Tagged articles
260 articles
Page 1 of 3
DataFunSummit
DataFunSummit
May 16, 2026 · Industry Insights

How SelectDB Powers a Next‑Gen Real‑Time Data Warehouse for Banks

The article analyses the structural mismatch between banks' demand for instant data‑driven decisions and their legacy, component‑heavy architectures, then details how SelectDB’s high‑performance, unified MPP engine, schema‑change agility, and financial‑grade security enable a real‑time data‑warehouse platform that supports diverse banking scenarios from dashboards to fraud detection.

AI integrationDataMindMPP engine
0 likes · 19 min read
How SelectDB Powers a Next‑Gen Real‑Time Data Warehouse for Banks
Black & White Path
Black & White Path
Apr 28, 2026 · Industry Insights

Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data

In September 2024, a Beijing algorithm engineer illegally accessed his company's server cluster, executed a notorious delete command that erased over 89 TB of AI training data and 3D model assets, causing system paralysis and more than 200,000 yuan in losses, and was sentenced to five years and ten months in prison for destroying a computer information system.

AIcomputer crimedata deletion
0 likes · 4 min read
Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data
Black & White Path
Black & White Path
Apr 24, 2026 · Industry Insights

Why Some Chinese Banks Face Dual Penalties for Cybersecurity Violations and Their Staff Are Also Fined

In April 2026, the People's Bank of China Xinjiang branch fined Hami City Commercial Bank 3.836 million yuan for multiple regulatory breaches, including cybersecurity and data‑security violations, and also fined two of its technology staff members, illustrating a growing trend of dual penalties for banks and their tech personnel in China.

Chinabanking regulationcybersecurity
0 likes · 4 min read
Why Some Chinese Banks Face Dual Penalties for Cybersecurity Violations and Their Staff Are Also Fined
Java Tech Enthusiast
Java Tech Enthusiast
Mar 30, 2026 · Operations

6 Surprisingly Useful Windows Terminal Commands You Should Master

Discover six quirky yet practical Windows Terminal commands—from visualizing directory trees and monitoring network connections to securely wiping free space, tracing routes, fetching jokes via curl, and enabling speech synthesis—each explained with usage tips, parameters, and real‑world examples to boost your Windows productivity.

AutomationNetworkingPowerShell
0 likes · 10 min read
6 Surprisingly Useful Windows Terminal Commands You Should Master
Black & White Path
Black & White Path
Feb 11, 2026 · Information Security

New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge

The new “Automotive Data Outbound Security Guidelines (2026)” issued by MIIT and other ministries seeks to balance data security with cross‑border flow, defining a two‑layer demand, detailing data categories, assessment, contracts, certification, and protection measures, and signalling a massive market opportunity for data‑security services in the automotive industry.

Regulatory ComplianceVulnerability Managementautomotive
0 likes · 15 min read
New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge
dbaplus Community
dbaplus Community
Jan 21, 2026 · Information Security

How Large Language Models Transform Data Security: Frameworks, Challenges, and Real-World Practices

This article reviews the current state, feasibility, industry adoption, concrete deployment scenarios, and future directions of applying large language models to data security, covering technical challenges, architectural designs, prompt engineering, privacy‑preserving techniques, and practical case studies.

AI applicationsLLM engineeringPrivacy Computing
0 likes · 21 min read
How Large Language Models Transform Data Security: Frameworks, Challenges, and Real-World Practices
SpringMeng
SpringMeng
Dec 27, 2025 · Industry Insights

Why Another Tech Giant Is Banning the Cursor AI Coding Tool

Major tech firms including ByteDance, Microsoft, and Amazon are banning the AI coding assistant Cursor over concerns that it uploads proprietary code to cloud models, posing data leakage and potential remote control risks, highlighting a broader industry shift from efficiency‑driven AI tools to security‑first policies.

AI coding toolsAmazonByteDance
0 likes · 5 min read
Why Another Tech Giant Is Banning the Cursor AI Coding Tool
AntTech
AntTech
Nov 3, 2025 · Information Security

What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?

The IEEE 3169‑2025 standard, led by Ant Group, introduces a unified five‑level security grading framework for privacy‑preserving computation across technologies like MPC, federated learning and TEEs, detailing attack‑defense effectiveness, information leakage categories, and additional metrics to guide secure data‑flow implementations.

IEEE 3169data securityinformation security
0 likes · 6 min read
What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?
IT Services Circle
IT Services Circle
Oct 12, 2025 · Fundamentals

How QR Codes Power Our Daily Life: From Barcodes to Secure Digital Interactions

QR codes, evolving from simple barcodes, now serve as a universal bridge between the physical and digital worlds, enabling rapid data capture, secure transactions, and massive industrial tracking, while their design, error correction, and standards ensure reliability across billions of daily scans worldwide.

Error CorrectionQR codeTechnology History
0 likes · 11 min read
How QR Codes Power Our Daily Life: From Barcodes to Secure Digital Interactions
Old Zhao – Management Systems Only
Old Zhao – Management Systems Only
Oct 4, 2025 · Cloud Computing

Should Your SME Adopt a Cloud Inventory System? Pros, Cons, and Decision Guide

This article examines why small‑and‑medium businesses consider cloud‑based inventory solutions, outlines their key benefits such as real‑time data sharing and finance‑business integration, highlights risks like data security and limited customization, and provides practical criteria for deciding whether a cloud inventory system fits your company.

Digital TransformationSMESaaS
0 likes · 7 min read
Should Your SME Adopt a Cloud Inventory System? Pros, Cons, and Decision Guide
Alimama Tech
Alimama Tech
Sep 24, 2025 · Information Security

Differential Privacy Explained: Theory, Techniques, and Real-World AI Deployments

This article provides a comprehensive overview of differential privacy, covering its mathematical foundations, evolution from theory to engineering, classification of privacy mechanisms, practical implementation cases such as Alibaba's Secure Data Hub, and diverse application scenarios across healthcare, finance, location analytics, and energy forecasting.

AI complianceFederated LearningNoise Mechanisms
0 likes · 23 min read
Differential Privacy Explained: Theory, Techniques, and Real-World AI Deployments
Software Development Quality
Software Development Quality
Aug 21, 2025 · Information Security

Essential Data Security Red Lines: What Every Employee Must Follow

This document outlines the background, scope, key definitions, and strict data security red lines that all employees must adhere to, including prohibitions on bypassing security measures, unauthorized data use, external disclosures, cross‑border transfers, and requirements for handling sensitive information.

Data Protectioncompliancedata security
0 likes · 4 min read
Essential Data Security Red Lines: What Every Employee Must Follow
Alimama Tech
Alimama Tech
Aug 13, 2025 · Information Security

How Private Set Operations Secure Data Collaboration in the Big Data Era

Private Set Operations (PSO) enable multiple parties to perform set intersections, unions, and related computations on encrypted data, preserving privacy through cryptographic techniques such as public‑key encryption, oblivious transfer, and garbled circuits, and are applied across advertising, finance, healthcare, and government for secure data collaboration.

AdvertisingPrivacy Computingcryptography
0 likes · 20 min read
How Private Set Operations Secure Data Collaboration in the Big Data Era
Zhongtong Tech
Zhongtong Tech
Aug 13, 2025 · Artificial Intelligence

Unlock Seamless AI‑Tool Interaction with the Model Context Protocol (MCP)

The Model Context Protocol (MCP) is an open‑source interface that standardizes how large language models interact with external data sources and tools, offering a USB‑C‑like universal connector for AI applications, with built‑in session management, security, and flexible HTTP/SSE transport for seamless real‑world integration.

AI integrationLLMMCP
0 likes · 7 min read
Unlock Seamless AI‑Tool Interaction with the Model Context Protocol (MCP)
Java Web Project
Java Web Project
Aug 4, 2025 · Databases

Why Docker May Not Be Ideal for MySQL: N Critical Reasons Explained

The article analyzes why running MySQL in Docker containers can cause data‑security risks, performance bottlenecks, state management problems, and insufficient resource isolation, while also outlining scenarios where containerization might still be viable.

DockerResource Isolationcontainerization
0 likes · 8 min read
Why Docker May Not Be Ideal for MySQL: N Critical Reasons Explained
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Aug 1, 2025 · Information Security

How MaxCompute Revamped Enterprise Permissions for Secure Data Migration

This article details how a Southeast Asian tech giant migrated from Google BigQuery to Alibaba Cloud MaxCompute, redesigning its permission architecture with multi‑level access control, namespace‑based hierarchies, role inheritance, policy‑tag driven dynamic data masking, and cross‑account user management to meet strict security and compliance requirements.

Cross-AccountDynamic MaskingMaxCompute
0 likes · 21 min read
How MaxCompute Revamped Enterprise Permissions for Secure Data Migration
Bilibili Tech
Bilibili Tech
Jul 25, 2025 · Big Data

How Unified Metadata Lineage Transforms Big Data Governance and Security

This article introduces the comprehensive design and evolution of a unified metadata lineage platform for big data, covering background, data processing chain, lineage models, system architecture, quality metrics, application scenarios, and future plans to enhance data governance, quality, and security.

Big DataData GovernanceData Quality
0 likes · 27 min read
How Unified Metadata Lineage Transforms Big Data Governance and Security
AntTech
AntTech
Jul 18, 2025 · Artificial Intelligence

Explore the 2025 CCF‑Ant Research Fund: 50 Cutting‑Edge Projects in AI, Security & Computing

The CCF‑Ant Research Fund 2025, now open for its first batch, invites global university and institute researchers to apply by August 25 2025 for up to 50 projects spanning data security, hardware‑software co‑design, supercomputing, and artificial intelligence, with detailed topics, eligibility rules, and submission channels provided.

High‑performance computingResearch Fundingdata security
0 likes · 11 min read
Explore the 2025 CCF‑Ant Research Fund: 50 Cutting‑Edge Projects in AI, Security & Computing
Huolala Tech
Huolala Tech
May 20, 2025 · Information Security

How Huolala Built a Comprehensive Data Security Compliance Framework with AI

Huolala, a major internet freight platform, outlines its multi‑layered data security compliance system—covering national standards, industry regulations, organizational structures, technical safeguards, lifecycle management, incident response, audits, and AI‑driven maturity models—to ensure robust protection of personal and critical business data.

AIcloud computingdata security
0 likes · 11 min read
How Huolala Built a Comprehensive Data Security Compliance Framework with AI
Mingyi World Elasticsearch
Mingyi World Elasticsearch
May 20, 2025 · Databases

Presenting Easysearch: A Scientific, Cost‑Effective Elasticsearch Alternative for Tender Projects

Easysearch, developed by INFINI Labs as a domestically‑optimized replacement for Elasticsearch 7.10.2, offers high compatibility, enhanced Chinese processing, reduced disk usage, built‑in security, and compliance with Chinese trust‑platform standards, making it a cost‑effective, low‑risk solution for tender‑stage search and analytics.

Chinese text processingEasysearchElasticsearch alternative
0 likes · 9 min read
Presenting Easysearch: A Scientific, Cost‑Effective Elasticsearch Alternative for Tender Projects
DataFunTalk
DataFunTalk
May 2, 2025 · Artificial Intelligence

SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice

The SecretFlow open‑source community and Chengdu Smart City Research Institute co‑host a deep‑tech meetup in Chengdu, featuring leading experts from Ant Group, UESTC, and industry partners who will explore privacy‑computing principles, SPU technology, federated learning, and real‑world financial and governmental use cases through talks and hands‑on workshops.

AIFederated LearningPrivacy Computing
0 likes · 8 min read
SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice
php Courses
php Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Ops Development & AI Practice
Ops Development & AI Practice
Mar 19, 2025 · Artificial Intelligence

How Integrating LLMs with the Model Context Protocol Could Transform AI Workflows

Integrating large language models with the open‑standard Model Context Protocol enables direct access to file systems, databases, and APIs, unlocking use cases such as automated file management, intelligent data analysis, personalized content generation, and task automation, while also raising security, privacy, and maturity challenges for future AI‑human collaboration.

LLMMCPcross-domain
0 likes · 10 min read
How Integrating LLMs with the Model Context Protocol Could Transform AI Workflows
Top Architect
Top Architect
Feb 25, 2025 · Backend Development

Why Docker May Not Be Ideal for Running MySQL: N Reasons and Practical Guidance

The article examines why deploying MySQL in Docker containers can lead to data‑security, performance, state‑management and resource‑isolation problems, outlines mitigation strategies, discusses scenarios where containerization is feasible, and concludes with a call for community discussion while also featuring promotional material for AI‑related services.

Backend DevelopmentDockercontainerization
0 likes · 9 min read
Why Docker May Not Be Ideal for Running MySQL: N Reasons and Practical Guidance
Data Thinking Notes
Data Thinking Notes
Jan 16, 2025 · Big Data

China’s New National Data Infrastructure Blueprint: Shaping the Digital Future

Released by the NDRC, National Data Bureau and MIIT, the 'National Data Infrastructure Construction Guideline' outlines the concept, vision, functions, and architecture of a nationwide data infrastructure, detailing four key pillars—data flow, computing, network support, and security—and sets phased development goals through 2029.

Blockchaindata securitynational data infrastructure
0 likes · 24 min read
China’s New National Data Infrastructure Blueprint: Shaping the Digital Future
php Courses
php Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
AntTech
AntTech
Dec 17, 2024 · Information Security

Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release

The Jiangxi "Secure Computing Industry Summit" convened on December 17, announcing a collaborative "Secure Computing Industry Chain Co‑construction Action" that unites leading institutions to promote privacy‑preserving computation technologies across finance, healthcare, and public data, aiming to safely unlock the value of data assets.

Industry collaborationJiangxiSecure Computing
0 likes · 7 min read
Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release
DataFunSummit
DataFunSummit
Dec 13, 2024 · Big Data

Data Trust as a Solution for Data Element Circulation: Ecosystem Analysis, Policies, and Practices

This article examines data as a key production factor, analyzes the data‑element ecosystem, explains data‑trust concepts and solutions, reviews relevant policies and market structures, and presents domestic and international practices and case studies illustrating how data trusts can facilitate secure, efficient data circulation and fair benefit distribution.

Big DataData AssetsData Market
0 likes · 15 min read
Data Trust as a Solution for Data Element Circulation: Ecosystem Analysis, Policies, and Practices
Huolala Tech
Huolala Tech
Dec 13, 2024 · Backend Development

Building a Scalable, Secure Customer IM System: Architecture & Key Solutions

This article details the design, architecture, and evolution of a self‑developed customer instant‑messaging system, covering its user‑centred philosophy, layered backend structure, technology choices such as WebSocket and Spring WebFlux, and how it solved challenges in gateway design, session storage, message ACK, and queue management to achieve high availability, security, and future‑ready scalability.

Instant MessagingMessage QueueScalable Design
0 likes · 14 min read
Building a Scalable, Secure Customer IM System: Architecture & Key Solutions
Alibaba Cloud Native
Alibaba Cloud Native
Dec 11, 2024 · Information Security

How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud

This guide walks through why enterprises need to scan and protect sensitive log data, explains the regulatory background, and provides a step‑by‑step implementation on Alibaba Cloud using Data Security Center, Logtail, SPL, Ingest Processors, SDKs, StoreView queries and periodic scans to achieve comprehensive data security and governance.

Log Managementcloud-nativedata security
0 likes · 18 min read
How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud
Huolala Tech
Huolala Tech
Dec 5, 2024 · Big Data

Huolala’s Metadata Platform: Scaling Data Lineage, AI Search & Cost Governance

Huolala’s data team details the evolution of its metadata management platform—covering architecture, stages from early Hive‑ETL to real‑time field‑level lineage, AI‑driven smart search, cost‑governance mechanisms, and security classifications—showcasing practical solutions for data discoverability, efficiency, and protection at scale.

AI searchData Lineagecost governance
0 likes · 27 min read
Huolala’s Metadata Platform: Scaling Data Lineage, AI Search & Cost Governance
AntTech
AntTech
Nov 18, 2024 · Information Security

Guidelines for the National Data Standard System: Building Trusted Data Infrastructure and Secure Data Flow Standards

The newly released National Data Standard System Construction Guide outlines a comprehensive framework for data supply, circulation, utilization, and security, emphasizing trusted infrastructure, controlled anonymization, cross‑domain usage control, and unified security assessment to enable safe, efficient data exchange across entities and industries.

controlled anonymizationcross-domain data controldata security
0 likes · 11 min read
Guidelines for the National Data Standard System: Building Trusted Data Infrastructure and Secure Data Flow Standards
DataFunTalk
DataFunTalk
Nov 17, 2024 · Artificial Intelligence

Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform

This presentation reviews recent research on data security and utilization in the large‑model era, covering privacy‑preserving federated learning, knowledge‑transfer techniques, prototype‑based modeling, multi‑model fusion methods such as FuseGen, and introduces the federated knowledge computing platform FLAIR for both horizontal and vertical federated scenarios.

FLAIRFederated LearningKnowledge Transfer
0 likes · 19 min read
Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform
Top Architect
Top Architect
Nov 16, 2024 · Cloud Native

Why Docker May Not Be Suitable for Running MySQL: Data Security, Performance, State, and Resource Isolation Issues

The article examines why deploying MySQL in Docker containers can be problematic, highlighting data‑security risks, performance bottlenecks, state‑management challenges, and limited resource isolation, while also noting specific scenarios where containerizing MySQL might still be viable.

Cloud NativeDockercontainerization
0 likes · 8 min read
Why Docker May Not Be Suitable for Running MySQL: Data Security, Performance, State, and Resource Isolation Issues
AntTech
AntTech
Oct 18, 2024 · Information Security

CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts

The second Confidential Computing Forum at CNCC2024, held on October 26 in Hangzhou, gathers leading experts to discuss TEE‑based secure computing, present cutting‑edge research on confidentiality, side‑channel attacks, collaborative trust, and cryptographic applications, and outlines future directions for data security in the digital economy.

TEEcryptographydata security
0 likes · 10 min read
CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts
Data Thinking Notes
Data Thinking Notes
Oct 14, 2024 · Information Security

12 Critical Data Security Risks Every Enterprise Must Address

From data lifecycle vulnerabilities to inadequate audit coverage, API misconfigurations, weak privileged access, and insufficient encryption, this article outlines twelve common data security risks and their real‑world impacts, helping organizations identify and remediate gaps before breaches occur.

access controlauditdata security
0 likes · 21 min read
12 Critical Data Security Risks Every Enterprise Must Address
AntTech
AntTech
Sep 26, 2024 · Information Security

Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services

On September 25, Hangzhou announced the nation’s first secret‑computing center, offering end‑to‑end encrypted data storage, processing, and exchange to protect privacy while unlocking the value of big‑data across finance, healthcare, urban governance, commerce, and agriculture.

data ecosystemdata securityprivacy-preserving computation
0 likes · 6 min read
Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services
Data Thinking Notes
Data Thinking Notes
Sep 12, 2024 · Information Security

How to Overcome the Top 3 Data Flow Challenges and Secure Your Data Assets

This article outlines the framework for data element circulation, identifies three major security and compliance challenges in data flow, and presents five practical measures plus a six‑step method for incorporating data assets into financial statements to enhance transparency and value.

Big DataData AssetData Flow
0 likes · 10 min read
How to Overcome the Top 3 Data Flow Challenges and Secure Your Data Assets
Data Thinking Notes
Data Thinking Notes
Aug 27, 2024 · Information Security

Understanding Data Security Regulations and Classification Standards

This article presents an overview of data security related regulations, outlines the standards for data classification and grading, and showcases industry-specific classification schemes through illustrative diagrams, providing a concise visual guide for implementing data security measures.

Data GovernanceRegulationsdata classification
0 likes · 2 min read
Understanding Data Security Regulations and Classification Standards
21CTO
21CTO
Aug 23, 2024 · Information Security

Why Do Companies Fail at Data Security? Common Pitfalls and Solutions

This article examines why many enterprises repeatedly suffer data breaches, highlighting common security flaws such as manual permission management, account sharing, lack of least‑privilege, insufficient environment isolation, weak audit logging, and offers practical recommendations to strengthen information security.

Audit loggingZero Trustaccess control
0 likes · 14 min read
Why Do Companies Fail at Data Security? Common Pitfalls and Solutions
Data Thinking Notes
Data Thinking Notes
Aug 20, 2024 · Artificial Intelligence

How Large AI Models Transform Data Governance: Strategies and Challenges

This article explores how the rise of massive AI models reshapes data governance, detailing model fundamentals, architectural types, emerging challenges, a five‑domain governance framework, and practical AI‑driven applications for data standards, metadata, quality, and security, while also looking ahead to future trends.

AIData GovernanceData Quality
0 likes · 14 min read
How Large AI Models Transform Data Governance: Strategies and Challenges
DataFunSummit
DataFunSummit
Aug 20, 2024 · Artificial Intelligence

Applying Large Language Models to Intelligent Telemarketing: Evolution, Architecture, and Future Outlook

This article reviews the evolution of telephone sales, introduces large model technologies, outlines their integration into intelligent telemarketing workflows, discusses practical implementation methods, challenges, and future trends, and shares insights from industry experts on optimizing AI‑driven sales automation.

AITelemarketingcustomer experience
0 likes · 17 min read
Applying Large Language Models to Intelligent Telemarketing: Evolution, Architecture, and Future Outlook
AntTech
AntTech
Aug 19, 2024 · Information Security

From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference

At the 2024 China Cryptography Society Cryptographic Chip Academic Conference in Chengdu, Ant Group’s Vice President Wei Tao highlighted the evolution from general to intelligent to secure computing, emphasizing the pivotal role of cryptographic chips in data protection, AI development, and cross‑industry applications while calling for deeper industry‑academia collaboration.

AIPrivacy Computingcryptographic chips
0 likes · 8 min read
From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference
Data Thinking Notes
Data Thinking Notes
Aug 12, 2024 · Information Security

Understanding Data Governance vs Data Security Governance: Key Frameworks Explained

This article explains how data has become a strategic resource, outlines the economic and industrial value of data, differentiates data governance from data security governance, and reviews major data security frameworks and a data‑centric security architecture to guide organizations in protecting their data assets.

Data GovernanceData Lifecycledata security
0 likes · 12 min read
Understanding Data Governance vs Data Security Governance: Key Frameworks Explained
Bilibili Tech
Bilibili Tech
Aug 2, 2024 · Information Security

Security Development Lifecycle (SDL) at Bilibili: Implementation, Data Lifecycle Security, and DevSecOps

At Bilibili, the security team adapted Microsoft’s Security Development Lifecycle by establishing capability practices such as training, threat modeling, secure coding, and component scanning, integrating these processes into development pipelines through dedicated business partners, extending protection to the full data lifecycle, and evolving toward automated DevSecOps with in‑pipeline DAST and a custom vulnerability management platform.

Application SecurityDASTDevSecOps
0 likes · 15 min read
Security Development Lifecycle (SDL) at Bilibili: Implementation, Data Lifecycle Security, and DevSecOps
php Courses
php Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

HTTPSasymmetric encryptiondata security
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Data Thinking Notes
Data Thinking Notes
Jul 30, 2024 · Information Security

Mastering Data Classification: A Practical Guide to Secure Data Grading

This article outlines the evolution of data security in China, explains why data classification and grading are central to governance, and provides a step‑by‑step framework, principles, implementation details, adjustment triggers, and practical reflections for building effective data protection strategies.

Data Governancecompliancedata classification
0 likes · 11 min read
Mastering Data Classification: A Practical Guide to Secure Data Grading
Data Thinking Notes
Data Thinking Notes
Jul 25, 2024 · Information Security

How Large Language Models Transform Data Security Compliance Management

This article explains how a leading insurance technology group leverages large language models to streamline data security compliance, detailing the evolution of data management, key governance challenges, multimodal AI architecture, and practical workflows for policy enforcement, risk monitoring, and asset management.

AIData Governancecompliance
0 likes · 10 min read
How Large Language Models Transform Data Security Compliance Management
Data Thinking Notes
Data Thinking Notes
Jul 16, 2024 · Information Security

How to Build an Effective Data Security Operations Metrics System

Data security, centered on the full data lifecycle, demands deep defense against dynamic, continuous risks; by adopting a new operational mindset and a comprehensive metrics system, organizations can achieve greater visibility, control, sustainability, and trustworthiness in protecting their data assets.

Data Lifecycledata securityinformation security
0 likes · 3 min read
How to Build an Effective Data Security Operations Metrics System
AntTech
AntTech
Jul 7, 2024 · Information Security

2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models

The 2024 WAIC Privacy Computing Forum gathered leading experts from academia and industry to discuss how encryption, anonymization, and secure multi‑party computation can protect data privacy while enabling large‑model training and inference, highlighting technical challenges, standards, and emerging solutions across AI, big data, and information security domains.

AIMPCPrivacy Computing
0 likes · 15 min read
2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models
Architecture Digest
Architecture Digest
Jun 30, 2024 · Cloud Native

Why Docker May Not Be Suitable for Running MySQL: N Reasons Explained

The article analyzes why deploying MySQL in Docker containers can lead to data‑security, performance, state‑management and resource‑isolation problems, while also outlining scenarios where containerizing MySQL might be feasible and offering practical mitigation strategies.

DockerResource Isolationcontainerization
0 likes · 6 min read
Why Docker May Not Be Suitable for Running MySQL: N Reasons Explained
DataFunTalk
DataFunTalk
Jun 27, 2024 · Big Data

Data Warehouse Construction and Data Governance Practices at Wing Payment

This presentation by senior data warehouse engineer Huang Luo details Wing Payment’s end‑to‑end data warehouse build, covering background challenges, governance framework, platform architecture, layered modeling, naming standards, asset management, monitoring, and future plans, illustrating how systematic data governance drives cost reduction, efficiency, and security.

AnalyticsBig DataData Governance
0 likes · 14 min read
Data Warehouse Construction and Data Governance Practices at Wing Payment
AntTech
AntTech
Jun 13, 2024 · Information Security

Privacy Computing Technology Theory and Practice – Highlights from the National Data Bureau’s 2024 Data Lecture Series

The National Data Bureau’s June 12, 2024 Data Lecture Hall focused on privacy computing technology theory and practice, featuring expert talks, emphasizing secure yet usable data sharing to boost the digital economy, and gathering over 110 officials and specialists to discuss challenges and solutions.

ChinaDigital EconomyPrivacy Computing
0 likes · 3 min read
Privacy Computing Technology Theory and Practice – Highlights from the National Data Bureau’s 2024 Data Lecture Series
Data Thinking Notes
Data Thinking Notes
May 28, 2024 · Information Security

What Can Government Data Security Standards Teach Other Industries?

The article outlines a comprehensive government data processing security framework—including management, technical, personal information protection, operational, regulatory, and assessment requirements—that offers reusable, practical guidance for data security across various sectors.

data securitygovernment standardsprivacy protection
0 likes · 4 min read
What Can Government Data Security Standards Teach Other Industries?
Data Thinking Notes
Data Thinking Notes
May 16, 2024 · Information Security

How a Data Security Governance Platform Secures the Full Data Lifecycle

This article explains how a data security governance platform protects data across its entire lifecycle—from warehouse construction and collection to application—by implementing fine‑grained permission controls, encryption, masking, authentication, and comprehensive auditing, while addressing scalability, high availability, and regulatory compliance challenges.

AuthenticationAuthorizationBig Data
0 likes · 13 min read
How a Data Security Governance Platform Secures the Full Data Lifecycle
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureMicrosoft Dynamics 365RBAC
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Data Thinking Notes
Data Thinking Notes
May 7, 2024 · Information Security

What the New GB/T 43697‑2024 Standard Means for Data Classification and Security

The Chinese national standard GB/T 43697‑2024 on Data Security Technology – Data Classification and Grading Rules has been officially released, providing universal classification guidelines and set to take effect on October 1 2024, offering essential direction for implementing data classification and grading management.

GB/T 43697-2024data classificationdata security
0 likes · 1 min read
What the New GB/T 43697‑2024 Standard Means for Data Classification and Security
Data Thinking Notes
Data Thinking Notes
Apr 25, 2024 · Fundamentals

Mastering Data Governance: Build High‑Quality, Secure, Traceable Business Data

This article explains how a comprehensive data governance framework—covering data quality, metadata, master data, asset management, security, and standards—can ensure high‑quality, safe, and traceable business data while outlining implementation steps, organizational roles, platform features, and assessment methods.

Data GovernanceData QualityMaster Data
0 likes · 12 min read
Mastering Data Governance: Build High‑Quality, Secure, Traceable Business Data
Architecture & Thinking
Architecture & Thinking
Apr 21, 2024 · Backend Development

How to Ensure Reliability, Ordering, and Security in Billion‑User IM Systems

This article explores the key challenges of building a large‑scale instant‑messaging service—including message reliability, ordering, read‑sync, data security, avalanche effects, and weak‑network handling—and presents practical architectural and algorithmic solutions for each problem.

Backend ArchitectureInstant MessagingMessage Ordering
0 likes · 21 min read
How to Ensure Reliability, Ordering, and Security in Billion‑User IM Systems
Data Thinking Notes
Data Thinking Notes
Apr 18, 2024 · Information Security

How to Implement Effective Data Classification and Grading for Secure Data Management

Data classification and grading, essential components of data security governance, involve defining data categories, assigning sensitivity levels, adhering to national standards, and establishing organizational processes to ensure compliant, secure, and value‑driven data handling across enterprises.

Data GovernanceData Managementdata classification
0 likes · 20 min read
How to Implement Effective Data Classification and Grading for Secure Data Management
360 Tech Engineering
360 Tech Engineering
Mar 28, 2024 · Artificial Intelligence

Interview with Yin Yuhui on 360 Intelligent Document Cloud: AI‑Driven Knowledge Management and Security

In this interview, 360 Group’s Vice President of Technology Yin Yuhui discusses how the company’s Intelligent Document Cloud leverages large‑model AI to transform enterprise knowledge management, enhance data security, and deliver innovative SaaS and private‑cloud solutions for businesses of all sizes.

AIDocument CloudEnterprise AI
0 likes · 15 min read
Interview with Yin Yuhui on 360 Intelligent Document Cloud: AI‑Driven Knowledge Management and Security
DataFunSummit
DataFunSummit
Mar 18, 2024 · Big Data

Scenario‑Based Data Governance Practices in the Securities Industry

This article presents a comprehensive, scenario-driven data governance practice at Guoxin Securities, covering the industry's pain points, a three‑layer governance framework, detailed implementations for data standards, metadata, data quality, data modeling, and data security, and outlines future directions for intelligent and measurable governance.

Big DataData Qualitydata security
0 likes · 30 min read
Scenario‑Based Data Governance Practices in the Securities Industry
AntTech
AntTech
Mar 2, 2024 · Information Security

IEEE Releases First Global Standard for Privacy Computing Integrated Machine (IEEE 3156-2023)

The IEEE Standards Association has published the world’s first privacy‑computing integrated‑machine standard (IEEE 3156‑2023), highlighting China’s leadership in privacy‑preserving data technologies and outlining hardware, software, and security requirements that aim to foster global adoption and reduce collaboration costs.

Ant GroupIEEE StandardIntegrated Machine
0 likes · 4 min read
IEEE Releases First Global Standard for Privacy Computing Integrated Machine (IEEE 3156-2023)
Data Thinking Notes
Data Thinking Notes
Feb 27, 2024 · Information Security

How to Build an Effective Enterprise Data Security Governance System

This article explores enterprise data security governance, outlining practical methodologies, implementation pathways, and real-world case studies to guide organizations in planning and establishing robust data security governance frameworks while highlighting key challenges, compliance considerations, and measurable outcomes for sustained protection.

Enterprisecompliancedata security
0 likes · 2 min read
How to Build an Effective Enterprise Data Security Governance System
AsiaInfo Technology: New Tech Exploration
AsiaInfo Technology: New Tech Exploration
Feb 23, 2024 · Industry Insights

How Trusted Execution Environments are Shaping Data Security and Privacy Computing

The article examines the rapid growth of China's digital economy, the rising demand for secure data circulation, and how Trusted Execution Environments (TEE) are evolving through hardware and software advances, interoperability efforts, and large‑model privacy solutions to address emerging security challenges.

Privacy ComputingSecure ComputingTEE
0 likes · 17 min read
How Trusted Execution Environments are Shaping Data Security and Privacy Computing
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 2, 2024 · Information Security

iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT

iQIYI's proactive compliance risk disposal platform and full‑lifecycle privacy protection scheme were recognized by MIIT as outstanding cases, showcasing engineering‑driven privacy integration across product development, release, and operation, improving compliance rates, reducing risks, and enhancing user experience while setting industry standards.

compliancedata securityiQIYI
0 likes · 8 min read
iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT
JD Cloud Developers
JD Cloud Developers
Jan 24, 2024 · Artificial Intelligence

How JD Retail’s AI Innovations Are Transforming Supply Chains, Advertising, and E‑Commerce

Over the past year JD Retail’s technology team has rolled out a suite of AI‑driven breakthroughs—from end‑to‑end inventory management and explainable AI in supply chain, to large‑language‑model frameworks, advanced advertising, edge‑AI, secure data platforms, and high‑quality 3D modeling—earning industry awards and boosting efficiency across e‑commerce.

3D ModelingAIEdge Computing
0 likes · 21 min read
How JD Retail’s AI Innovations Are Transforming Supply Chains, Advertising, and E‑Commerce
JD Tech
JD Tech
Jan 24, 2024 · Artificial Intelligence

JD Retail Technology 2023 Highlights: AI‑Driven Supply Chain, Large Language Models, Edge AI, Data Security, and 3D Modeling Innovations

In 2023 JD Retail’s technology team delivered a suite of AI‑powered innovations—including end‑to‑end inventory management, explainable AI for supply chain, privacy‑preserving advertising models, a ReAct‑SFT‑RAG large language model framework, edge AI inference, secure data‑safe‑house infrastructure, and high‑quality 3D modeling pipelines—demonstrating broad academic and industrial impact across multiple domains.

3D ModelingAIGCEdge Computing
0 likes · 19 min read
JD Retail Technology 2023 Highlights: AI‑Driven Supply Chain, Large Language Models, Edge AI, Data Security, and 3D Modeling Innovations
JD Retail Technology
JD Retail Technology
Jan 23, 2024 · Artificial Intelligence

JD Retail Technology 2023: AI‑Driven Supply Chain, Advertising, Edge AI, Data Security, and 3D Modeling Innovations

In 2023 JD Retail Technology showcased a series of AI‑powered innovations—including end‑to‑end inventory management, explainable AI for supply chain, large‑language‑model frameworks, edge‑device inference, data‑security "security house", and high‑quality 3D modeling—demonstrating how advanced algorithms and large‑scale computing boost efficiency, accuracy, and user experience across the e‑commerce ecosystem.

3D ModelingEdge Computingartificial intelligence
0 likes · 20 min read
JD Retail Technology 2023: AI‑Driven Supply Chain, Advertising, Edge AI, Data Security, and 3D Modeling Innovations
政采云技术
政采云技术
Jan 23, 2024 · Big Data

Design and Implementation of a Big Data Permission Management System

This article outlines the background, importance, scenarios, challenges, objectives, and architectural design—including RBAC and ABAC models, metadata integration, data classification, and verification mechanisms—of a comprehensive big data permission management system for secure and fine‑grained data access.

ABACBig DataRBAC
0 likes · 14 min read
Design and Implementation of a Big Data Permission Management System
Liangxu Linux
Liangxu Linux
Jan 8, 2024 · Information Security

How Visible Is Your IP Location? Risks, Regulations, and Protection Tips

Since 2021 Chinese platforms have begun displaying users' IP location down to the province or country, sparking privacy debates, legal scrutiny, and practical advice on how IP addresses work, what data they reveal, and how individuals can safeguard their online anonymity.

IP addressdata securitynetwork fundamentals
0 likes · 11 min read
How Visible Is Your IP Location? Risks, Regulations, and Protection Tips
ITPUB
ITPUB
Dec 27, 2023 · Operations

When a Snapshot Share Became a Data Leak: Lessons from a Cloud Ops Failure

A developer mistakenly set a cloud disk snapshot to public, exposing a major client’s data, and recounts the frantic rollback, the ensuing panic among teammates, and the hard‑won operational lessons about high‑risk manual tasks, proper safeguards, and the need for visualized tooling.

Operationsdata securityincident response
0 likes · 10 min read
When a Snapshot Share Became a Data Leak: Lessons from a Cloud Ops Failure
Alimama Tech
Alimama Tech
Dec 21, 2023 · Information Security

Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising

Alibaba Mama’s Secure Data Hub delivers a privacy‑enhanced clean‑room for advertising by combining multi‑party computation, federated learning and differential privacy with encrypted operators on a Flink engine, offering cloud‑agnostic, scalable deployment that enables cross‑domain analytics while protecting raw user data and boosting ROI.

Federated LearningPrivacy Computingadvertising analytics
0 likes · 13 min read
Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising
Zhuanzhuan Tech
Zhuanzhuan Tech
Dec 20, 2023 · Big Data

Design and Implementation of Zhaozhuan One-Service Unified Data Query Platform

This article describes the evolution of Zhaozhuan's data services, the design and architecture of the One-Service unified query platform supporting multiple storage engines, its security and intelligent query features, and future plans for finer-grained permission control, multi‑engine support, online service isolation, and improved usability.

Big DataOLAPUnified query
0 likes · 15 min read
Design and Implementation of Zhaozhuan One-Service Unified Data Query Platform
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Dec 13, 2023 · Information Security

XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation

XiaoHongShu’s award‑winning Zero‑Trust SASE Office Security Solution integrates all‑in‑one DLP, anti‑virus, identity‑bound access and distributed POPs to replace fragmented agents, delivering real‑time risk control, data‑non‑landing protection, multi‑level disaster recovery, and achieving 100% device coverage, an 80% reduction in data leakage and a 70% internal NPS after one year.

Office SecuritySASESecurity Architecture
0 likes · 14 min read
XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation
AntTech
AntTech
Dec 12, 2023 · Information Security

Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank

This article presents a detailed case study of how Jiangsu Bank and Ningbo Bank leveraged Ant Group’s multi‑party secure computation platform and the “YinYu” privacy‑computing framework to build joint risk‑control models, enhancing data sharing, security, and approval rates for inclusive finance.

Inclusive FinanceMPCPrivacy Computing
0 likes · 9 min read
Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank
Alimama Tech
Alimama Tech
Dec 7, 2023 · Industry Insights

How Privacy Computing Enables Cross‑Domain Ad Tracking and Asset Analysis

The 2023 Big Data “Galaxy” case competition highlighted Alibaba Mama and Jiahe Tech’s privacy‑computing based cross‑domain advertising tracking and whole‑domain asset analysis as an outstanding example, detailing the Secure Data Hub platform, its use of multi‑party secure computation, federated learning, differential privacy, and the resulting improvements in data flow, compliance, and marketing efficiency.

Privacy Computingadvertising analyticscross-domain tracking
0 likes · 6 min read
How Privacy Computing Enables Cross‑Domain Ad Tracking and Asset Analysis
php Courses
php Courses
Nov 24, 2023 · Information Security

Using PHP Encryption Functions for Secure Data Transmission

This article explains how PHP's built-in encryption functions such as md5, sha1, base64_encode/decode, and openssl_encrypt/decrypt can be used to secure data transmission, provides code examples demonstrating AES‑128‑CBC encryption and decryption, and highlights their role in protecting sensitive information.

Backend DevelopmentPHPdata security
0 likes · 4 min read
Using PHP Encryption Functions for Secure Data Transmission
Architect
Architect
Nov 17, 2023 · Information Security

A Real-World Incident of Accidental Public Snapshot Sharing and Lessons Learned

The author recounts a 2018 incident where a cloud disk snapshot was unintentionally made public, exposing customer data, and shares a detailed reflection on the operational mistakes, risk management failures, and recommended safeguards for high‑risk cloud operations.

cloud computingdata securityincident response
0 likes · 9 min read
A Real-World Incident of Accidental Public Snapshot Sharing and Lessons Learned
DataFunSummit
DataFunSummit
Nov 8, 2023 · Blockchain

Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank

This article presents WeBank's exploration of privacy‑computing technologies combined with blockchain to enable secure, compliant data flow across enterprises, detailing the regulatory background, technical architectures, key use‑case scenarios such as anonymous query, privacy intersection, joint prediction and statistics, and real‑world deployments including the 2022 Big Data “Star River” benchmark cases.

BlockchainPrivacy ComputingWeBank
0 likes · 16 min read
Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank
AntTech
AntTech
Nov 6, 2023 · Information Security

Enterprise Security Compliance Intelligent Certification Wins 2023 China Qualified Assessment Science and Technology Award (Second Prize)

On October 31, the joint Ant Group and China Software Testing Center project "Enterprise Security Compliance Intelligent Certification Key Technologies Research and Application" received the 2023 China Qualified Assessment Science and Technology Award second prize, marking the first time a technology enterprise has earned this top honor in the qualified assessment field and highlighting its breakthroughs in data and network security, automated risk assessment, and large‑scale certification deployment across major financial and tech institutions.

AwardEnterprisecertification
0 likes · 4 min read
Enterprise Security Compliance Intelligent Certification Wins 2023 China Qualified Assessment Science and Technology Award (Second Prize)
Open Source Tech Hub
Open Source Tech Hub
Nov 5, 2023 · Information Security

Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide

This guide explains fundamental data encryption concepts, introduces PHP's openssl_encrypt function, compares common encryption modes, shows how to generate keys and initialization vectors, and provides a complete SM4‑CBC implementation with sample code and practical security precautions.

OpenSSLPHPSM4
0 likes · 8 min read
Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide