当前位置:网站首页>Data governance: Data Governance under microservice architecture
Data governance: Data Governance under microservice architecture
2022-07-06 07:45:00 【Freedom3568】
List of articles
brief introduction
Some time ago , One of my little partners jumped to a large state-owned enterprise , Just arrived at the company , The boss gave him an important project —— The data center planning of the company .
Boss explained :“ We should build a data middle platform architecture , Covering data asset management 、 Data governance 、 Data analysis, etc , At the same time, this data center , To reflect decentralization , Even the idea of decentralization ”.
My buddy has many years of experience in data warehouse architecture , It also refers to the mainstream data midrange architecture in the industry , Soon “ Copy sth. without catching its spirit ” I made a data center architecture diagram .
When he takes his own “ favourite work ”, When reporting to the boss , I didn't expect the boss only glanced , He scolded him directly , The main reason is that it doesn't reflect “ De centralization ” Thought .
My companion complained to me :“ The data center doesn't have to
边栏推荐
- Linked list interview questions (Graphic explanation)
- C # display the list control, select the file to obtain the file path and filter the file extension, and RichTextBox displays the data
- 上线APS系统,破除物料采购计划与生产实际脱钩的难题
- Get the path of edge browser
- [factorial inverse], [linear inverse], [combinatorial counting] Niu Mei's mathematical problems
- Significance and measures of encryption protection for intelligent terminal equipment
- Codeforces Global Round 19(A~D)
- In the era of digital economy, how to ensure security?
- word设置目录
- Ali's redis interview question is too difficult, isn't it? I was pressed on the ground and rubbed
猜你喜欢
[cf gym101196-i] waif until dark network maximum flow
Redis builds clusters
成为优秀的TS体操高手 之 TS 类型体操前置知识储备
Document 2 Feb 12 16:54
datax自检报错 /datax/plugin/reader/._drdsreader/plugin.json]不存在
解决方案:智慧工地智能巡檢方案視頻監控系統
数据治理:主数据的3特征、4超越和3二八原则
How to prevent Association in cross-border e-commerce multi account operations?
Significance and measures of encryption protection for intelligent terminal equipment
Jerry's ad series MIDI function description [chapter]
随机推荐
Bugku CTF daily question: do you want seeds? Blackmailed
Risk planning and identification of Oracle project management system
Inspiration from the recruitment of bioinformatics analysts in the Department of laboratory medicine, Zhujiang Hospital, Southern Medical University
MEX有关的学习
opencv学习笔记九--背景建模+光流估计
Scala语言学习-08-抽象类
js對象獲取屬性的方法(.和[]方式)
TS 类型体操 之 循环中的键值判断,as 关键字使用
Simulation of holographic interferogram and phase reconstruction of Fourier transform based on MATLAB
Codeforces Global Round 19(A~D)
JMeter performance test steps practical tutorial
http缓存,强制缓存,协商缓存
洛谷P1836 数页码 题解
上线APS系统,破除物料采购计划与生产实际脱钩的难题
[window] when the Microsoft Store is deleted locally, how to reinstall it in three steps
Typescript function definition
Position() function in XPath uses
Iterator Foundation
数据治理:主数据的3特征、4超越和3二八原则
[dictionary tree] [trie] p3879 [tjoi2010] reading comprehension