Location>code7788 >text

Some Reflections on Architect Preparation (IV)

Popularity:255 ℃/2024-09-19 11:40:55

preamble

With math, what we learned before was right, but not true, so we didn't think mathematically.
For computers, what we teach in school is right, but not really, so just from the school to learn the knowledge of recent graduates, regardless of 985,211, undergraduate, specialist are the same, are a blank sheet of paper, nothing.

Case Study

The case study is 3 out of 5, with the first question mandatory.

  • Types of question one
    Architecture Style Comparison
  • Types of question two
    Quality Attribute Filling
  • Types of question three
    ER diagram analysis
  • Question type IV
    Scenario analysis, there are more questions of this type.
    The case studies are mainly answered in the context of what we have previously presented and our own experience.

discuss a paper or thesis (old)

This essay is said to be a dissertation, but when you look at the questions, you will find that it always lets you narrate the projects you participated in and the work you undertook.
So here it should be that we have to write a project description first, and this project is a fake, big, empty project, we can write a collection of projects that we have done before into a virtual project.
The work undertaken is definitely the architect, because you have to take the architect's exam.

On data slicing techniques and their applications
Data slicing is to divide the data set into independent and orthogonal data subsets according to certain rules. Then the data subsets are distributed to different nodes. By designing reasonable data slicing rules, the data in the system can be distributed on different
in the physical database to achieve the purpose of improving the data processing speed of the application system.
Please focus on the thesis of "on data slicing technology and its application", in order to discuss the following three aspects.
1. Outline the projects in which you have been involved in managing and developing software and the work you have undertaken.
Segmentation, Consistent Hash Segmentation and Segmentation by Data Range are the three commonly used ways of segmenting data.
3. Specifically describe your participation in the management and development of the project, and the use of which slice, and specify its realization process and application effects.

On Cloud Native Architecture and Its Applications
Focus on the topic of "Cloud Native Architecture and its Applications" and address each of the following three areas in turn.
1. Outline the software projects you have been involved in managing and developing and the major tasks you have undertaken.
2. Servitization, robustness, resilience, observability, and automation are the four categories of design principles that are repeated in cloud-native architectures, please briefly elaborate on the connotations of these four categories of design principles.
3. Specifically describe how the project you are involved in managing and developing is moving towards the adoption of a cloud-native architecture, and discuss in detail what practical problems were encountered during the design and implementation of the project around the four categories of design principles mentioned above. How were they solved?

Examples of papers

Here's a brief example of what to write. Because of the word count requirement, we'll put up some nonsense when we can.
Here is the format of the paper:

self-introduction

In 20xx, my company developed the xxx intelligent integrated management platform, in the system, I served as an architect and project manager, that is, responsible for finalizing the project plan, demand analysis, work allocation, personnel management, but also responsible for the project framework development, database design, project quality management, but also responsible for test management.

Project Features

Write as much as you can here, the more complex the better.

XXX Intelligent Comprehensive Management Platform is a comprehensive platform that integrates several systems, including permission system, single sign-on system, OA office system, sales and inventory system (ERP), information management system (MIS), basic data platform, GIS data one map system, mobile inspection system, data management desktop application system, real-time monitoring desktop application system.

Use of technology

Write down all the techniques you recognize.

The techniques used are very varied and different types of projects use different techniques.
Use of java system technology are: spring cloud, spring boot, nacos, gatway, akka, kafka, flink, android, etc..
Use net system technology: net core, wcf, wpf, winform, consul, ocelot, rabbitmq and so on.
The databases used are: mysql, sqlserver, oracle, splite, redis, and so on.
Other technologies are: arcgis, AutoCAD, camera call, plc call, face recognition, fingerprint recognition, opencv, ffmpeg and so on.

Answer the question.

I use hash slicing in xx system, when implementing xx function, in order to improve performance and access security, we have taken caching measures, we take out the hashcode of the requested data entity, because hashcode is a relatively large number, in order to alleviate the pressure on the cache, we have taken the bloom filtering way, in redis, we specify a number of storage locations, store the value of 1 In order to reduce cache pressure, we adopt the Bloom filtering approach, specifying multiple storage locations in redis with a value of 1, and then using bloom filtering to calculate the storage location of the hashcode when the user initiates a request, and then taking out the value to determine whether it exists.

Just follow the outline above and expand to 2,500-3,000 words.


Note: This post is original, please contact the author for authorization and attribution for any form of reproduction!



If you think this article is still good, please click [Recommend] below, thank you very much!

/kiba/p/18410661