Tagged articles
16 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 28, 2026 · Industry Insights

Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data

In September 2024, a Beijing algorithm engineer illegally accessed his company's server cluster, executed a notorious delete command that erased over 89 TB of AI training data and 3D model assets, causing system paralysis and more than 200,000 yuan in losses, and was sentenced to five years and ten months in prison for destroying a computer information system.

AIcomputer crimedata deletion
0 likes · 4 min read
Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data
Su San Talks Tech
Su San Talks Tech
Oct 29, 2025 · Databases

How to Safely Delete Millions of Rows from a Large Table: Proven Strategies & Code

This article explains why deleting tens of millions of rows is challenging, analyzes transaction, lock, resource, and business impacts, and presents five practical solutions—including batch deletion, table rebuild, partition dropping, online migration, and professional tools—along with best‑practice guidelines and a decision matrix.

Batch ProcessingDatabase OptimizationPartitioning
0 likes · 28 min read
How to Safely Delete Millions of Rows from a Large Table: Proven Strategies & Code
ITPUB
ITPUB
Oct 11, 2024 · Databases

How to Efficiently Delete Massive MySQL Logs While Preserving Critical Types

This article explains how to clean up a rapidly growing MySQL log table by batching deletions, handling unindexed type columns, and using a start‑id based pagination strategy that scales from tens of millions to billions of rows without locking the database.

Large TablesSQL Optimizationdata deletion
0 likes · 8 min read
How to Efficiently Delete Massive MySQL Logs While Preserving Critical Types
Java Tech Enthusiast
Java Tech Enthusiast
Oct 9, 2024 · Backend Development

Understanding Logical Deletion and Data Compliance in Backend Services

The article explains how many backend services use logical deletion—simply flagging or masking user data instead of physically removing it—to appear compliant with standards like China's GB/T 35273, while highlighting risks such as continued e‑bike control, fraud detection challenges, and missed logout handling.

GB/T 35273Logical Deletioncompliance
0 likes · 3 min read
Understanding Logical Deletion and Data Compliance in Backend Services
Laravel Tech Community
Laravel Tech Community
Aug 3, 2023 · Databases

MySQL Data Deletion Methods: DELETE, TRUNCATE, and DROP

This article explains the three primary ways to delete data in MySQL—using DELETE, TRUNCATE, and DROP—detailing their execution speed, underlying mechanisms, storage‑engine differences, and best‑practice considerations such as space reclamation and auto‑increment handling.

DELETEDROPTRUNCATE
0 likes · 5 min read
MySQL Data Deletion Methods: DELETE, TRUNCATE, and DROP
DataFunSummit
DataFunSummit
Jan 5, 2023 · Information Security

ByteDance Big Data Platform Security and Permission Governance Practices

This article outlines ByteDance's comprehensive big‑data security framework, detailing current challenges, fine‑grained permission control, asset protection, data deletion capabilities, and the governance principles that balance compliance with operational efficiency.

access controldata deletiondata security
0 likes · 13 min read
ByteDance Big Data Platform Security and Permission Governance Practices
21CTO
21CTO
May 18, 2022 · Information Security

Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence

A former Lianjia database administrator was sentenced to seven years for deleting critical financial data, revealing how insider misuse of root privileges, inadequate security response, and ignored vulnerability reports can cripple a multi‑billion‑dollar enterprise, while similar incidents underscore the broader risks of insider threats.

Database Securitydata deletioninformation security
0 likes · 8 min read
Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence
ITPUB
ITPUB
May 29, 2021 · Information Security

When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case

The article recounts a high‑profile Chinese case where a former developer, after a salary dispute, exploited server vulnerabilities to delete critical user data and application files, leading to massive user impact, a court trial, and an eleven‑month prison sentence under computer‑information‑system sabotage laws.

computer crimedata breachdata deletion
0 likes · 6 min read
When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case
Programmer DD
Programmer DD
Jan 8, 2021 · Information Security

When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years

A former database administrator at Lianjia was convicted of deliberately deleting 9 TB of financial data, leading to a seven‑year prison sentence after forensic evidence linked his root‑access actions to the breach, highlighting the severe legal consequences of insider data sabotage.

computer crimedata deletiondatabase admin
0 likes · 7 min read
When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 29, 2020 · Databases

How Deleting Servers and Databases Happens and How to Prevent Accidental Deletion

The article explains various ways programmers and DBAs can permanently delete server files, databases, tables, or data using Linux rm commands and SQL statements like DROP, TRUNCATE, and DELETE, illustrates the risks of accidental or malicious deletions, and offers practical tips for prevention such as careful command review, strict permission control, and regular backups.

BackupLinux rmSQL DROP
0 likes · 5 min read
How Deleting Servers and Databases Happens and How to Prevent Accidental Deletion
Selected Java Interview Questions
Selected Java Interview Questions
Oct 18, 2020 · Databases

MySQL Data Deletion Methods: DELETE, TRUNCATE, and DROP

This article explains the three primary ways to remove data in MySQL—DELETE, TRUNCATE, and DROP—comparing their execution speed, underlying mechanisms, impact on disk space, transaction behavior, and how to reclaim space with OPTIMIZE, while providing practical SQL examples and usage warnings.

DELETEDROPTRUNCATE
0 likes · 6 min read
MySQL Data Deletion Methods: DELETE, TRUNCATE, and DROP
Efficient Ops
Efficient Ops
Jan 8, 2019 · Databases

How We Cut Data Deletion Time from Hours to Minutes in a High‑Volume OLTP System

Through a step‑by‑step case study of a high‑traffic OLTP system, this article explains how evolving deletion logic—from simple full‑table scans to indexed intermediate tables and parallel processing—reduced daily expired‑data cleanup from several hours to under an hour, while addressing ORA‑01555 and clustering‑factor issues.

OLTPOracleSQL Optimization
0 likes · 11 min read
How We Cut Data Deletion Time from Hours to Minutes in a High‑Volume OLTP System