In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-08 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
We need a three-dimensional coordinate system in addition to the compass.
In the last section of , we learned how to use the compass of security architects to prevent systemic collapse, and then we need a three-dimensional coordinate system to chart the trajectory of the past, determine the position of the present, and predict and adjust the direction of the future.
Three problems that all architects need to solve
Although says that senior designers solve high-level problems and junior designers solve junior problems, there are three questions that all designers have to answer in every design solution, that is:
1, understand the technical solutions of other designers?
2, what is the specific function of the abstract concept of security design?
3, how do you convince others to accept your security plan?
Slow down and scold your mother.
failure to answer any of these questions will affect your ability to be a good security designer. When you see this, you may be going to scold your mother, and you have to talk about these three questions. In fact, it took me seven years to understand that my direction should be to constantly polish three questions, instead of having the enthusiasm of young people, but lacking theory and foresight, it can be said that I have taken a lot of detours. Of course, I also saw the scenery on the detour.
My purpose is to state once again
here to sum up my ideas, can not give beginners a map on the road of security designers, hoping to give you a compass to help you find your own direction on the road of security designers, the three simple questions in this section is that I give students a three-dimensional coordinate system to help you evaluate and calibrate our course.
Arrangement of the contents of the series
, thank you for following me so far, and now I'm going to explain the structure of the whole series. The whole content is divided into three parts, and you should have guessed that each question is part of it. I haven't determined the details of each part yet!
Thinking about this section
, how does your security architecture plan to grow?
Portal
05 understands the technical solutions of other designers
Core values of 03 Security Architects
January 1, 2018: 8:53, Happy New year, friends!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.