“Data Mesh is a strategic approach to modern data management and a way to strengthen an organization’s digital transformation journey, as it centers on serving up valuable and secure data products.”
Many organizations have invested in a central data lake and a data team with the expectation to drive their business based on data.
![](https://anilkgtech.wordpress.com/wp-content/uploads/2022/12/whyteam7348467442508373587.jpg?w=1024)
However, after a few initial quick wins, they notice that the central data team often becomes a bottleneck. The team cannot handle all the analytical questions of management and product owners quickly enough. This is a massive problem because making timely data-driven decisions is crucial to stay competitive. For example: Is it a good idea to offer free shipping during Black Week? Do customers accept longer but more reliable shipping times? How does a product page change influence the checkout and returns rate?
The data team wants to answer all those questions quickly. In practice, however, they struggle because they need to spend too much time fixing broken data pipelines after operational database changes. In their little time remaining, the data team has to discover and understand the necessary domain data. For every question, they need to learn domain knowledge to give meaningful insights. Getting the required domain expertise is a daunting task.
![](https://anilkgtech.wordpress.com/wp-content/uploads/2022/12/whychecklist1810328779767896456.jpg?w=1024)
On the other hand, organizations have also invested in domain-driven design, autonomous domain teams (also known as stream-aligned teams or product teams) and a decentralized microservice architecture. These domain teams own and know their domain, including the information needs of the business. They design, build, and run their web applications and APIs on their own. Despite knowing the domain and the relevant information needs, the domain teams have to reach out to the overloaded central data team to get the necessary data-driven insights.
With the eventual growth of the organization, the situation of the domain teams and the central data team becomes worse. A way out of this is to shift the responsibility for data from the central data team to the domain teams.
This is the core idea behind the Data Mesh concept: Domain-oriented decentralization for analytical data. A data mesh architecture enables domain teams to perform cross-domain data analysis on their own and interconnects data, similar to APIs in a microservice architecture.
What Is Data Mesh
Much in the same way that software engineering teams transitioned from monolithic applications to microservice architectures, the Data Mesh is, in many ways, the data platform version of microservices.
![](https://anilkgtech.wordpress.com/wp-content/uploads/2022/12/datamesh2154624914091060101.jpg?w=1024)
The term Data Mesh was coined by Zhamak Dehghani in 2019 and is based on four fundamental principles that bundle well-known concepts:
- The domain ownership principle mandates the domain teams to take responsibility for their data. According to this principle, analytical data should be composed around domains, similar to the team boundaries aligning with the system’s bounded context. Following the domain-driven distributed architecture, analytical and operational data ownership is moved to the domain teams, away from the central data team.
- The data as a product principle projects a product thinking philosophy onto analytical data. This principle means that there are consumers for the data beyond the domain. The domain team is responsible for satisfying the needs of other domains by providing high-quality data. Basically, domain data should be treated as any other public API.
- The idea behind the self-serve data infrastructure platform is to adopt platform thinking to data infrastructure. A dedicated data platform team provides domain-agnostic functionality, tools, and systems to build, execute, and maintain interoperable data products for all domains. With its platform, the data platform team enables domain teams to seamlessly consume and create data products.
- The federated governance principle achieves interoperability of all data products through standardization, which is promoted through the whole data mesh by the governance guild. The main goal of federated governance is to create a data ecosystem with adherence to the organizational rules and industry regulations
Why Use A Data Mesh
Until recently, many companies leveraged a single data warehouse connected to myriad business intelligence platforms. Such solutions were maintained by a small group of specialists and frequently burdened by significant technical debt.
In 2020, the architecture du jour is a Data Lake with real-time data availability and stream processing, with the goal of ingesting, enriching, transforming, and serving data from a centralized data platform. For many organizations, this type of architecture falls short in a few ways:
- A central ETL pipeline gives teams less control over increasing volumes of data
- As every company becomes a data company, different data use cases require different types of transformations, putting a heavy load on the central platform
Such Data Lakes lead to disconnected data producers, impatient data consumers, and worse of all, a backlogged data team struggling to keep pace with the demands of the business. Instead, domain-oriented data architectures, like Data Meshes, give teams the best of both worlds: a centralized database (or a distributed data lake) with domains (or business areas) responsible for handling their own pipelines. As Zhamak argues, data architectures can be most easily scaled by being broken down into smaller, domain-oriented components.
Data Mesh vs Data Lake
The Data Lake is a technology approach, whose main objective has traditionally been as a single repository to move data to in as simple a manner as possible, where the central team is responsible for managing it. While Data Lakes can provide significant business value, they also suffer from a number of issues. The primary issue is that once data is moved to the lake it loses context, for example we may have many files containing a definition of customer, one from a logistics system, one from payments and one from marketing, which one is correct for my usage? Furthermore data in the Data Lake will not have been pre-processed, so data issues will inevitably arise. The data consumer will then typically have to liaise with the data lake team to understand and resolve data issues, which becomes a significant bottleneck to using the data to answer the initial business question.
In comparison Data Mesh is more than just technology, Data Mesh combines both technology and organizational aspects including the idea of data ownership, data quality and autonomy. So consumers of data have a clear line of sight around data quality and data ownership and data issues can be discovered and resolved much more efficiently. Ultimately data can be used and trusted.
Data Mesh vs Data Fabric
Data Fabric concentrates on a collection of various technological capabilities that collaborate to produce an interface for the end-users that consume data. Many of the supporters of Data Fabric espouse automation through technologies like ML of many of the data management tasks to enable end users to access data in a simpler way. For simple data usage there is some value in this, however for more complex situations or where business knowledge needs to be integrated into the data then the limitations of Data Fabric will become apparent.
Arguably Data Fabric could be used as part of a Data Mesh self-serve platform, where data fabric exposes data to the domains who can then embed their business knowledge into a resulting data product.
As Darnell-Kanal Professor of Computer Science, University of Maryland at College Park Daniel Abadi says the difference between a Data Fabric and Data Mesh is not obvious. He advises, “Ultimately, an optimal solution will likely take the best ideas from each of these approaches.”
Final Thoughts
Data Mesh may not be applicable in every environment, but it offers an alternative to current data architecture models, allowing greater synergy between technical teams and business areas, which are the big users of data.
🅐🅚🅖
Interested in Management, Design or Technology Consulting, contact anil.kg.26@gmail.com
Get updates and news on our social channels!
LATEST POSTS
- A Tale Of Two Frameworks: Spring Boot vs. Django“Spring Boot’s convention over configuration approach simplifies development, allowing developers to focus on building robust applications rather than wrestling with… Read more: A Tale Of Two Frameworks: Spring Boot vs. Django
- Unleashing The Power Of Django“Django, akin to a Swiss Army knife, provides a comprehensive toolkit, facilitating developers in tackling diverse web development challenges with… Read more: Unleashing The Power Of Django
- Potential of Progressive Web Apps (PWAs)“PWAs are not just about technology; they are about creating meaningful connections with users.” Why PWAs Are the Next Frontier… Read more: Potential of Progressive Web Apps (PWAs)
- Unleashing The Power Of Spring Framework“Spring Framework simplifies enterprise Java development, but it does so in a way that embraces existing frameworks and infrastructure.” –… Read more: Unleashing The Power Of Spring Framework
- Key Trends Of OSINT In 2024“The future of OSINT lies in our ability to adapt and innovate. By embracing emerging technologies and ethical best practices,… Read more: Key Trends Of OSINT In 2024
- Can Google’s Carbon Language Replace C++?“While Carbon may excel in performance-critical domains, it cannot replace the versatility and extensive ecosystem of C++.” As the world… Read more: Can Google’s Carbon Language Replace C++?
- Integration of Design Thinking, Lean, and Agile“Innovation thrives when Design Thinking, Lean, and Agile converge, creating a powerful force that propels organizations towards excellence.” In today’s… Read more: Integration of Design Thinking, Lean, and Agile
- Benefits Of Infrastructure as Code (IaC)“Infrastructure as Code is the single most important thing you can do to improve the agility, reliability, and security of… Read more: Benefits Of Infrastructure as Code (IaC)
- Power Of Internet of Everything (IoE)“The true power of the Intebrnet of Everything lies not in the things themselves, but in the connections and insights… Read more: Power Of Internet of Everything (IoE)
- How Is The Enterprise IoT Evolving?“IoT is not just about connecting things; it’s about connecting minds, creating experiences, and transforming industries.” Pavan Singh, IoT Mentor… Read more: How Is The Enterprise IoT Evolving?
- IT Pricing Strategy And Models“The art of pricing lies in finding the perfect balance between capturing value and satisfying customers.” In the ever-evolving landscape… Read more: IT Pricing Strategy And Models
- What Is SYCL (“sickle”)?“SYCL provides a powerful and intuitive programming model that simplifies heterogeneous computing, allowing developers to write portable code that can… Read more: What Is SYCL (“sickle”)?
- What Is A Data Lakehouse?“With a data lakehouse, organizations can break down data silos, democratize data access, and accelerate innovation by enabling data exploration… Read more: What Is A Data Lakehouse?
- 5G – The Future Of The Internet“5G is the next big step in the evolution of wireless technology. It will offer significantly faster speeds and lower… Read more: 5G – The Future Of The Internet
- Ransomware Groups Are Switching To Rust“Rust is to Ransomware what a lockpick is to a thief – a powerful tool that can be used for… Read more: Ransomware Groups Are Switching To Rust
- Streaming Data Pipelines“A streaming data pipeline is like a river: it flows continuously, changes constantly, and requires monitoring to ensure it stays… Read more: Streaming Data Pipelines
- Why Rust Is Best?“Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.” Rust is a modern… Read more: Why Rust Is Best?
- Database Sharding Explained“Database sharding is like breaking a large puzzle into smaller, more manageable pieces, enabling improved scalability, performance, and availability, but… Read more: Database Sharding Explained
- Ambient Computing Will Be The Future Tech“Ambient computing creates a seamless technology-rich environment, but challenges in privacy, security, ethics, interoperability, user acceptance, and technical complexity must… Read more: Ambient Computing Will Be The Future Tech
- Key Trends Of OSINT In 2023“OSINT is not just a technique, it’s a mindset. It’s about looking at the world with an open mind and… Read more: Key Trends Of OSINT In 2023
- Why Is OSINT Important?“OSINT is not just a technique, it’s a mindset. It’s about looking at the world with an open mind and… Read more: Why Is OSINT Important?
- DataOps Explained“DataOps is the practice of integrating data engineering and data analytics to enable agile development, testing, and deployment of data-driven… Read more: DataOps Explained
- Transformation Platform as a Service (tPaaS)“tPaaS is all about enabling Digital Transformation by providing a platform that supports fast, agile and secure development and deployment… Read more: Transformation Platform as a Service (tPaaS)
- Hello Julia – Programming Language For Scientific Computing“Julia is a high-level, high-performance dynamic programming language designed for numerical computing, data science, and scientific computing.” The Julia Language… Read more: Hello Julia – Programming Language For Scientific Computing
- Top Programming Languages For Fintech“The top programming languages for Fintech are those that provide robust and secure frameworks for handling sensitive financial data, as… Read more: Top Programming Languages For Fintech
- How To Choose A NoSQL Database“SQL databases are like Excel spreadsheets. They’re good for storing structured data that you need to query in a specific… Read more: How To Choose A NoSQL Database
- Zero Knowledge Proof Explained“Zero Knowledge Proof is a powerful cryptographic tool that enables secure and private communication without revealing sensitive information, making it… Read more: Zero Knowledge Proof Explained
- Embracing Decentralized CyberSecurity“Decentralized CyberSecurity moves responsibilities and controls away from the center, to the individual areas most vulnerable to attack today.” Security… Read more: Embracing Decentralized CyberSecurity
- Global Impact of Ransomware Attacks“The global impact of ransomware attacks is a sobering reminder that cybersecurity is not just about protecting our data and… Read more: Global Impact of Ransomware Attacks
- Process Orchestrator Explained“Process orchestrator is the ultimate tool for achieving operational excellence, enabling you to optimize processes, improve productivity, and reduce costs.”… Read more: Process Orchestrator Explained
- What Does Platform Engineering Do?“The success of a Digital Platform depends on the strength of its underlying engineering. Solid engineering principles ensure reliability, scalability,… Read more: What Does Platform Engineering Do?
- Are Full-Stack Developers Obsolete?“According to the Stack Overflow 2016 Developer Survey, Full-Stack Developers are one of the highest-paid and most sought-after professionals today.”… Read more: Are Full-Stack Developers Obsolete?
- Top 5 Issues For Overusing Microservices“Microservices should only be seriously considered after evaluating the alternative paths.” The overuse of new architectural styles is common within… Read more: Top 5 Issues For Overusing Microservices
- Customer Experience (CX) Trends In 2023“Customer Experience is the next competitive battleground. It’s where business is going to be won or lost.” Tom Knighton, Executive… Read more: Customer Experience (CX) Trends In 2023
- Cognitive Computing In 2023 And Beyond“IBM defines Cognitive Computing as systems that learn at scale, reason with purpose and interact with humans naturally.” 2022 was… Read more: Cognitive Computing In 2023 And Beyond
- Top 7 Digital Transformation Trends In 2023“The threat of a recession coupled with the ongoing need for transformation and growth means CIOs must make force multiplying… Read more: Top 7 Digital Transformation Trends In 2023
- Top 5 DevOps Trends in 2023“The Global DevOps market size is expected to expand at a CAGR of 24.59% by 2027, reaching over 22199.4 million… Read more: Top 5 DevOps Trends in 2023
- Top 5 Cybersecurity Predictions For 2023“Cybersecurity will continue to be a major focus for company leaders as they bolster their digital defenses in 2023 and… Read more: Top 5 Cybersecurity Predictions For 2023
- Top 5 Cloud Computing Trends In 2023“Cloud Computing has been one of the most critical technologies of the last decade.” The ongoing mass adoption of Cloud… Read more: Top 5 Cloud Computing Trends In 2023
- 10 Technology Trends For 2023What are the best new technologies to learn to improve your career and knowledge? Technology today is evolving at a… Read more: 10 Technology Trends For 2023
- Top 5 AI /ML Trends In 2023“AI continues to transform our world as companies look to win over consumers with intelligent experiences delivered in real time… Read more: Top 5 AI /ML Trends In 2023
- Android Runs Better When Covered In Rust“C/C++ should no longer be used to start new projects and that Rust should be deployed where a language without… Read more: Android Runs Better When Covered In Rust
- Cybersecurity Mesh Architecture (CSMA)“CSMA is geared toward simplifying security architecture by encouraging collaboration and integration of a corporate security architecture.” One of the… Read more: Cybersecurity Mesh Architecture (CSMA)
- Data Mesh And It’s Principles“Data Mesh is a strategic approach to modern data management and a way to strengthen an organization’s digital transformation journey,… Read more: Data Mesh And It’s Principles
- Hard Tech To Disrupt The Future“Affordable robotics, AI-driven sensor fusion, uninterrupted connectivity and supermaterials are merging into the technology stack to unlock massive new tranches… Read more: Hard Tech To Disrupt The Future
- Top 5 Cloud Computing Vulnerabilities“Protecting your organization requires accepting the fact that your systems will be breached at some point; therefore, your strategy should… Read more: Top 5 Cloud Computing Vulnerabilities
- What’s Next After Cloud Computing – Edge?“Now, some companies are looking to replace Cloud Computing with something called Sky, Edge, or Hybrid Computing.” In the past few… Read more: What’s Next After Cloud Computing – Edge?
- Chip To Cloud IoT“Chip-to-Cloud IoT looks like a promising way to .build a more secure, useful and decentralized technology for all.” Shannon Flynn… Read more: Chip To Cloud IoT
- How To Secure The Cloud“Encryption, Configuration are one of the best ways to secure your Cloud Computing systems.’ Fortunately, there is a lot that you… Read more: How To Secure The Cloud
- Top 7 Advanced Cloud Security Challenges“Before jumping feet-first into the Cloud, understand the new and continuing top Cloud Security challenges your organization is likely to… Read more: Top 7 Advanced Cloud Security Challenges
- Why Cloud Security Is Important“Cloud Security is the whole bundle of technology, protocols, and best practices that protect Cloud Computing environments, applications running in… Read more: Why Cloud Security Is Important
- Why Implement Zero Trust Security Model?“Zero Trust extends the principle of ‘least privilege’ to its ultimate conclusion: Trust no one and grant the least privilege,… Read more: Why Implement Zero Trust Security Model?
- Advantages And Disadvantages Of Cloud Computing“When weighing the Cloud Computing advantages and disadvantages, it’s important to keep the sources of those pros and cons in… Read more: Advantages And Disadvantages Of Cloud Computing
- Benefits Of Cloud Computing“Cloud Computing benefits organizations in many ways. In fact, the benefits are so numerous that it makes it almost impossible not… Read more: Benefits Of Cloud Computing
- Why WebAssembly Is The Future Of Computing?“WebAssembly is a binary instruction format and virtual machine that brings near-native performance to web browser applications, and allows developers… Read more: Why WebAssembly Is The Future Of Computing?
- Virtualization In Cloud Computing“Virtualization and Cloud Computing are often discussed interchangeably, but while they’re closely associated, these tech terms have crucial differences.” Virtualization… Read more: Virtualization In Cloud Computing
- Cloud Service And Deployment Models“I don’t need a hard disk in my computer if I can get to the server faster… carrying around these… Read more: Cloud Service And Deployment Models
- Why Use Serverless Computing“Serverless Computing is a Cloud computing execution model that lets software developers build and run applications and servers without having… Read more: Why Use Serverless Computing
- Spatial Computing Revolutionizing Our World“Today, new technologies are advancing at dizzying speeds –impacting all areas of our lives, including how we shop and pay… Read more: Spatial Computing Revolutionizing Our World
- Trending Fullstack Frameworks“Writing the first 90 percent of a computer program takes 90 percent of the time. The remaining ten percent also… Read more: Trending Fullstack Frameworks
- Threat Intelligence Explained“Threat intelligence is evidence-based knowledge about an existing or emerging menace or hazard to assets that can be used to… Read more: Threat Intelligence Explained
- Docker’s Role In Microservices“Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate your applications from your… Read more: Docker’s Role In Microservices
- Why Is Kafka The First Choice For Microservices?“Kafka is an event streaming platform used for reading and writing data that makes it easy to connect Microservices.’ When… Read more: Why Is Kafka The First Choice For Microservices?
- Pros And Cons Of Microservices Architecture“Microservices Architecture has become increasingly popular in recent years. It offers a number of advantages over traditional monolithic architectures, but… Read more: Pros And Cons Of Microservices Architecture