product problems , Finally, it is reflected in the business scenario through product operation , This is a DevOps The advantages of , It's also DevOps Potential risk factors in practice .
01、 Missing high-order scenarios for test data
The test is DevOps A key link in the capability sub domain , To undertake “ Product level ” Product release , Especially in the left shift phase of the test , Extend quality to business requirements . therefore , Testing is very important to verify whether the behavior of the application or service meets the expectations and whether the product can be delivered safely .
Missing high-order scenarios for test data , about “ Value delivery ” for , It usually causes problems in the stability and accuracy of test results , Affect product quality and safety , For digital decision support , Complete test data can simulate data changes in the process of business operation in advance , And the transformation process of target users . This high-level scenario is oriented to the business and requirements organization , At the same time, it gives the positive feedback to digital users .
02、 The link of safety data is connected
The scenario of security data is embedded into... Through risk aversion DevOps“ Value delivery ” link , It can effectively avoid hazards during product delivery , At the same time guarantee DevOps Amplification of advantages . The link of safety data is connected , In the process of software delivery and product operation , Continuous monitoring of data performance , Deliver infrastructure through services 、 Full visibility of applications and their interdependencies 、 Intelligent analysis of business data , Ensure that potential threats can be addressed before affecting business operations . meanwhile , Link up the safety data , It can be oriented to all nodes in the product operation process , In business language , Carry out information transmission and public opinion transmission from a business perspective , Drive digital visualization and digital operation to realize safe telemetry .
03、 The universality of user experience
In traditional DevOps In practice , Pay more attention to the implementation and lead time of requirements , As user habits change , prompt DevOps And business organizations , It is mainly manifested in the universality and predictive ability of user experience . According to the statistics of authoritative data , The user experience is mainly focused on high expectations for functions and low tolerance for problems , therefore DevOps Digital feedback needs to be put in front , Cover user experience scenarios , From a user perspective , Extend the digital scenario to business planning 、 Product needs 、 Test data 、 Release strategy and final business monitoring , Fully understand the business and focus on the user experience , Visibility introduction and governance of user experience in a digital visual way .
Two 、 Digital risks in the process of digital transformation
Digital transformation , The most critical node is the digitalization of business objectives , It is often called digital operation or digital strategy , The most important node is comprehensive digital thinking , This is also the core for digital engineering to become an enterprise level project . therefore , The leader of an enterprise must have the role of a digital user , At the same time, it is also responsible for digital risk .
The author thinks ,DevOps As a key part of the digital transformation , It should also rise to the height of enterprise level engineering , Whether for the product “ Value delivery ” Or enterprise data “ Numbers empower ”, All need a clear functional definition . Look at digital risk from the perspective of enterprise management , There are mainly three aspects , The risks of digital warfare 、 The risks of digital decision-making and digital vision .
01、 The risks of digital warfare
Compared with data indicators, digital countermeasures , More from the perspective of business operation , stay DevOps The area of measurement , There are many core indicators and vanity indicators of confrontation , The risk of this confrontation is likely to lead to a consequential shift in the final value , Similar problems also exist in the process of digital transformation . As long as the numbers have value , There must be the possibility of digital benefits , Digital confrontation depends on the understanding of digital objectives by enterprise managers in different scenarios and stages .
The comprehensive digital operation of the enterprise covers IT Lean operation of the organization 、 The lean operation of operating organizations and the lean operation of functional organizations , In different organizations and different scenarios , Digital feedback is often limited to milestones or goals , There are also “ Contrary to each other ” The situation of , Typical examples are the Inconformity between energy efficiency and results , Instability of operational strategies and results , Uncertainty in project forecasts and results , Therefore, digital confrontation is the periodic feedback result of managers' thinking mode and understanding ability .
02、 The risks of digital decision-making
In most of the scenes , The risk of digital aided decision-making comes from the comprehensiveness of numbers 、 Definition and standardization , The lack of digital information system and backward technology is an important reason for the distortion of digital decision-making , meanwhile , Another key reason for decision-making distortion is that digital users' cognition of numbers is biased .
The most important thing in enterprise digital transformation is information system and data platform , This is the basis of the whole digitalization , At the same time, it is also the brain of digital decision-making . The risk of digital decision-making comes from whether the equipment can be interconnected 、 Whether the data can be interconnected 、 Whether the data caliber is consistent 、 Whether the data definition is standard 、 Whether data thinking is aligned with management .
03、 The risks of the digital vision
Digital vision is the goal of digital transformation , and DevOps similar ,DevOps Our vision is to improve energy efficiency and quality at the organizational level , It needs to be tailored to local conditions 、 Differ from man to man 、 In the light of its general trend . Again , Digital transformation is not a disruptive innovation in essence , But internal reconstruction based on digital empowerment , So it needs to be from top to bottom , Step by step , This is also in line with the scientific law of digital capability output .
Digital transformation requires multiple “ Ladder like ” The goal of , and “ Overall ” There can only be one strategy , Break down the goals according to scenarios and organizations , And then put it into the daily operation of each capability sub domain , Try and improve constantly , In order to finally achieve the goal .
边栏推荐
- "Gambler" bubble Matt turns around
- How to get the response body content in gin?
- FPGA project development: experience sharing of lmk04821 chip project development based on jesd204b (I)
- Contributed code to famous projects for the first time, a little nervous
- About with admin option and with grant option
- 实现TypeScript运行时类型检查
- A solution for building live video based on open source real-time audio and video webrtc architecture
- Ramda's little-known side
- "Competition" and "opportunity" hidden in security operation in the cloud Era
- C4D learning notes
猜你喜欢

MySQL learning -- table structure of SQL test questions

Why do you develop middleware when you are young? "You can choose your own way"
![[leetcode108] convert an ordered array into a binary search tree (medium order traversal)](/img/e1/0fac59a531040d74fd7531e2840eb5.jpg)
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)

Daily algorithm & interview questions, 28 days of special training in large factories - the 15th day (string)
随机推荐
Activeindex selection and redirection in the menu bar on the right of easycvs
test
[tke] enable CPU static management strategy
IBM: supporting AI and enterprise digital reshaping in the cloud era with modern architecture
Tiktok Kwai, e-commerce enters the same river
Let ups "Impressionist users" re understand reliability
What securities dealers recommend? Is it safe to open an account online now?
Tencent monthly security report helps rural revitalization, releases cloud security reports, and jointly builds a joint network security laboratory
06. Tencent cloud IOT device side learning - Introduction to basic functions
The TKE cluster node reports an error when executing kubectl
C4D learning notes
[tke] whether to configure SNAT when the container accesses services outside the node
zblog系统实现前台调用当天发布文章数量的教程
Tensor and tensor network background and significance - basic knowledge
Try catch finally implementation mechanism
Abstract factory pattern
"Competition" and "opportunity" hidden in security operation in the cloud Era
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)
Prometheus deployment
The RTSP video structured intelligent analysis platform easynvr stops calling the PTZ interface through the onvif protocol to troubleshoot the pending status