Tagged articles
80 articles
Page 1 of 1
Old Meng AI Explorer
Old Meng AI Explorer
Jan 18, 2026 · Artificial Intelligence

How BabelDOC Preserves PDF Layout While Translating & OneAIFW Shields Your Data

Two open‑source projects—BabelDOC, a Python‑based PDF translator that retains original formatting using AI models, and OneAIFW, a Zig‑and‑Rust local AI firewall that anonymizes sensitive data before LLM queries—offer practical, privacy‑preserving solutions for researchers and developers.

AI privacyData ProtectionDocument Processing
0 likes · 8 min read
How BabelDOC Preserves PDF Layout While Translating & OneAIFW Shields Your Data
Woodpecker Software Testing
Woodpecker Software Testing
Dec 31, 2025 · Information Security

Understanding GDPR: Key Principles, Rights, and Compliance Requirements

GDPR, the EU’s General Data Protection Regulation effective since May 2018, imposes strict data‑handling rules worldwide, outlining seven core principles, eight data‑subject rights, mandatory legal bases, DPO appointments, breach notifications, privacy‑by‑design, record‑keeping, cross‑border transfer limits, hefty fines, and its global influence on similar laws.

Data ProtectionData Subject RightsEU Regulation
0 likes · 8 min read
Understanding GDPR: Key Principles, Rights, and Compliance Requirements
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 7, 2025 · Information Security

How to Secure AI Vector Embeddings in MySQL: Risks and Best Practices

AI applications rely on vector embeddings for search and recommendation, but these rich vectors expose new security and privacy threats; this article explains the main risks, attack methods, and mature MySQL strategies—including secure storage, access control, encryption, auditing, and compliance—to protect vector data.

AI securityData Protectionaccess control
0 likes · 12 min read
How to Secure AI Vector Embeddings in MySQL: Risks and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2025 · Operations

How a Single rm -rf Command Almost Wiped My Data—and the Backup Plan That Saved It

A disastrous rm -rf command erased 2.3 TB of production MySQL data, but a meticulously designed multi‑layer backup strategy—including logical, physical, real‑time, and cloud backups—enabled a 99.4% data recovery within 72 hours, highlighting essential lessons and best‑practice guidelines for reliable data protection.

BackupData ProtectionOperations
0 likes · 36 min read
How a Single rm -rf Command Almost Wiped My Data—and the Backup Plan That Saved It
FunTester
FunTester
Sep 10, 2025 · Information Security

How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges

This article explains data masking (data desensitization), its importance for privacy and compliance, outlines the four implementation stages, compares common masking techniques, and discusses the challenges and future directions for secure data handling in development and testing.

Data ProtectionGDPRdata masking
0 likes · 7 min read
How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges
Ops Development & AI Practice
Ops Development & AI Practice
Sep 3, 2025 · Information Security

How to Build an Open‑Source DLP System with Osquery, Wazuh, Zeek, and ELK

This guide explains how to assemble a cost‑effective, highly customizable data loss prevention platform using open‑source tools for endpoint monitoring, network traffic inspection, centralized analysis, and data discovery, while highlighting the required integration steps and the trade‑offs compared with commercial solutions.

DLPData ProtectionELK
0 likes · 8 min read
How to Build an Open‑Source DLP System with Osquery, Wazuh, Zeek, and ELK
Software Development Quality
Software Development Quality
Aug 21, 2025 · Information Security

Essential Data Security Red Lines: What Every Employee Must Follow

This document outlines the background, scope, key definitions, and strict data security red lines that all employees must adhere to, including prohibitions on bypassing security measures, unauthorized data use, external disclosures, cross‑border transfers, and requirements for handling sensitive information.

Data Protectioncompliancedata security
0 likes · 4 min read
Essential Data Security Red Lines: What Every Employee Must Follow
Sohu Tech Products
Sohu Tech Products
Apr 2, 2025 · Artificial Intelligence

How SecretFlow Enables Privacy‑Preserving AI Model Training with Secure Multi‑Party Computation

SecretFlow is an open‑source privacy‑computing framework that lets multiple parties perform encrypted data analysis and AI model training without exposing raw data, offering unified MPC, federated learning and differential privacy features, with step‑by‑step Docker installation, Python examples, and a modular architecture for secure multi‑party computation.

AI model trainingData ProtectionPrivacy Computing
0 likes · 11 min read
How SecretFlow Enables Privacy‑Preserving AI Model Training with Secure Multi‑Party Computation
Alibaba Cloud Native
Alibaba Cloud Native
Mar 30, 2025 · Cloud Native

How to Use ACK Backup Center for Volume Data Protection and Cross‑Cluster Migration

This guide explains how Alibaba Cloud ACK’s Backup Center protects Kubernetes storage volumes, walks through creating backup plans with the Data Protection feature, demonstrates a NAS‑to‑Cloud‑Disk migration example, and details the step‑by‑step backup and restore procedures including YAML definitions and snapshot handling.

ACKBackupData Protection
0 likes · 11 min read
How to Use ACK Backup Center for Volume Data Protection and Cross‑Cluster Migration
Architects' Tech Alliance
Architects' Tech Alliance
Jan 12, 2025 · Operations

Understanding RAID: Consistency Checks, Hot Spare, Reconstruction, and Performance Strategies

This article provides a comprehensive technical overview of RAID storage systems, covering fault tolerance concepts, consistency verification, hot spare and emergency backup mechanisms, reconstruction processes, read/write policies, power protection, disk striping, mirroring, external configurations, energy-saving features, and JBOD support, while explaining their practical implications and configuration guidelines.

Data ProtectionJBODRAID
0 likes · 17 min read
Understanding RAID: Consistency Checks, Hot Spare, Reconstruction, and Performance Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Dec 28, 2024 · Cloud Computing

Comprehensive Overview of Cloud Disaster Recovery and Backup Technologies

This article provides a detailed explanation of cloud disaster recovery and cloud backup, covering their definitions, primary application scenarios, reference architectures, and essential technologies such as incremental backup, deduplication, multi‑tenant management, and data‑trust assurance, illustrated with diagrams and practical examples.

Cloud BackupData ProtectionOperations
0 likes · 13 min read
Comprehensive Overview of Cloud Disaster Recovery and Backup Technologies
Architecture and Beyond
Architecture and Beyond
Aug 30, 2024 · Information Security

Comprehensive Security Strategy for SaaS Startups: External and Internal Measures

This guide outlines a complete security strategy for SaaS startups, covering external threats such as network attacks and data leaks, as well as internal risks like access control, host protection, code safety, log management, and third‑party integration, providing practical solutions and best‑practice recommendations.

Data ProtectionExternal ThreatsInternal Controls
0 likes · 20 min read
Comprehensive Security Strategy for SaaS Startups: External and Internal Measures
Data Thinking Notes
Data Thinking Notes
Jun 12, 2024 · Information Security

How to Implement Data Classification and Grading for Robust Security

This article outlines the national‑standard‑based methodology for classifying and grading data, detailing industry‑specific processes, core and important data identification criteria, general data handling, and a privacy‑focused governance framework that enables organizations to protect sensitive information effectively.

Data ProtectionSecurity Governancedata classification
0 likes · 13 min read
How to Implement Data Classification and Grading for Robust Security
Selected Java Interview Questions
Selected Java Interview Questions
Apr 25, 2024 · Information Security

Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations

The article examines why encrypted sensitive fields such as passwords, phone numbers, and bank details need special handling, categorises three families of fuzzy‑search solutions for encrypted data, evaluates their security, performance and storage costs, and recommends a balanced conventional method for production use.

Data Protectionalgorithmdatabase
0 likes · 10 min read
Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations
Architecture and Beyond
Architecture and Beyond
Apr 20, 2024 · Information Security

How to Secure User Assets in SaaS: Strategies, Policies, and Pitfalls

The article defines user assets, explains why protecting them is vital for SaaS companies, and outlines organizational, procedural, technical, and emergency-response measures—plus common challenges—to help enterprises build comprehensive user asset security programs.

Data ProtectionSaaSinformation security
0 likes · 17 min read
How to Secure User Assets in SaaS: Strategies, Policies, and Pitfalls
DataFunSummit
DataFunSummit
Feb 6, 2024 · Big Data

Exploring ByteDance's EB‑Scale HDFS: Architecture, Multi‑Datacenter Challenges, Tiered Storage, and Data Protection Practices

This article presents an in‑depth overview of ByteDance's EB‑scale HDFS, covering its new features, multi‑datacenter architecture, tiered storage implementation, data management services, capacity and fault‑tolerance strategies, as well as practical data‑protection mechanisms and related Q&A.

Big DataData ProtectionHDFS
0 likes · 22 min read
Exploring ByteDance's EB‑Scale HDFS: Architecture, Multi‑Datacenter Challenges, Tiered Storage, and Data Protection Practices
Architects' Tech Alliance
Architects' Tech Alliance
Jan 1, 2024 · Fundamentals

Understanding SSD Architecture: Blocks, Pages, Wear Leveling, and Data Protection

This article explains the core components and operation of SSDs—including controllers, NAND flash, block and page structures, program/erase cycles, garbage collection, wear‑leveling strategies, bad‑block handling, data‑redundancy mechanisms, namespace concepts, over‑provisioning, and key reliability metrics—providing a comprehensive technical overview for storage engineers.

Data ProtectionGarbage CollectionNAND Flash
0 likes · 12 min read
Understanding SSD Architecture: Blocks, Pages, Wear Leveling, and Data Protection
Architects' Tech Alliance
Architects' Tech Alliance
Dec 14, 2023 · Fundamentals

Understanding Disk Fault Tolerance and RAID Features

This article explains disk fault tolerance mechanisms, detailing how RAID levels (1, 5, 6, 10, 50, 60) provide redundancy, the concepts of consistency checking, hot‑spare and emergency‑spare, rebuild processes, read/write policies, power‑loss protection, striping, mirroring, external configurations, energy‑saving, and JBOD functionality.

Data ProtectionRAIDdisk fault tolerance
0 likes · 20 min read
Understanding Disk Fault Tolerance and RAID Features
Open Source Linux
Open Source Linux
Nov 23, 2023 · Operations

Mastering RAID Fault Tolerance: Consistency, Hot Spare, Rebuild & More

This article explains RAID fault tolerance mechanisms—including redundancy levels of RAID 1,5,6,10,50,60—covers consistency checks, hot‑spare and emergency backup, data reconstruction, read/write policies, power‑loss protection, striping, mirroring, foreign configurations, energy‑saving and JBOD, providing a comprehensive guide for storage administrators.

Data ProtectionRAIDStorage Management
0 likes · 15 min read
Mastering RAID Fault Tolerance: Consistency, Hot Spare, Rebuild & More
Open Source Linux
Open Source Linux
Nov 6, 2023 · Fundamentals

How RAID Controllers Ensure Data Integrity and Performance: A Deep Dive

This article explains RAID fault tolerance, consistency checks, hot‑spare and emergency backup, reconstruction, read/write policies, power‑loss protection, striping, mirroring, external configuration, power‑saving and JBOD features, showing how RAID controllers maintain data integrity and system availability.

Data ProtectionRAIDdisk fault tolerance
0 likes · 16 min read
How RAID Controllers Ensure Data Integrity and Performance: A Deep Dive
php Courses
php Courses
Oct 24, 2023 · Information Security

Using PHP Encryption Functions for Data Protection

This article explains PHP's built‑in encryption functions—including OpenSSL encryption/decryption, hashing, and password handling—shows how to generate keys, encrypt and decrypt data, and provides best‑practice tips for securely protecting sensitive information in PHP applications.

Data ProtectionOpenSSLencryption
0 likes · 5 min read
Using PHP Encryption Functions for Data Protection
Huolala Tech
Huolala Tech
Aug 15, 2023 · Information Security

How Modern Security Risk Assessment Evolved: Key Features and Practical Insights

This article examines the expanded scope, updated standards, and practical workflow of security risk assessment in today's regulatory environment, offering detailed guidance on assessment criteria, target objects, methodologies, organizational steps, and decision‑making for effective risk management.

Data Protectioncomplianceinformation security
0 likes · 9 min read
How Modern Security Risk Assessment Evolved: Key Features and Practical Insights
Didi Tech
Didi Tech
Aug 10, 2023 · Information Security

Security Hardening and Architecture of Didi's Elasticsearch Deployment

Didi hardened its massive Elasticsearch deployment—spanning 66 clusters and thousands of nodes—by adding a custom security plugin that authenticates requests at the cluster level, implementing a one‑click toggle and staged rolling upgrades, ultimately enabling authentication across all clusters and dramatically reducing data‑leak risk.

AuthenticationData ProtectionDidi
0 likes · 12 min read
Security Hardening and Architecture of Didi's Elasticsearch Deployment
Architects' Tech Alliance
Architects' Tech Alliance
Jun 18, 2023 · Cloud Computing

Comparison of Three‑Replica and Dual‑RAID Distributed Storage Architectures

The article compares three‑replica and dual‑RAID distributed storage designs, detailing their architectures, bandwidth and latency impacts, failure isolation, “slow‑disk” issues, and overall performance, stability, and reliability advantages of dual‑RAID for modern cloud and hyper‑converged environments.

Data ProtectionRAIDcloud storage
0 likes · 7 min read
Comparison of Three‑Replica and Dual‑RAID Distributed Storage Architectures
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 9, 2022 · Operations

Factors Affecting Storage System Reliability and Related Technologies

Storage system reliability depends on both hardware and software availability and on preserving data integrity against media degradation, bit flips, external corruption, and firmware bugs, while techniques such as parity/ECC/CRC verification, RAID levels, snapshot methods, backups, continuous data protection, and specialized mechanisms like WAFL checksums and flash‑level error recovery collectively mitigate these risks.

Data ProtectionData verificationECC
0 likes · 13 min read
Factors Affecting Storage System Reliability and Related Technologies
Open Source Linux
Open Source Linux
Dec 6, 2022 · Operations

Top 8 Linux Backup Solutions Every User and Enterprise Should Know

Regular data backup is essential for both servers and personal computers, and this article reviews eight of the best Linux backup applications—ranging from enterprise‑grade tools like Bacula and Amanda to user‑friendly options such as Déjà Dup and Timeshift—along with installation commands and key features.

Data ProtectionDéjà DupLinux backup
0 likes · 9 min read
Top 8 Linux Backup Solutions Every User and Enterprise Should Know
IT Services Circle
IT Services Circle
Nov 19, 2022 · Information Security

New Internet Comment Service Management Regulations Effective December 15, 2022

The National Internet Information Office's revised Internet Comment Service Management Regulations, effective December 15, 2022, mandate real‑name authentication, user tiering, blacklist of serious defaulters, stringent personal data protection, pre‑review of news comments, and comprehensive security measures for online comment platforms.

Comment ManagementData ProtectionInternet Regulation
0 likes · 6 min read
New Internet Comment Service Management Regulations Effective December 15, 2022
Open Source Linux
Open Source Linux
Oct 26, 2022 · Fundamentals

Choosing the Right RAID Level: Pros, Cons, and Best Use Cases

This guide explains what RAID is, its role in server storage, compares common RAID levels (0, 1, 5, 6, 10) in terms of fault tolerance, performance, and capacity, and offers recommendations for selecting the most suitable RAID configuration based on data safety, speed, and cost considerations.

Data ProtectionRAIDfault tolerance
0 likes · 8 min read
Choosing the Right RAID Level: Pros, Cons, and Best Use Cases
Java Architect Essentials
Java Architect Essentials
Oct 23, 2022 · Information Security

Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring

A Dutch employee was awarded €75,000 (≈ ¥520,000) after a Dutch court ruled that his dismissal for refusing to keep his webcam on during remote work violated his privacy rights, highlighting legal limits on employer surveillance and prompting broader debate on remote‑work monitoring practices.

Data Protectionemployee monitoringlegal case
0 likes · 7 min read
Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring
Architects Research Society
Architects Research Society
Aug 22, 2022 · Operations

Backup Strategies: Full, Incremental, and Differential Backups

This article explains the three main backup methods—full, incremental, and differential—detailing their processes, advantages, disadvantages, and suitable use cases for organizations of different sizes, helping readers choose the most appropriate backup strategy for their business needs.

BackupData ProtectionFull Backup
0 likes · 7 min read
Backup Strategies: Full, Incremental, and Differential Backups
AntTech
AntTech
Jul 8, 2022 · Information Security

Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights

This article reviews Ant Group's award‑winning mPaaS mobile security solution, detailing the current mobile app security landscape, regulatory pressures, and the four‑layer full‑chain protection architecture—including data security, privacy control, biometric authentication, and app hardening—along with practical compliance and risk‑mitigation practices.

Ant GroupApplication SecurityData Protection
0 likes · 8 min read
Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights
Airbnb Technology Team
Airbnb Technology Team
May 12, 2022 · Information Security

Airbnb Data Privacy and Security Engineering – Data Protection Platform (DPP) Overview and Madoka Metadata System

Airbnb’s Data Protection Platform (DPP) combines automated discovery, classification, encryption and privacy‑orchestration services—Inspekt, Angmar, Cipher, Obliviate, Minister, and the Madoka metadata system—to continuously inventory petabyte‑scale MySQL, Hive and S3 assets, track ownership and security attributes, and enforce GDPR, PIPL and CCPA compliance.

AirbnbAutomationData Protection
0 likes · 15 min read
Airbnb Data Privacy and Security Engineering – Data Protection Platform (DPP) Overview and Madoka Metadata System
Open Source Linux
Open Source Linux
Dec 5, 2021 · Operations

Choosing the Right Backup: Normal, Copy, Differential, Incremental

The article explains four primary backup methods—Normal (full), Copy, Differential, and Incremental—detailing their processes, advantages, and drawbacks, and helps readers decide which strategy best balances storage space, recovery speed, and data protection needs.

BackupData ProtectionIncremental Backup
0 likes · 4 min read
Choosing the Right Backup: Normal, Copy, Differential, Incremental
ITPUB
ITPUB
Nov 2, 2021 · Databases

Why Open-Source Databases Like PostgreSQL Boost Security for Hybrid Workforces

Since the pandemic forced remote work, organizations must protect growing data across hybrid teams, and the article argues that open-source databases such as PostgreSQL offer stronger, more adaptable security than legacy closed-source systems by enabling rapid patching, community scrutiny, and cost-effective protection.

Data ProtectionDatabase SecurityPostgreSQL
0 likes · 5 min read
Why Open-Source Databases Like PostgreSQL Boost Security for Hybrid Workforces
Programmer DD
Programmer DD
Mar 27, 2021 · Operations

Disaster Recovery vs Backup: Key Differences, Types, and Levels Explained

This article explains what disaster recovery is, how it differs from backup, outlines the various classifications of disaster recovery and backup, and details the six practical differences and four backup levels that organizations should consider to ensure business continuity and data protection.

BackupData ProtectionIT Operations
0 likes · 9 min read
Disaster Recovery vs Backup: Key Differences, Types, and Levels Explained
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2021 · Operations

5 Essential Practices to Safely Back Up Your Kubernetes Workloads

This article outlines five best‑practice steps—including considering cluster architecture, planning recovery, simplifying operations, ensuring security, and leveraging Kubernetes portability—to help organizations reliably back up applications and data in Kubernetes environments.

BackupData ProtectionKubernetes
0 likes · 7 min read
5 Essential Practices to Safely Back Up Your Kubernetes Workloads
21CTO
21CTO
Dec 25, 2020 · Information Security

Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR

GitHub announced the removal of unnecessary cookies, reflecting GDPR-driven privacy shifts and showing how modern web platforms can reduce data collection while still tracking essential performance metrics without third‑party trackers.

Data ProtectionGDPRGitHub
0 likes · 5 min read
Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR
Architects' Tech Alliance
Architects' Tech Alliance
Oct 25, 2020 · Operations

Understanding Data Backup Techniques: File‑Level, Block‑Level, Remote Copy, Snapshots and Volume Clone

This article explains the fundamentals and classifications of data backup technologies—including file‑level and block‑level protection, remote file copy, remote volume imaging, snapshot mechanisms, CoFW vs RoFW strategies, and volume clone methods—while also covering backup destinations, paths, and common backup strategies.

BackupData ProtectionOperations
0 likes · 20 min read
Understanding Data Backup Techniques: File‑Level, Block‑Level, Remote Copy, Snapshots and Volume Clone
Architects Research Society
Architects Research Society
Aug 12, 2020 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity best practices for 2019, covering biometric security, tiered policies, risk‑based approaches, data backup, IoT protection, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing defense, and employee awareness to safeguard sensitive data.

Data ProtectionMulti-Factor Authenticationbest practices
0 likes · 22 min read
12 Best Cybersecurity Practices for 2019
IT Architects Alliance
IT Architects Alliance
Jul 27, 2020 · Operations

Why Tape Backup Is Failing and How Disk Backup Can Save Your Data

The article analyzes the growing limitations of tape backup, outlines a step‑by‑step migration to disk‑based backup using deduplication, compression and modern storage technologies, and explains how this transition improves reliability, cost efficiency and recovery speed for enterprises.

BackupData ProtectionOperations
0 likes · 11 min read
Why Tape Backup Is Failing and How Disk Backup Can Save Your Data
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBData ProtectionThreat Detection
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
Open Source Linux
Open Source Linux
Mar 31, 2020 · Operations

Master Data Backup: Host, LAN, Server-less & NDMP Techniques Explained

This article provides a comprehensive overview of backup technologies, comparing Host, LAN, LAN-free, Server-free, and Server-less methods, reviews major backup software from EMC, Symantec, Commvault, and IBM, and explains NDMP protocols and NAS backup architectures.

BackupData ProtectionEnterprise Software
0 likes · 18 min read
Master Data Backup: Host, LAN, Server-less & NDMP Techniques Explained
Architects' Tech Alliance
Architects' Tech Alliance
Mar 16, 2020 · Operations

Overview of Backup Technologies and Major Backup Software

This article provides a comprehensive overview of backup technologies, describing the evolution of backup architectures such as Host, LAN, LAN‑free, Server‑free, and Server‑less, and analyzes the features, advantages, and drawbacks of leading enterprise backup software solutions.

BackupData ProtectionEnterprise
0 likes · 17 min read
Overview of Backup Technologies and Major Backup Software
AntTech
AntTech
Mar 10, 2020 · Information Security

Case Analysis of a Mobile Banking App Attack and Client‑Side Security Strategies

The article examines a 2019 bank app breach where a young hacker used packet capture, fake ID and replay attacks to create fraudulent accounts, then discusses comprehensive client‑side security measures—including Alipay's multi‑layer protection, AI‑driven verification, and mPaaS lifecycle hardening—to safeguard mobile applications.

AlipayData ProtectionReplay attack
0 likes · 6 min read
Case Analysis of a Mobile Banking App Attack and Client‑Side Security Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

Data Protectioncloud securitycompliance
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

Data ProtectionMFAbest practices
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
Architects' Tech Alliance
Architects' Tech Alliance
Aug 30, 2019 · Industry Insights

Why Continuous Data Protection (CDP) Is the Future of Enterprise Data Backup

The article analyzes the evolution of data protection—from manual copies and scripts to snapshots and Continuous Data Protection (CDP)—explaining CDP's technical principles, implementation models, advantages over traditional backup, and how Copy Data Management (CDM) complements modern storage strategies in large‑scale enterprises.

BackupContinuous Data ProtectionCopy Data Management
0 likes · 20 min read
Why Continuous Data Protection (CDP) Is the Future of Enterprise Data Backup
Architects' Tech Alliance
Architects' Tech Alliance
Aug 7, 2019 · Operations

How Snapshot Technology Solves Modern Backup Challenges

Snapshot technology creates point‑in‑time copies of files, directories or volumes, addressing common backup issues such as large data volumes, write‑in‑progress files, performance impact, and consistency, while offering various implementations—from file‑system and LVM to NAS, hypervisors, and databases—each with distinct advantages and trade‑offs.

BackupConsistencyData Protection
0 likes · 20 min read
How Snapshot Technology Solves Modern Backup Challenges
Efficient Ops
Efficient Ops
Dec 6, 2018 · Information Security

What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?

The draft "Internet Personal Information Security Protection Guideline" issued by China's Ministry of Public Security outlines comprehensive management mechanisms, technical safeguards, and business processes to help internet enterprises protect personal data throughout its lifecycle, and invites public feedback via the national security platform.

ChinaData ProtectionGuidelines
0 likes · 27 min read
What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?
Architects' Tech Alliance
Architects' Tech Alliance
Dec 2, 2018 · Information Security

Understanding Data Protection: File‑Level vs Block‑Level Backup, Remote Replication, Snapshots, and Clone Technologies

This article explains data protection concepts—including file‑level and block‑level backup, remote file copy and remote volume imaging, snapshot mechanisms such as CoFW and RoFW, and clone technologies—while discussing their advantages, drawbacks, and practical backup architectures.

BackupData Protectioninformation security
0 likes · 20 min read
Understanding Data Protection: File‑Level vs Block‑Level Backup, Remote Replication, Snapshots, and Clone Technologies
Architects' Tech Alliance
Architects' Tech Alliance
Sep 25, 2018 · Operations

How Snapshots Revolutionize Data Backup and Recovery: A Deep Dive

This article provides a comprehensive overview of snapshot technology, explaining its creation process, various implementations across file systems, LVM, NAS, disk arrays, virtualization, and databases, and detailing mechanisms like COW, ROW, incremental and continuous protection while addressing consistency challenges.

Data ProtectionLVMNAS
0 likes · 20 min read
How Snapshots Revolutionize Data Backup and Recovery: A Deep Dive
dbaplus Community
dbaplus Community
Sep 12, 2018 · Operations

Mastering Enterprise Ops Security: Habits, Architecture, and Incident Response

This article presents a comprehensive guide to operational security, covering essential habits, a layered technical architecture, access‑control strategies, CI/CD safeguards, DDoS mitigation, data protection, incident‑response procedures, and collaboration with IT, security, and network teams.

CI/CD securityDDoS DefenseData Protection
0 likes · 20 min read
Mastering Enterprise Ops Security: Habits, Architecture, and Incident Response
ITPUB
ITPUB
Aug 24, 2018 · Information Security

How Dell EMC RecoverPoint Achieves Millisecond‑Level Data Recovery for Enterprise Continuity

This article details how Dell EMC’s SC series storage, VPLEX and RecoverPoint were tested by E Enterprise Research Institute across multiple failure scenarios, demonstrating automatic failover, rapid point‑in‑time restores, flexible backup granularity and millisecond‑level recovery to ensure uninterrupted business operations.

Data ProtectionDell EMCEnterprise Continuity
0 likes · 11 min read
How Dell EMC RecoverPoint Achieves Millisecond‑Level Data Recovery for Enterprise Continuity
Tencent Cloud Developer
Tencent Cloud Developer
Jul 17, 2018 · Operations

Understanding Storage Snapshots: Use Cases and Implementation Principles

Storage snapshots are point‑in‑time, fully usable copies of data that protect against loss, enable testing and analysis, and are implemented mainly via copy‑on‑write or redirect‑on‑write techniques, each with distinct performance and deletion trade‑offs, so selecting the optimal method depends on workload and business requirements.

COWData ProtectionRow
0 likes · 10 min read
Understanding Storage Snapshots: Use Cases and Implementation Principles
dbaplus Community
dbaplus Community
Sep 25, 2017 · Information Security

How GDPR Shapes Data Management Practices and Database Security

This article explains GDPR's key principles, the Discover‑Defend‑Detect framework, and concrete database controls such as data identification, retention, pseudonymisation, encryption, access control, disaster recovery, and audit logging needed to achieve compliance.

Audit loggingData ProtectionGDPR
0 likes · 12 min read
How GDPR Shapes Data Management Practices and Database Security
Architects' Tech Alliance
Architects' Tech Alliance
Jun 29, 2017 · Operations

Comprehensive Guide to Data Backup Solutions and Architectures

This article compiles a series of detailed data backup resources, covering introductory concepts, backup software architectures, distributed indexing, key features like snapshots and deduplication, virtualization support, storage sizing, cloud optimization, and agent‑less solutions to help practitioners design reliable backup strategies.

Cloud BackupData ProtectionVirtualization
0 likes · 9 min read
Comprehensive Guide to Data Backup Solutions and Architectures
Architects' Tech Alliance
Architects' Tech Alliance
Apr 10, 2017 · Information Security

Overview of Backup Technologies and Major Enterprise Backup Software

This article provides a comprehensive overview of backup concepts, various backup architectures such as Host, LAN, LAN‑free, Server‑free and Server‑less, evaluates leading enterprise backup solutions, and analyzes key features like deduplication, NDMP support, OS compatibility and maintainability.

BackupData ProtectionEnterprise Software
0 likes · 15 min read
Overview of Backup Technologies and Major Enterprise Backup Software
Meituan Technology Team
Meituan Technology Team
Apr 7, 2017 · Information Security

Insights on Google Infrastructure Security Design

Google’s new security white paper reveals how its deeply integrated, principle‑driven architecture—spanning physical data‑center safeguards, mutual‑authenticated multi‑tenant services, pervasive encryption, and a comprehensive DevSecOps process—enables massive‑scale protection, but replicating this model demands substantial custom hardware, unified tooling, and large‑scale engineering expertise.

Data ProtectionGoogleInfrastructure
0 likes · 22 min read
Insights on Google Infrastructure Security Design
Architects' Tech Alliance
Architects' Tech Alliance
Sep 7, 2016 · Operations

How Agentless Backup Works in Cloud Environments and Its Trade‑offs

The article examines agentless backup technology, comparing its implementation in virtualized and physical environments, detailing supported interfaces, evaluating a real‑world Asigra Cloud Backup case, and discussing security risks, performance impacts, and when traditional agents remain necessary.

Cloud BackupData ProtectionOperations
0 likes · 7 min read
How Agentless Backup Works in Cloud Environments and Its Trade‑offs
Architects' Tech Alliance
Architects' Tech Alliance
Aug 22, 2016 · Cloud Computing

How Smaug (Karbor) Provides Unified Data Protection for OpenStack

Smaug, now called Karbor, is an OpenStack project that standardizes data protection across heterogeneous virtualization platforms by offering unified APIs, plugin architecture, and workflow services to protect VMs, volumes, networks, and other resources with backup, replication, and migration capabilities.

APICloud BackupData Protection
0 likes · 9 min read
How Smaug (Karbor) Provides Unified Data Protection for OpenStack
Architects' Tech Alliance
Architects' Tech Alliance
Aug 4, 2016 · Information Security

Reliability and High Availability of Backup Software Systems

This article examines how backup software ensures enterprise data reliability through media redundancy, server failover, load balancing, and both cold and high‑availability solutions for the management server, highlighting technologies such as GridStor, dual‑array clustering, and deduplication.

BackupData ProtectionReliability
0 likes · 11 min read
Reliability and High Availability of Backup Software Systems
Architects' Tech Alliance
Architects' Tech Alliance
Jul 21, 2016 · Operations

Analysis of Backup Software Network Architectures: LAN Base, LAN Free, Server Free, NDMP, and Server‑Less

The article provides a comprehensive overview of various backup software networking models—including LAN Base, LAN Free, Server Free, NDMP, and the emerging Server‑Less approach—detailing their deployment options, performance impacts, and suitability for different data volumes and infrastructure requirements.

BackupData ProtectionIT Operations
0 likes · 10 min read
Analysis of Backup Software Network Architectures: LAN Base, LAN Free, Server Free, NDMP, and Server‑Less
Ctrip Technology
Ctrip Technology
Jun 16, 2016 · Information Security

Ctrip Achieves ISO 27001 Certification, Strengthening Information Security for Online Travel Services

Ctrip has become the first Chinese online travel service to obtain ISO 27001 certification, demonstrating enhanced information security management for its financial and business‑travel divisions and reassuring users that their personal and payment data are protected throughout the booking process.

CtripData ProtectionISO 27001
0 likes · 6 min read
Ctrip Achieves ISO 27001 Certification, Strengthening Information Security for Online Travel Services
MaGe Linux Operations
MaGe Linux Operations
May 5, 2016 · Databases

Mastering MySQL Backups: Strategies, Types, and Tools for Reliable Data Protection

This guide explains why data backup is essential, outlines backup types (full, incremental, differential), compares MySQL backup methods (hot, warm, cold), evaluates physical vs logical approaches, reviews common tools like mysqldump, cp, tar, LVM snapshots, and xtrabackup, and offers strategies for choosing the right solution.

BackupData Protectiondatabase
0 likes · 8 min read
Mastering MySQL Backups: Strategies, Types, and Tools for Reliable Data Protection
21CTO
21CTO
Mar 22, 2016 · Information Security

How to Outsmart AI-Powered Web Scrapers: Two Powerful Anti‑Crawling Tricks

Web crawlers, especially AI‑driven ones, threaten site performance and data ownership, so this article reviews common anti‑scraping methods—from IP and header analysis to behavior detection—and reveals two unconventional defenses: data poisoning and a deposit‑based access model that penalize malicious bots.

AIData ProtectionWeb Scraping
0 likes · 5 min read
How to Outsmart AI-Powered Web Scrapers: Two Powerful Anti‑Crawling Tricks
Architects' Tech Alliance
Architects' Tech Alliance
Nov 3, 2015 · Cloud Computing

How XenServer Handles Data Protection, Backup, and Disaster Recovery

This article explains XenServer's high‑performance virtualization features, OVF/OVA export capabilities, snapshot‑based backup methods, disaster‑recovery replication, XenCenter management console functions, integration with Microsoft System Center, and the open XenAPI that enables third‑party automation.

BackupData ProtectionVirtualization
0 likes · 5 min read
How XenServer Handles Data Protection, Backup, and Disaster Recovery
Efficient Ops
Efficient Ops
Oct 7, 2015 · Information Security

Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

The article explores the essence of information security by comparing it to safeguarding personal money, detailing the four fundamental attributes—confidentiality, integrity, availability, and controllability—and illustrating how different conditions shape security needs, from personal to enterprise contexts.

AvailabilityData Protectionconfidentiality
0 likes · 13 min read
Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained