Prologue: From "Static Skeleton" to "Intelligent Life"
0.1 Standing on the Shoulders of Giants: What You've Accomplished
Congratulations on completing your journey through the "Quick Start" guide! Let's recap your achievements over the past few hours:
If building an enterprise application is like constructing an "intelligent building", you've successfully completed the following critical "static engineering":
- Laid a solid foundation (application creation): You created the [Employee Information Management System] application and configured its overall style and navigation layout.
- Built the core structure (data modeling): You defined the [Department Table] and [Employee Table], which are like the load-bearing walls and floors inside the building, stably storing the enterprise's most core information.
- Connected the blood vessels (associations): Using the "related records" field, you successfully established an "information highway" between the [Employee Table] and [Department Table]. Now data is no longer isolated text but interconnected, traceable structured data.
- Designed the exhibition halls (view configuration): You understood the separation mechanism between "data storage" and "view presentation", and learned how to present raw data in clear, elegant tables to users through table settings and filtering conditions.
In short, you now have a beautifully designed, structurally sound, and well-organized "data archive".
0.2 Embracing the Challenge: Problems Static Data Can't Solve
Currently, our application has a solid "foundation" (data model including [Department Table] and [Employee Table]) and functional "rooms" (configured table views). It can store and display core information well, but it's still "static".
- When an employee applies for leave in the system, no follow-up actions are automatically triggered.
- When a manager wants to quickly understand the company's personnel structure, they need to interpret and calculate from the raw tables themselves.
- When employees of different positions access it, the application displays all information to everyone without reservation, lacking security boundaries.
Simply put, it's currently just an excellent data "container", not an intelligent business "partner" that can actively respond to and drive business processes.
0.3 Deep Learning: Three Pillars to Inject "Soul" into Your Application
In this "Deep Learning" tutorial, our core task is to inject true "vitality" and "soul" into this already built "building". We'll focus on three exciting advanced topics in the Informat platform, taking your application from "static" to "dynamic":
Shield of Security (Permissions): We'll establish a "security system" for the application. Through fine-grained role and permission control, we'll ensure that "the right people" can only see and operate "the right data" at "the right time", protecting the security of enterprise information assets.
Eyes of Wisdom (Dashboards): We'll learn to create visual homepages for applications. Through various chart components and core indicators, we'll make cold data "speak", helping managers quickly gain business insights and achieve data-driven decision-making.
Pulse of Automation (Approval Flow): We'll equip the application with a powerful "engine". By designing workflow that follows the standard BPMN 2.0 specification, we'll let data automatically flow, approve, and notify according to set rules, freeing human resources from repetitive procedural work.
0.4 How to Read This "Deep Learning" Document?
"Learning by doing" remains our core principle.
We've carefully designed the reading path for this tutorial:
- Practice first, concepts follow: We'll transform complex theoretical explanations (such as BPMN 2.0 specifications, mathematical principles of aggregate queries) into vivid metaphors as much as possible, and directly demonstrate their effects in practical operations.
- No interruptions, dig deeper later: If you encounter important concepts or advanced configurations during operation (such as "expressions", BPMN, etc.), we'll provide a jump link for you. During your first reading, maintain the coherence of operation and don't let theoretical explanations interrupt your reading flow. After you've completed the application building and have an intuitive understanding of the functions, go back and click the links for deeper reading and learning.
We promise that with just a few hours of practical operation, you'll be able to:
Configure enterprise-level data security defense lines and master the art of permission control.
Create a professional data visualization dashboard to achieve data insights.
Build a complete approval flow by yourself to truly make data "move".

