Tagged articles
59 articles
Page 1 of 1
Black & White Path
Black & White Path
May 14, 2026 · Information Security

The Dark Side and Hidden Risks of AI Relay Stations

AI relay stations bypass mainland China restrictions by repackaging foreign model APIs, but their three-layer proxy design introduces model substitution, billing manipulation, privacy leakage, and malicious code injection, creating a fragile supply chain that endangers developers, enterprises, and end‑users alike.

AI relay stationsSecuritySupply Chain
0 likes · 9 min read
The Dark Side and Hidden Risks of AI Relay Stations
AI Explorer
AI Explorer
Apr 26, 2026 · Artificial Intelligence

Take Control of AI: Choose Any Model and Keep Your Data Private

Thunderbolt, an open‑source AI client from Mozilla’s Thunderbird team, lets developers pick any OpenAI‑compatible model, run it on‑premises via Docker or Kubernetes, and keep all conversation data on their own servers, eliminating vendor lock‑in and enhancing privacy.

AI clientDockerKubernetes
0 likes · 6 min read
Take Control of AI: Choose Any Model and Keep Your Data Private
Smart Workplace Lab
Smart Workplace Lab
Apr 1, 2026 · Artificial Intelligence

Build a Zero‑Leak Local AI Workstation for Non‑Tech Professionals

This guide explains how to set up a privacy‑preserving local AI workstation by selecting modest hardware, using open‑source inference frameworks, deploying models with a one‑click graphical interface, and isolating sensitive data through offline routing, all without requiring programming skills.

DeepSeekGGUFLocal AI
0 likes · 3 min read
Build a Zero‑Leak Local AI Workstation for Non‑Tech Professionals
21CTO
21CTO
Mar 26, 2026 · Industry Insights

GitHub Will Harvest Your Copilot Data to Train AI – What Developers Need to Know

Starting April 24, GitHub will collect user interaction data—including code inputs, outputs, snippets, context, comments, repository structure, and feedback—to train its AI models, affecting Copilot Free, Pro, and Pro+ users while offering an opt‑out option via settings, and mirroring similar policies at Anthropic, JetBrains, and Microsoft.

AI trainingCopilotGitHub
0 likes · 4 min read
GitHub Will Harvest Your Copilot Data to Train AI – What Developers Need to Know
Black & White Path
Black & White Path
Feb 13, 2026 · Industry Insights

India’s Supreme Court Bars WhatsApp Data Sharing; Guangdong Police Bust High‑Altitude Drone Violation

The Indian Supreme Court ruled that WhatsApp cannot compromise user privacy through data‑sharing mandates, highlighting broader data‑governance trends, while Chinese authorities in Guangdong arrested a drone operator who flew an illegally modified UAV to 8,000 m, endangering civil aviation and exposing cyber‑crime links.

Drone RegulationIllegal Drone FlightIndia Supreme Court
0 likes · 6 min read
India’s Supreme Court Bars WhatsApp Data Sharing; Guangdong Police Bust High‑Altitude Drone Violation
AI Tech Publishing
AI Tech Publishing
Nov 10, 2025 · Artificial Intelligence

The Real Barriers to Deploying AI Agents: Workflow, Trust, and Data Privacy

A survey of over 30 AI‑agent founders and 40 enterprise users reveals that the biggest obstacles to AI‑agent adoption are workflow integration and human interaction (60%), employee resistance (50%) and data‑privacy concerns (50%), while successful deployments rely on modest, well‑positioned use‑cases, hands‑on support, and clear pricing models.

AI agentsEmployee TrustGo‑to‑Market Strategy
0 likes · 10 min read
The Real Barriers to Deploying AI Agents: Workflow, Trust, and Data Privacy
Alimama Tech
Alimama Tech
Aug 20, 2025 · Information Security

How Private Information Retrieval Secures Data Queries in Modern Applications

Private Information Retrieval (PIR) is a core privacy-preserving technique that enables users to query databases without revealing their query content or access patterns, and its evolution—from early theoretical models to efficient, real‑world deployments across blockchain, cloud, and advertising—makes it essential for secure data collaboration.

Private Information Retrievaldata privacysecure multi-party computation
0 likes · 18 min read
How Private Information Retrieval Secures Data Queries in Modern Applications
Huolala Tech
Huolala Tech
Jan 23, 2025 · Artificial Intelligence

How AI Transforms Freight Safety: Real-Time Risk Detection and Intervention

This article explains how AI technologies are applied to freight safety, detailing the challenges of traditional controls, the architecture of a real‑time AI safety system, data processing, risk detection, tiered interventions, and the resulting improvements in accuracy and operational efficiency.

AIComputer VisionLogistics
0 likes · 7 min read
How AI Transforms Freight Safety: Real-Time Risk Detection and Intervention
AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

AsterinasTEEcloud security
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
OPPO Amber Lab
OPPO Amber Lab
Oct 21, 2024 · Information Security

How OPPO’s AI Private Computing Cloud Secures Your Data End‑to‑End

OPPO’s AI Private Computing Cloud leverages hardware‑based TEE, end‑to‑end encryption, and trusted sandbox technologies to protect user data across both cloud and device, while its terminal AI confidential computing system and new Security & Privacy Trust Center provide certified, high‑assurance privacy safeguards for AI‑driven applications.

AIConfidential ComputingMobile Security
0 likes · 10 min read
How OPPO’s AI Private Computing Cloud Secures Your Data End‑to‑End
phodal
phodal
Aug 22, 2024 · Artificial Intelligence

What’s New in Shire 0.5? AI Coding Agent Gains SonarQube, Git, and Data‑Guarding Features

Shire 0.5 introduces SonarQube issue support, Git‑enabled ShireQL queries, a reranking function for RAG, and new data‑guarding capabilities like the redact function and customizable secret‑pattern YAML, enabling developers to securely build AI‑powered coding agents that leverage IDE assets while protecting sensitive information.

AI CodingGit queriesIDE integration
0 likes · 8 min read
What’s New in Shire 0.5? AI Coding Agent Gains SonarQube, Git, and Data‑Guarding Features
ZhongAn Tech Team
ZhongAn Tech Team
Jun 11, 2024 · Artificial Intelligence

AI and Big Data Developments in Tech News

This article covers recent AI developments, big data challenges, and industry insights including AI course expansions, regulatory discussions, and tech company updates.

AIAI DevelopmentsBig Data
0 likes · 9 min read
AI and Big Data Developments in Tech News
JD Retail Technology
JD Retail Technology
Oct 26, 2023 · Artificial Intelligence

Leveraging Large Language Models for Text-to-SQL: Prompt Design and End-to-End Pipeline

This article explains how large language models can be used to convert natural language queries into SQL statements, describes two main approaches—direct generation and fine‑tuned open‑source models—details prompt engineering techniques, and outlines an end‑to‑end pipeline that executes the generated SQL and summarizes results.

ChatGLMLLMPrompt engineering
0 likes · 7 min read
Leveraging Large Language Models for Text-to-SQL: Prompt Design and End-to-End Pipeline
ITPUB
ITPUB
Aug 18, 2023 · Databases

Key Takeaways from DTCC2023: Vector Databases, Data Privacy, and Intelligent Ops

The 14th China Database Technology Conference (DTCC2023) showcased cutting‑edge advances in vector databases, data privacy, MySQL security, and AI‑driven intelligent operations, featuring insights from industry leaders at Huawei, Tencent, eBay, Bilibili and more.

AIBig DataDatabase Security
0 likes · 10 min read
Key Takeaways from DTCC2023: Vector Databases, Data Privacy, and Intelligent Ops
Airbnb Technology Team
Airbnb Technology Team
Mar 17, 2023 · Information Security

Airbnb Data Privacy and Security Engineering: Automated Data Protection Service Overview

Airbnb’s Data Protection Service unifies privacy and security metadata, offering APIs that automate annotation verification, export and IDL validation, data‑subject‑rights orchestration, and secret‑leak detection, while assigning ownership, minimizing manual effort, and ensuring global, consistent compliance across the platform.

AirbnbCI checksData Governance
0 likes · 13 min read
Airbnb Data Privacy and Security Engineering: Automated Data Protection Service Overview
21CTO
21CTO
Nov 30, 2022 · Information Security

Why Meta Faced a €265 Million Fine Over Facebook Data Leak

In November 2022, Ireland's Data Protection Commission fined Meta €265 million for failing to safeguard personal data of over 5 billion Facebook users, highlighting the EU's intensified enforcement of privacy regulations such as GDPR against major tech firms.

FacebookGDPRIrish DPC
0 likes · 3 min read
Why Meta Faced a €265 Million Fine Over Facebook Data Leak
AntTech
AntTech
Sep 23, 2022 · Information Security

Releasing Security Technology Productivity: Building a New Security System for Digital‑Physical Fusion

In this keynote, Ant Group's Vice President Zhao Wenbiao explains how security technology has evolved from a mere digital‑economy ballast into a catalyst that drives data value, outlines four new security characteristics—compliance, large‑scale intelligence, human‑centric responsibility, and ecosystem collaboration—and introduces the IMAGE framework that integrates interactive proactive security, multi‑party computation, AI adversarial intelligence, graph‑based risk prediction, and edge‑cloud coordination to support a holistic, high‑quality digital transformation.

data privacy
0 likes · 12 min read
Releasing Security Technology Productivity: Building a New Security System for Digital‑Physical Fusion
Architect
Architect
Sep 22, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines various techniques for enabling fuzzy search on encrypted data, comparing naïve, conventional, and advanced algorithmic approaches, evaluating their security, performance, and storage trade‑offs, and provides practical implementation guidance and reference resources.

data privacydatabaseencryption
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Airbnb Technology Team
Airbnb Technology Team
Aug 26, 2022 · Information Security

Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection

Airbnb’s second privacy‑security article describes how the Inspekt service automatically classifies personal and sensitive data across diverse stores using regexes, Aho‑Corasick tries, machine‑learning models and custom validators, measures validator quality, and how the Angmar system scans code repositories for secrets via CI checks and pre‑commit hooks, with plans to broaden coverage to more APIs and data stores.

Secret Detectioncloud securitydata classification
0 likes · 16 min read
Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection
Java Backend Technology
Java Backend Technology
Aug 25, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation strategies—from naïve to conventional to advanced—explains their mechanisms, evaluates performance and security trade‑offs, and provides practical references for building searchable encrypted fields.

Securityalgorithmdata privacy
0 likes · 12 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Sohu Tech Products
Sohu Tech Products
Aug 24, 2022 · Information Security

Approaches to Fuzzy Query on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy search, categorizes three implementation strategies—naïve, conventional, and advanced—analyzes their advantages and drawbacks, and recommends practical solutions for secure yet searchable encrypted fields.

data privacyfuzzy-searchinformation security
0 likes · 10 min read
Approaches to Fuzzy Query on Encrypted Data
Architect's Tech Stack
Architect's Tech Stack
Aug 24, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, and practical recommendations for secure and efficient query processing.

data privacyfuzzy-searchinformation security
0 likes · 11 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Aug 20, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy queries, categorizes three implementation approaches—naïve, conventional, and advanced—and evaluates their security, performance, and storage trade‑offs while providing practical code examples and reference resources.

algorithmdata privacyfuzzy-search
0 likes · 10 min read
Techniques for Performing Fuzzy Search on Encrypted Data
21CTO
21CTO
Jan 24, 2022 · Information Security

Why Google Analytics Is Declared Illegal in Europe: GDPR Implications

A recent Austrian court ruling deems the use of Google Analytics on European websites illegal under GDPR, highlighting data transfer concerns, the role of NOYB, and the broader impact on U.S. tech services operating in the EU.

EU LawGDPRGoogle Analytics
0 likes · 8 min read
Why Google Analytics Is Declared Illegal in Europe: GDPR Implications
DataFunSummit
DataFunSummit
Nov 6, 2021 · Artificial Intelligence

Federated Learning for Financial Data Sharing: Compliance, Auditable Solutions, and Blockchain‑Enabled Marketplace

This article presents a comprehensive overview of how federated learning can be applied to financial data sharing, covering regulatory pressures, audit‑ready blockchain solutions, privacy‑preserving PSI techniques, incentive‑driven data marketplaces, and future directions for secure, compliant AI deployment in the finance sector.

AIBlockchainFederated Learning
0 likes · 10 min read
Federated Learning for Financial Data Sharing: Compliance, Auditable Solutions, and Blockchain‑Enabled Marketplace
Baidu Geek Talk
Baidu Geek Talk
Jun 2, 2021 · Industry Insights

How Federated Computing Secures Data While Powering AI: Core Techniques Explained

This article provides a concise technical overview of federated computing, covering its origins, core cryptographic methods such as MPC, garbled circuits, secret sharing, homomorphic encryption, and TEE, and explains how Baidu applies these technologies to enable privacy‑preserving AI in advertising and other industries.

AIFederated Learningdata privacy
0 likes · 12 min read
How Federated Computing Secures Data While Powering AI: Core Techniques Explained
21CTO
21CTO
May 27, 2021 · Backend Development

Node.js Renames N-API to Node-API & Tesla’s China Data Center: What Developers Should Know

This article covers Tesla’s new China‑based data center for vehicle data, the renaming of Node.js’s N‑API to Node‑API over pronunciation concerns, and a recent police crackdown on developers behind gambling websites, highlighting data privacy, API stability, and cybersecurity risks for tech professionals.

Node.jscybersecuritydata privacy
0 likes · 6 min read
Node.js Renames N-API to Node-API & Tesla’s China Data Center: What Developers Should Know
AntTech
AntTech
Jan 20, 2021 · Information Security

IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group

Ant Group has led the IEEE to approve the world’s first standard for secure computing based on Trusted Execution Environments (TEE), outlining framework, functions, and security requirements, and aims to protect data privacy and sensitive code across cloud, blockchain, AI, and other emerging applications.

IEEE StandardSecure ComputingTEE
0 likes · 6 min read
IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group
Youzan Coder
Youzan Coder
Jan 20, 2021 · Information Security

How Youzan Built a Scalable Big Data Security Framework for Privacy Protection

This article details Youzan's end‑to‑end big data security architecture, covering data lifecycle protection, classification, access control, auditing, backup, privacy safeguards, sensitive data detection, masking strategies, and compliance processes to ensure secure and compliant data handling across the platform.

Data GovernanceSensitive Data Detectionbig data security
0 likes · 18 min read
How Youzan Built a Scalable Big Data Security Framework for Privacy Protection
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Jan 7, 2021 · Big Data

When Web Crawlers Cross the Legal Line: Data‑Driven Case Analysis

This article examines the rise of web crawler technology in big‑data contexts, clarifies the distinction between legitimate data collection and illegal intrusion, presents statistical analysis of recent court cases involving crawlers, and offers practical legal guidelines for developers and data professionals to avoid criminal liability.

Legal AnalysisSoftware ComplianceWeb Crawling
0 likes · 8 min read
When Web Crawlers Cross the Legal Line: Data‑Driven Case Analysis
JD Cloud Developers
JD Cloud Developers
Dec 23, 2020 · Artificial Intelligence

How JD Cloud’s Federated Learning Platform Breaks Data Silos for AI

The article explains how JD Cloud’s federated learning platform enables secure, privacy‑preserving collaborative AI across isolated data sources by using encrypted distributed training, flexible model architectures, and a range of algorithms, while highlighting its architecture, security mechanisms, deployment speed, and real‑world industry successes.

AIJD Clouddata privacy
0 likes · 10 min read
How JD Cloud’s Federated Learning Platform Breaks Data Silos for AI
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Sep 17, 2020 · Big Data

How Big Data Is Used for Price Discrimination and the New Regulations to Stop It

The article explains how big‑data algorithms enable online price discrimination—often called “kill‑familiar” pricing—illustrates real‑world e‑commerce examples, outlines the recently enacted Chinese online tourism regulation prohibiting such practices, and discusses broader data‑privacy and security concerns.

Big Dataconsumer rightsdata privacy
0 likes · 6 min read
How Big Data Is Used for Price Discrimination and the New Regulations to Stop It
JD Retail Technology
JD Retail Technology
Sep 15, 2020 · Artificial Intelligence

Federated Learning and the 9NFL Platform: Architecture, Features, and Real‑World Applications

This article explains how federated learning addresses data‑island challenges under privacy regulations, introduces JD.com’s 9NFL federated learning platform, details its component‑based, high‑availability, high‑performance architecture, and showcases a successful advertising use case that boosted revenue by over 10%.

AIFederated LearningJD.com
0 likes · 7 min read
Federated Learning and the 9NFL Platform: Architecture, Features, and Real‑World Applications
21CTO
21CTO
Jul 12, 2020 · Product Management

How TikTok’s $1B Gamble Shaped Its Global Rise and Regulatory Battles

TikTok’s explosive growth—surpassing 2 billion downloads and 800 million monthly active users—has been driven by aggressive acquisitions, localized content strategies, and massive marketing spend, but it now faces intense regulatory scrutiny and bans in key markets like India, the United States, and Hong Kong.

ByteDanceMarket analysisTikTok
0 likes · 17 min read
How TikTok’s $1B Gamble Shaped Its Global Rise and Regulatory Battles
JD Tech Talk
JD Tech Talk
Jul 3, 2020 · Artificial Intelligence

Federated Learning vs Blockchain: Complementary Technologies and Their Integration

This article compares federated learning and blockchain, explains their shared trust foundation, outlines their distinct applications, and describes two integration patterns that combine privacy‑preserving AI with immutable decentralized ledgers to create new value in the digital economy.

BlockchainDecentralizationFederated Learning
0 likes · 10 min read
Federated Learning vs Blockchain: Complementary Technologies and Their Integration
DataFunTalk
DataFunTalk
Apr 17, 2020 · Artificial Intelligence

Data Privacy and Differential Privacy Techniques for Machine Learning

The article reviews the growing importance of data privacy in machine learning, explains privacy concepts and attack vectors, and details anonymization methods such as k‑anonymity, l‑diversity, t‑closeness, as well as differential privacy techniques and their practical applications.

data privacydifferential privacyinformation security
0 likes · 13 min read
Data Privacy and Differential Privacy Techniques for Machine Learning
Suning Technology
Suning Technology
Feb 22, 2020 · Big Data

How SuNing’s Big Data Engine Powers Health‑Code Pandemic Management

During the COVID‑19 pandemic, SuNing launched a public travel information registration system that leverages massive big‑data processing, high‑concurrency architecture, Kafka streaming, and real‑time analytics to create a city‑wide health‑code network, enabling precise epidemic control, mobility tracking, and robust data privacy safeguards.

Big DataHealth CodeReal-time analytics
0 likes · 5 min read
How SuNing’s Big Data Engine Powers Health‑Code Pandemic Management
Xianyu Technology
Xianyu Technology
Jan 2, 2020 · Industry Insights

Top 10 Tech Trends of 2020: AI, Quantum, Blockchain, and Beyond

The 2020 DAMO Academy report outlines ten transformative technology trends—including the shift from perceptual to cognitive AI, compute‑storage integration, industrial‑internet hyper‑convergence, large‑scale multi‑agent collaboration, modular chip design, mass‑market blockchain, quantum‑computing breakthroughs, new semiconductor materials, privacy‑preserving AI, and cloud as the core of IT innovation—highlighting their potential impact on the next decade of tech development.

AIBlockchainChip Design
0 likes · 10 min read
Top 10 Tech Trends of 2020: AI, Quantum, Blockchain, and Beyond
21CTO
21CTO
Dec 9, 2019 · Big Data

China’s Big Data Crackdown: Legal Risks Every Developer Should Know

The article examines the sweeping regulatory crackdown on China’s big‑data and financial‑risk companies, detailing the dissolution of major crawler firms, new legal restrictions on data collection, and practical guidance on what data‑scraping activities are illegal and how to protect personal information.

Big DataLegal ComplianceWeb Crawling
0 likes · 11 min read
China’s Big Data Crackdown: Legal Risks Every Developer Should Know
21CTO
21CTO
Dec 3, 2019 · Information Security

When Is Web Scraping Legal? A Developer’s Guide to Chinese Cyber Laws

This article explains the legal boundaries of web crawling in China, covering recent cybersecurity regulations, what makes a crawler illegal or legal, common developer questions, and practical advice to avoid personal‑data violations and criminal liability.

Chinese lawLegal ComplianceWeb Scraping
0 likes · 10 min read
When Is Web Scraping Legal? A Developer’s Guide to Chinese Cyber Laws
Java Backend Technology
Java Backend Technology
Oct 31, 2019 · Operations

When Does Programming Cross the Legal Line? A Developer's Risk Guide

This article explains how common programming activities such as web crawling, developing gambling or adult sites, P2P platforms, and game cheats can violate Chinese laws, outlines the legal criteria for each case, and offers practical advice for developers to protect themselves from criminal liability.

Legal ComplianceWeb Crawlingdata privacy
0 likes · 18 min read
When Does Programming Cross the Legal Line? A Developer's Risk Guide
21CTO
21CTO
Mar 21, 2019 · Information Security

Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown

The article examines Tencent's legal push to force ByteDance's Duoshan app to stop using users' WeChat/QQ avatars and nicknames, detailing the data‑sharing dispute, the PR tactics that spiked Duoshan's DAU, and the provisional court injunction that halted the practice.

ByteDanceTencentdata privacy
0 likes · 6 min read
Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown
Efficient Ops
Efficient Ops
May 26, 2018 · Information Security

How the EU’s GDPR Redefines Data Privacy and Impacts Global Tech

The EU’s General Data Protection Regulation, effective May 25, dramatically expands data‑privacy rights, imposes strict obligations on all companies handling EU personal data—including non‑EU firms—introduces hefty fines, and reshapes how the internet industry balances advertising revenue with user protection.

EU RegulationGDPRcompliance
0 likes · 5 min read
How the EU’s GDPR Redefines Data Privacy and Impacts Global Tech
Tencent Cloud Developer
Tencent Cloud Developer
Apr 9, 2018 · Artificial Intelligence

Facebook Suspends CubeYou Amid Data Scandal; NASA Employs Machine Learning to Hunt Distant Planets

Facebook suspended data‑analysis firm CubeYou over a scandal involving misuse of millions of users’ personal quiz data, while NASA launched a crowdsourced project and MIT‑trained AI to scan WISE images, achieving 97% agreement with humans and uncovering 367 new exoplanet‑candidate debris disks.

CubeYouFacebookNASA
0 likes · 3 min read
Facebook Suspends CubeYou Amid Data Scandal; NASA Employs Machine Learning to Hunt Distant Planets
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Oct 31, 2017 · Big Data

How to Profit from Big Data in the Post‑Privacy‑Law Era

The article analyzes how recent data‑privacy regulations force the big‑data industry to choose between building costly, comprehensive data platforms or focusing on lean, high‑value applications, and outlines sustainable profit models and strategic trade‑offs for enterprises.

Business ModelData Platformdata privacy
0 likes · 16 min read
How to Profit from Big Data in the Post‑Privacy‑Law Era
Architects' Tech Alliance
Architects' Tech Alliance
Jun 4, 2017 · Blockchain

Analysis of the SF Express and Cainiao Data Conflict and the Role of Blockchain in Logistics Data Security

The article examines the public dispute between SF Express and Alibaba's Cainiao over data interfaces, explores privacy and security concerns in logistics, proposes a shared platform model, and highlights blockchain as a potential solution for safeguarding user information in the era of big data and IoT.

LogisticsSharing Economydata privacy
0 likes · 7 min read
Analysis of the SF Express and Cainiao Data Conflict and the Role of Blockchain in Logistics Data Security
Efficient Ops
Efficient Ops
Aug 23, 2015 · Cloud Computing

Global Cloud Computing Market: Trends, Policies, and Data Privacy Challenges

This article examines the rapid growth of the global cloud computing market, compares regional developments in the United States, Europe, and Japan, and analyzes the differing regulatory approaches and cross‑border data privacy issues that shape the industry worldwide.

Market analysisdata privacyglobal trends
0 likes · 13 min read
Global Cloud Computing Market: Trends, Policies, and Data Privacy Challenges
Baidu Tech Salon
Baidu Tech Salon
Oct 16, 2014 · Information Security

Editor's Note: The websites you visit write Cookies to your browser...

With third‑party cookies dying, Facebook, Google, and Apple are replacing them by leveraging their own login ecosystems—Facebook’s SSO and Atlas platform, Google’s Ad ID across Android and services, and Apple’s IDFA tied to Apple IDs—while third‑party data firms supplement detail, and users can still disable most tracking.

Tech Companiescookiesdata privacy
0 likes · 7 min read
Editor's Note: The websites you visit write Cookies to your browser...