Tag

Compliance

0 views collected around this technical thread.

Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 8, 2025 · Information Security

Why SBOMs Are the Key to Secure Software Supply Chains

This article explains how Software Bill of Materials (SBOM) mirrors hardware BOMs, outlines their core differences, presents best practices, tools, and implementation strategies to improve supply‑chain transparency, compliance, and security for modern software development.

Best PracticesComplianceSBOM
0 likes · 12 min read
Why SBOMs Are the Key to Secure Software Supply Chains
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 7, 2025 · Information Security

Unlocking Software Supply Chain Security with SBOM

This article explains how Software Bill of Materials (SBOM) serves as a digital map for component dependency and change management, detailing its functions in visualizing dependencies, detecting version conflicts, ensuring license compliance, and providing supply‑chain risk alerts, ultimately improving development efficiency, security, and regulatory compliance.

ComplianceSBOMSecurity
0 likes · 11 min read
Unlocking Software Supply Chain Security with SBOM
Old Zhao – Management Systems Only
Old Zhao – Management Systems Only
Apr 23, 2025 · Operations

Why Robust EHS Management Is Critical: 8 Essential Modules for Safe Operations

A solid EHS (Environment, Health, Safety) program prevents costly shutdowns, fines, and accidents by defining clear responsibilities, standardizing processes, and leveraging data across eight key modules—from hazard management to performance tracking—ensuring continuous compliance and operational stability.

ComplianceEHSOperations
0 likes · 8 min read
Why Robust EHS Management Is Critical: 8 Essential Modules for Safe Operations
DataFunSummit
DataFunSummit
Mar 24, 2025 · Artificial Intelligence

Large Language Models in Financial Risk Management: Applications, Challenges, and Future Outlook

This article examines how large language models are transforming financial risk management by mapping various risk categories to LLM capabilities, showcasing practical use cases across market, credit, reputation, operational, and anti‑fraud domains, while also discussing technical challenges, data‑space concepts, and future prospects.

Artificial IntelligenceComplianceData Space
0 likes · 18 min read
Large Language Models in Financial Risk Management: Applications, Challenges, and Future Outlook
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 6, 2025 · Databases

SQLE 4.2502.0 Release: New Features, Upgrade Guide, and Version Log

SQLE 4.2502.0 has been officially released, introducing SQL compliance rewriting, a performance tracker, a syntax rule knowledge graph, new community and enterprise features, detailed upgrade instructions, and comprehensive version logs highlighting enhancements, bug fixes, and support for multiple database platforms.

ComplianceDatabase GovernancePerformance Tracking
0 likes · 12 min read
SQLE 4.2502.0 Release: New Features, Upgrade Guide, and Version Log
Top Architecture Tech Stack
Top Architecture Tech Stack
Oct 21, 2024 · Information Security

Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning

Meta was fined €91 million by Ireland’s Data Protection Commission for storing user passwords in plain text, violating multiple GDPR provisions and highlighting the critical need for proper encryption and data‑security measures in large‑scale online services.

ComplianceData EncryptionGDPR
0 likes · 4 min read
Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning
Java Tech Enthusiast
Java Tech Enthusiast
Oct 9, 2024 · Backend Development

Understanding Logical Deletion and Data Compliance in Backend Services

The article explains how many backend services use logical deletion—simply flagging or masking user data instead of physically removing it—to appear compliant with standards like China's GB/T 35273, while highlighting risks such as continued e‑bike control, fraud detection challenges, and missed logout handling.

ComplianceGB/T 35273Logical Deletion
0 likes · 3 min read
Understanding Logical Deletion and Data Compliance in Backend Services
Zhuanzhuan Tech
Zhuanzhuan Tech
Aug 28, 2024 · Big Data

Quality Inspection Data Collection: Design, Architecture, and Applications

This article outlines the design, architecture, and practical applications of a quality inspection data collection system, covering data point structures, reporting mechanisms, compliance analysis, intelligent strategy iteration, and BI dashboards, illustrating how big‑data techniques enable digital transformation of inspection processes.

BIBig DataCompliance
0 likes · 10 min read
Quality Inspection Data Collection: Design, Architecture, and Applications
DataFunSummit
DataFunSummit
Jul 21, 2024 · Information Security

Ping An's Data Security Compliance Management Practices and Large‑Model Applications

This article presents Ping An's comprehensive approach to data security compliance, detailing its evolving data management framework, the integration of large‑model AI for classification, risk monitoring, and assessment, and practical insights from a Q&A session on governance and operational challenges.

AIComplianceData Governance
0 likes · 14 min read
Ping An's Data Security Compliance Management Practices and Large‑Model Applications
Python Programming Learning Circle
Python Programming Learning Circle
Jul 1, 2024 · Fundamentals

Python 3.12 App Store Rejection Caused by an itms‑services String and CPython’s Planned Fix

Upgrading Python from 3.11 to 3.12 introduced an "itms‑services" string in the standard library, causing macOS App Store rejections, which led developers and CPython core contributors to discuss the issue, propose patches, and plan a compliance option for future Python releases.

App StoreCPythonCompliance
0 likes · 11 min read
Python 3.12 App Store Rejection Caused by an itms‑services String and CPython’s Planned Fix
Architecture Digest
Architecture Digest
Jun 14, 2024 · Information Security

Oracle Expands Java License Audits to Fortune 200 Companies and What It Means for Developers

Oracle has begun sending Java license audit letters to Fortune 200 firms, shifting from its previous focus on small companies, while its new per‑employee pricing model and aggressive compliance checks spark criticism and push many developers toward alternative OpenJDK distributions.

ComplianceJavaOpenJDK
0 likes · 9 min read
Oracle Expands Java License Audits to Fortune 200 Companies and What It Means for Developers
Architecture and Beyond
Architecture and Beyond
Jun 1, 2024 · Operations

Comprehensive Guide to Data Backup and Disaster Recovery Strategies

This article examines real-world backup failures, explains why backups are essential, outlines what data and system components should be backed up, describes backup principles, classifications, technologies, and disaster recovery planning, and offers practical guidance for building robust, multi-layered backup strategies.

ComplianceIT Operationsbackup
0 likes · 13 min read
Comprehensive Guide to Data Backup and Disaster Recovery Strategies
DataFunSummit
DataFunSummit
May 31, 2024 · Information Security

Enterprise Practices for Precise Data Rights, Dynamic Compliance, and Data Asset Management

This article shares a company's practical experience in establishing precise data rights, dynamic compliance mechanisms, cost quantification, transaction circulation, and risk monitoring to enable data assetization and secure, large‑scale data flow within an enterprise.

ComplianceCost ManagementData Governance
0 likes · 14 min read
Enterprise Practices for Precise Data Rights, Dynamic Compliance, and Data Asset Management
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureComplianceEncryption
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
vivo Internet Technology
vivo Internet Technology
Apr 10, 2024 · R&D Management

Vivo's Participation in the 2nd OSPO Summit 2024

At the 2nd OSPO Summit 2024 in Shenzhen, Vivo acted as a platinum sponsor and organizing‑committee member, leading the “Qi” thematic session, co‑creating an open‑source tools list, and pledging to boost its OSPO governance, supply‑chain security, and leadership in the broader open‑source ecosystem.

ComplianceGovernanceOSPO
0 likes · 5 min read
Vivo's Participation in the 2nd OSPO Summit 2024
vivo Internet Technology
vivo Internet Technology
Feb 26, 2024 · R&D Management

OSPO Maturity Model: Five‑Stage Framework and Checklist

The article introduces a five‑stage OSPO maturity model—ranging from ad‑hoc open‑source use to a strategic technology advisor—detailing essential patterns, recommended community resources, and a practical checklist to help organizations build compliance, advocacy, project‑launch, and governance capabilities for open‑source programs.

ComplianceMaturity ModelOSPO
0 likes · 16 min read
OSPO Maturity Model: Five‑Stage Framework and Checklist
DataFunSummit
DataFunSummit
Feb 3, 2024 · Artificial Intelligence

Practical Application of Large Language Models in MaShang Consumer Finance: From Model Building to Deployment

This article details how MaShang Consumer Finance leverages large language models for sales, collection, and customer service, covering company background, AI research achievements, model training infrastructure, data‑quality and compliance challenges, prompt engineering, inference acceleration, evaluation methods, and lessons learned from real‑world deployment.

ComplianceFinanceLLM
0 likes · 21 min read
Practical Application of Large Language Models in MaShang Consumer Finance: From Model Building to Deployment
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 2, 2024 · Information Security

iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT

iQIYI's proactive compliance risk disposal platform and full‑lifecycle privacy protection scheme were recognized by MIIT as outstanding cases, showcasing engineering‑driven privacy integration across product development, release, and operation, improving compliance rates, reducing risks, and enhancing user experience while setting industry standards.

ComplianceMobile Internetdata security
0 likes · 8 min read
iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT
DevOps
DevOps
Jan 14, 2024 · Artificial Intelligence

How AI Can Enhance DevOps: Reducing Friction and Boosting Efficiency

The article explains how integrating artificial intelligence into DevOps can automate repetitive tasks, improve feedback loops, enhance monitoring and security, and ultimately reduce operational friction while accelerating software delivery and ensuring compliance.

AIAutomationCompliance
0 likes · 9 min read
How AI Can Enhance DevOps: Reducing Friction and Boosting Efficiency
AntTech
AntTech
Nov 6, 2023 · Information Security

Enterprise Security Compliance Intelligent Certification Wins 2023 China Qualified Assessment Science and Technology Award (Second Prize)

On October 31, the joint Ant Group and China Software Testing Center project "Enterprise Security Compliance Intelligent Certification Key Technologies Research and Application" received the 2023 China Qualified Assessment Science and Technology Award second prize, marking the first time a technology enterprise has earned this top honor in the qualified assessment field and highlighting its breakthroughs in data and network security, automated risk assessment, and large‑scale certification deployment across major financial and tech institutions.

AwardCertificationCompliance
0 likes · 4 min read
Enterprise Security Compliance Intelligent Certification Wins 2023 China Qualified Assessment Science and Technology Award (Second Prize)