AntTech
Author

AntTech

Technology is the core driver of Ant's future creation.

703
Articles
0
Likes
1.9k
Views
0
Comments
Recent Articles

Latest from AntTech

100 recent articles max
AntTech
AntTech
Nov 11, 2025 · Artificial Intelligence

Breaking the Efficiency Wall: Ant Group’s Bailing Model Paves the Way to AGI

At CNCC 2025, Ant Group’s Vice President Zhou Jun outlined the Bailing large‑model’s five‑layer architecture, hybrid linear attention, Ling Scaling Law, and novel training algorithms that dramatically cut costs and latency, achieving state‑of‑the‑art performance on math and code benchmarks while promoting open‑source collaboration toward AGI.

AGIMixture of Expertslarge language models
0 likes · 8 min read
Breaking the Efficiency Wall: Ant Group’s Bailing Model Paves the Way to AGI
AntTech
AntTech
Nov 8, 2025 · Artificial Intelligence

Ant Group’s AntBaiLing Model: Pushing AI Scaling Limits with Trillion‑Parameter Efficiency

Ant Group’s President Luo Ji outlined how the AntBaiLing suite, featuring trillion‑parameter open‑source models, three efficiency breakthroughs, and a domestic compute cluster, is advancing AGI research and inclusive applications, especially in healthcare, while emphasizing ethical, trustworthy AI.

AGIModel Efficiencylarge language models
0 likes · 5 min read
Ant Group’s AntBaiLing Model: Pushing AI Scaling Limits with Trillion‑Parameter Efficiency
AntTech
AntTech
Nov 4, 2025 · Artificial Intelligence

Unlock Native TPU Inference with SGLang-Jax: A Jax‑Powered Open‑Source Engine

SGLang-Jax is a cutting‑edge, fully Jax‑based open‑source inference engine that delivers native TPU performance, integrates advanced features like continuous batching, tensor and expert parallelism, and speculative decoding, while providing detailed installation and usage guidance for developers.

JAXSGLang-JaxTPU inference
0 likes · 10 min read
Unlock Native TPU Inference with SGLang-Jax: A Jax‑Powered Open‑Source Engine
AntTech
AntTech
Nov 3, 2025 · Information Security

What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?

The IEEE 3169‑2025 standard, led by Ant Group, introduces a unified five‑level security grading framework for privacy‑preserving computation across technologies like MPC, federated learning and TEEs, detailing attack‑defense effectiveness, information leakage categories, and additional metrics to guide secure data‑flow implementations.

IEEE 3169Information Securitydata security
0 likes · 6 min read
What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?
AntTech
AntTech
Oct 29, 2025 · Artificial Intelligence

Inside Ant’s Baoling: Balancing Efficiency and Reasoning in a 1‑Trillion‑Parameter Model

At the Ant Star Innovation Journey event, the Baoling team unveiled their roadmap for trillion‑parameter models, detailing the development of Ling‑1T, Ring‑1T and multimodal Ming series, the scaling‑law‑guided architecture, training innovations, evaluation methods, and open‑source releases that aim to advance efficient, high‑performance AI.

Efficient InferenceLarge Language ModelScaling Law
0 likes · 24 min read
Inside Ant’s Baoling: Balancing Efficiency and Reasoning in a 1‑Trillion‑Parameter Model
AntTech
AntTech
Oct 28, 2025 · Artificial Intelligence

Ming-Flash-Omni-Preview: 103B Open-Source Multimodal Model Excelling in Image, Video, and Speech

Introducing Ming‑Flash‑Omni‑Preview, a 103‑billion‑parameter open‑source multimodal model built on a sparse MoE architecture that delivers state‑of‑the‑art performance in controllable image generation, streaming video understanding, and context‑aware speech recognition, surpassing prior models on GenEval and GEdit benchmarks.

Image GenerationLarge Language ModelSpeech Recognition
0 likes · 8 min read
Ming-Flash-Omni-Preview: 103B Open-Source Multimodal Model Excelling in Image, Video, and Speech
AntTech
AntTech
Oct 26, 2025 · Databases

How LCL+ Boosts Distributed Database Performance with One‑Victim Deadlock Resolution

The OceanBase team’s LCL+ algorithm, a lock‑chain‑length based distributed deadlock detection and elimination method, eliminates the need for a global wait‑for graph, achieves single‑victim unlocks, and dramatically improves throughput while reducing tail latency in production database clusters.

Deadlock DetectionOceanBasedatabase algorithms
0 likes · 7 min read
How LCL+ Boosts Distributed Database Performance with One‑Victim Deadlock Resolution
AntTech
AntTech
Oct 21, 2025 · Mobile Development

Why Does Hybrid Composition Crash with ‘No Surface’ Errors on Android Mini‑Programs?

This article analyzes a recurring crash in Android mini‑programs caused by a canvas synchronization issue in hybrid composition, detailing the stack traces, EGL surface creation failures, cross‑process SurfaceTexture lifecycle problems, and the concrete fix that dramatically reduced “no surface” crashes.

Android RenderingEGLHybrid Composition
0 likes · 20 min read
Why Does Hybrid Composition Crash with ‘No Surface’ Errors on Android Mini‑Programs?
AntTech
AntTech
Oct 20, 2025 · Artificial Intelligence

How a Constraint-Aware Multi-Agent System Won the IJCAI Travel Planning Challenge

Leveraging a proprietary “large model + optimization” approach, Alibaba’s Ant Group and East China Normal University built a constraint-aware multi-agent framework that secured first place in the Original OS track and second in the DSL track of the IJCAI-2025 Autonomous Travel Planning Competition.

AI OptimizationIJCAITravel Planning
0 likes · 7 min read
How a Constraint-Aware Multi-Agent System Won the IJCAI Travel Planning Challenge
AntTech
AntTech
Oct 16, 2025 · Information Security

How Alipay’s Trusted Deep Defense System Secures Financial Transactions

Alipay’s trusted deep defense architecture, built on security parallel slices and trusted computing, was selected as a flagship case for the 2025 Important Industry Security Protection list, demonstrating zero‑false‑positive, zero‑miss, and zero‑business‑disruption protection against advanced threats such as 0‑day and APT attacks during high‑traffic events like Double 11.

CybersecurityDeep DefenseInformation Security
0 likes · 5 min read
How Alipay’s Trusted Deep Defense System Secures Financial Transactions