Tagged articles
19 articles
Page 1 of 1
Data Party THU
Data Party THU
Apr 29, 2026 · Artificial Intelligence

Claude Opus 4.7 System Prompt Leak: Decoding Its 10 Core Design Decisions

The article dissects the leaked Claude Opus 4.7 system prompt, revealing ten intertwined design decisions—from treating psychological reconstruction as a danger signal to dynamic safety‑policy upgrades—that together shape the model’s self‑restraint, tool‑use, memory handling, and risk‑aware behavior.

AI SafetyClaudeLanguage Model
0 likes · 8 min read
Claude Opus 4.7 System Prompt Leak: Decoding Its 10 Core Design Decisions
58UXD
58UXD
Aug 12, 2025 · Product Management

Boosting Elderly User Experience: AI‑Powered Resume Design Lessons

This article examines how empathetic user research and AI‑driven features transformed a resume‑building tool for older domestic‑service workers, detailing behavior analysis, process simplification, multimodal interaction, and trust‑building AI assistants that dramatically increased completion rates and platform value.

UX designUser Researchai
0 likes · 6 min read
Boosting Elderly User Experience: AI‑Powered Resume Design Lessons
Su San Talks Tech
Su San Talks Tech
Jun 12, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules

This article explains why a million‑QPS flood can cripple systems, outlines attackers' tactics, and presents a three‑layer defense strategy—including gateway rate limiting with Nginx + Lua, distributed circuit breaking via Sentinel, device fingerprinting, behavior analysis, and a dynamic rule engine—to protect high‑traffic services.

DDoSbehavior analysishigh QPS
0 likes · 14 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules
php Courses
php Courses
Jan 15, 2025 · Backend Development

Challenges of PHP Applications and the Role of User Behavior Analysis

This article examines the current challenges faced by PHP applications—including performance, functionality, and competition—highlights the importance of user behavior analysis for uncovering needs and optimizing experience, and presents practical logging and analysis techniques with PHP code examples to improve performance and enable precise marketing.

PHPWeb Developmentbehavior analysis
0 likes · 13 min read
Challenges of PHP Applications and the Role of User Behavior Analysis
DataFunSummit
DataFunSummit
Jul 9, 2023 · Big Data

Data Governance and Application for Behavior Analysis: Modeling Methods, Architecture, and Practical Cases

This article explains how a data‑ecosystem team governs and applies behavior‑analysis data by describing common analysis scenarios, data‑warehouse modeling methods and their pros and cons, the concepts and overall architecture of behavior‑centric analytics, key system components, and several concrete analysis examples such as retention, funnel and path analysis.

Big DataColumnar StorageUser Segmentation
0 likes · 12 min read
Data Governance and Application for Behavior Analysis: Modeling Methods, Architecture, and Practical Cases
JD.com Experience Design Center
JD.com Experience Design Center
Apr 22, 2022 · Product Management

Unlocking the Power of User Insight: How to Drive Product Success

This article explores the concept of user insight, contrasting it with user experience, and presents a multi‑dimensional framework—including relative, dynamic, vector, and layered perspectives—to help product teams generate actionable, high‑value insights throughout the product lifecycle.

User Researchbehavior analysiscustomer profiling
0 likes · 14 min read
Unlocking the Power of User Insight: How to Drive Product Success
58UXD
58UXD
Apr 13, 2022 · Operations

Boosting User Retention with Gamified Recruitment: Spring Travel Game Case

This article examines how traditional lottery promotions lose appeal and how applying the Octagonal Behavior Analysis framework, dice‑game mechanics, and targeted blue‑collar user scenarios created a fresh, engaging Spring Travel game that dramatically increased participation, conversion, and retention for a recruitment platform.

User Retentionbehavior analysisgamification
0 likes · 6 min read
Boosting User Retention with Gamified Recruitment: Spring Travel Game Case
DataFunSummit
DataFunSummit
Dec 23, 2021 · Artificial Intelligence

User Clustering Techniques in Tencent KanDian: From Traditional Algorithms to N‑gram and action2vec

This article explains how Tencent KanDian analyzes user behavior by introducing the product, describing common clustering scenarios, reviewing traditional unsupervised methods, and detailing advanced path‑based approaches such as N‑gram and action2vec, while discussing their advantages, limitations, and practical applications.

N-gramTencentaction2vec
0 likes · 12 min read
User Clustering Techniques in Tencent KanDian: From Traditional Algorithms to N‑gram and action2vec
DataFunTalk
DataFunTalk
Nov 8, 2021 · Artificial Intelligence

User Behavior Clustering in Tencent Kankan: From Traditional Unsupervised Methods to N‑gram and action2vec

This article introduces Tencent Kankan's product landscape and explores various user clustering techniques—including classic unsupervised algorithms, N‑gram based sequence clustering, and deep‑learning driven action2vec—detailing their implementation steps, advantages, limitations, and practical insights for product optimization.

N-gramTencentaction2vec
0 likes · 12 min read
User Behavior Clustering in Tencent Kankan: From Traditional Unsupervised Methods to N‑gram and action2vec
Baidu MEUX
Baidu MEUX
Jul 12, 2021 · Product Management

How Eye‑Tracking Reveals Hidden User Behaviors in Short‑Video Apps

This article reports an eye‑tracking study conducted on a short‑video app to uncover users' visual strategies, evaluate the impact of title and recommendation layout variations, and identify subtle usability issues that traditional methods miss, providing data‑driven guidance for product design decisions.

UI designUser Researchbehavior analysis
0 likes · 13 min read
How Eye‑Tracking Reveals Hidden User Behaviors in Short‑Video Apps
Baidu MEUX
Baidu MEUX
May 13, 2021 · Product Management

What Do Silver‑Hair Users Really Want? 9 Key Insights on Elderly Mobile App Behavior

This article explores the characteristics, lifestyle, consumption habits, aesthetic preferences, and app usage patterns of Chinese senior smartphone users (aged 45 and above), revealing how aging impacts their interaction with mobile devices and offering actionable insights for designing age‑friendly products.

User Researchbehavior analysiselderly users
0 likes · 14 min read
What Do Silver‑Hair Users Really Want? 9 Key Insights on Elderly Mobile App Behavior
58UXD
58UXD
Apr 28, 2021 · Product Management

Turning Holiday Traffic into High‑Value Users: 58 Rental’s Layered Operation Strategy

This article examines how 58 Rental leverages diverse traffic sources during its Spring Festival campaign by segmenting users, aligning responsibilities with rewards, and designing clear, incentive‑driven scenarios—including games, VR experiences, and live streams—to maximize conversion and efficiently allocate limited resources.

User Segmentationbehavior analysisoperation strategy
0 likes · 10 min read
Turning Holiday Traffic into High‑Value Users: 58 Rental’s Layered Operation Strategy
Baidu MEUX
Baidu MEUX
Dec 9, 2020 · Product Management

How Baidu Revamped Its Emoji Panel: Design Insights & Data‑Driven Results

This article details Baidu App's emoji panel redesign, covering background, design goals, problem analysis of the original horizontal swipe, the research‑driven design process, evaluation methods, quantitative results, user behavior analysis, and key takeaways for future product improvements.

Product RedesignUser experiencebehavior analysis
0 likes · 10 min read
How Baidu Revamped Its Emoji Panel: Design Insights & Data‑Driven Results
58 Tech
58 Tech
Aug 29, 2019 · Information Security

Graph-Based Anomaly Detection Framework for Security Threats

The article presents a graph‑based anomaly detection architecture that tackles black‑market resource switching by constructing complex user‑traffic networks, mining graph similarities, and applying multi‑dimensional strategies to achieve high‑accuracy detection while meeting timeliness, performance, and interpretability requirements.

Big Dataanomaly detectionbehavior analysis
0 likes · 8 min read
Graph-Based Anomaly Detection Framework for Security Threats
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityContainer SecurityThreat Detection
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
Architects' Tech Alliance
Architects' Tech Alliance
Nov 28, 2016 · Big Data

User Profiling: Concepts, Stages, and Data Modeling Methods

This article explains the concept of user profiling, outlines its four-stage construction process, discusses the significance of tagging users, and details practical data modeling techniques—including static and dynamic data sources, weight calculations, and real‑world examples—aimed at improving precision marketing and recommendation systems.

Big DataTaggingbehavior analysis
0 likes · 44 min read
User Profiling: Concepts, Stages, and Data Modeling Methods