Tagged articles
260 articles
Page 2 of 3
Data Thinking Notes
Data Thinking Notes
Oct 31, 2023 · Information Security

Why Data Classification & Grading Is Critical for Enterprise Security

This article explains the legal and strategic importance of data classification and grading in China, outlines the relevant regulations, describes the principles and processes for implementing classification, and offers practical steps for enterprises to secure data while meeting compliance and business needs.

Data GovernanceEnterprise Compliancedata classification
0 likes · 11 min read
Why Data Classification & Grading Is Critical for Enterprise Security
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 16, 2023 · Databases

The Evolving Role of Database Administrators: Challenges, Changes, and Future Trends (2023)

The article examines how the responsibilities of database administrators are shifting due to massive data volumes, heightened security concerns, cloud adoption, DevOps integration, and emerging AI and IoT technologies, outlining current challenges, recent changes, and key trends shaping the DBA profession.

DBADatabase AdministrationIoT
0 likes · 7 min read
The Evolving Role of Database Administrators: Challenges, Changes, and Future Trends (2023)
php Courses
php Courses
Oct 11, 2023 · Information Security

Best Practices for Data Security and Encryption in PHP Development

This article explains essential PHP techniques—including HTTPS, password hashing, prepared statements, encryption algorithms, and captchas—along with practical code examples to help developers protect sensitive data from attacks and leaks.

CaptchaPHPPrepared Statements
0 likes · 4 min read
Best Practices for Data Security and Encryption in PHP Development
Data Thinking Notes
Data Thinking Notes
Sep 24, 2023 · Information Security

How to Build a Robust Data Security Governance Framework: Steps & Best Practices

Data security governance, essential for modern enterprises, involves classifying and authorizing data, implementing scenario-based protections, and establishing comprehensive frameworks that address compliance, asset management, process control, and continuous improvement, guiding organizations through strategic planning, organizational structuring, policy creation, and ongoing operational monitoring.

Frameworkcompliancedata security
0 likes · 15 min read
How to Build a Robust Data Security Governance Framework: Steps & Best Practices
SQB Blog
SQB Blog
Sep 6, 2023 · Operations

How to Build an Efficient, Secure Test Data Management System for DevOps

This article examines the challenges of test data generation in fast‑moving software projects and presents a self‑developed Test Data Management solution that balances efficiency, usability, security, quality, generality, and cost through adaptive concurrency control, masking policies, and a multi‑master architecture.

Concurrency ControlDevOpsSoftware Testing
0 likes · 15 min read
How to Build an Efficient, Secure Test Data Management System for DevOps
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

MPCcryptographydata security
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
Data Thinking Notes
Data Thinking Notes
Aug 30, 2023 · Fundamentals

Mastering Data Governance: A Complete Guide to Metadata, Standards, Quality, and Security

Data governance encompasses a comprehensive framework—including metadata, master data, standards, quality, assets, exchange, security, and lifecycle management—to ensure data’s accuracy, consistency, and value across an organization, offering step‑by‑step guidance, best‑practice models, and visual references for effective implementation.

Data GovernanceData LifecycleData Quality
0 likes · 19 min read
Mastering Data Governance: A Complete Guide to Metadata, Standards, Quality, and Security
DataFunSummit
DataFunSummit
Aug 21, 2023 · Big Data

Data-Driven Data Governance and Asset Health Scoring at Xiaomi

This article presents Xiaomi's data‑driven governance framework, detailing a three‑level "rocket" plan, the asset health scoring model covering storage, compute, quality, security and compliance, productization efforts, future enhancements, and a Q&A session on implementation challenges.

Data Governanceasset healthdata security
0 likes · 13 min read
Data-Driven Data Governance and Asset Health Scoring at Xiaomi
DataFunTalk
DataFunTalk
Aug 6, 2023 · Information Security

Data Security Governance and Practices with Alibaba Cloud DataWorks

This article explains how enterprises can implement data security governance in China's digital economy era, covering relevant laws, the essence and direction of data security, Alibaba Cloud DataWorks practices, scenario cases, and a Q&A, offering practical guidance for compliance and risk management.

Alibaba Cloudcompliancedata security
0 likes · 16 min read
Data Security Governance and Practices with Alibaba Cloud DataWorks
AntTech
AntTech
Jul 27, 2023 · Information Security

Privacy Computing Cross‑Platform Interoperability Open Protocol v2.0 (ECDH‑PSI): Overview and Key Enhancements

The article introduces the privacy‑computing open protocol v2.0, explains its technical improvements such as flexible handshake options, point‑compression and ciphertext truncation, and highlights its role in enabling secure cross‑platform data fusion through widely accepted cryptographic algorithms.

ECDH-PSIInteroperabilityPrivacy Computing
0 likes · 6 min read
Privacy Computing Cross‑Platform Interoperability Open Protocol v2.0 (ECDH‑PSI): Overview and Key Enhancements
Weimob Technology Center
Weimob Technology Center
Jul 25, 2023 · Information Security

How to Secure Data: Practical Guide to Masking and Encryption Strategies

This comprehensive guide explains why modern enterprises must shift from network‑centric protection to data‑centric security, detailing practical approaches for data masking and storage encryption, evaluating regulatory requirements, outlining solution selection, and providing step‑by‑step implementation practices to safeguard sensitive information.

compliancedata maskingdata security
0 likes · 29 min read
How to Secure Data: Practical Guide to Masking and Encryption Strategies
DataFunTalk
DataFunTalk
Jul 19, 2023 · Artificial Intelligence

Privacy Computing Practices at China Construction Bank: From External Data Use to an Enterprise‑Grade Platform

This article details China Construction Bank's journey in privacy computing, covering the history of external data usage, early federated learning experiments, rapid demand growth, the construction of an enterprise‑grade privacy computing platform, its design principles, achievements, and future directions.

AIFederated LearningPrivacy Computing
0 likes · 14 min read
Privacy Computing Practices at China Construction Bank: From External Data Use to an Enterprise‑Grade Platform
AntTech
AntTech
Jul 14, 2023 · Information Security

Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework

The SS‑LR open protocol describes a secret‑sharing based logistic regression algorithm split into four layers—machine learning, secure operators, cryptographic protocol, and network transmission—enabling interoperable, privacy‑preserving data flow and secure multi‑party model training across institutions.

Privacy ComputingSS-LRdata security
0 likes · 7 min read
Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework
ZhongAn Tech Team
ZhongAn Tech Team
Jul 14, 2023 · Artificial Intelligence

Exploring AIGC Applications in Insurance: Insights from ZhongAn Insurance CTO Jiang Jiyun

The interview with ZhongAn Insurance CTO Jiang Jiyun discusses how the company leverages AIGC technologies such as large language models, embeddings, and prompt engineering to enhance marketing, intelligent customer service, and data security, while highlighting practical challenges and best practices for AI adoption in the insurance sector.

AIGCEmbeddingPrompt engineering
0 likes · 15 min read
Exploring AIGC Applications in Insurance: Insights from ZhongAn Insurance CTO Jiang Jiyun
AntTech
AntTech
Jul 13, 2023 · Information Security

Data Element Marketization: Balancing Security and Development with Privacy Computing and Trusted Cloud Infrastructure

The article outlines how the rapid marketization of data elements, driven by new AI-driven demands, requires robust security and privacy measures, highlighting Ant Group's multi‑layered approach—including policy alignment, confidential computing services, and cross‑cloud "Confidential Sky Computing"—to enable safe, trustworthy data circulation.

Privacy Computingartificial intelligencecloud computing
0 likes · 17 min read
Data Element Marketization: Balancing Security and Development with Privacy Computing and Trusted Cloud Infrastructure
DataFunSummit
DataFunSummit
Jul 12, 2023 · Big Data

Data Development Production Environment Isolation: Xiaomi's Experience, Technical Choices, and Implementation

This article explains Xiaomi's approach to isolating production environments for data development, covering the evolution of its data platform, the trade‑offs between physical and logical isolation, the productized workflow and security measures, and real‑world outcomes from the deployment.

Data Isolationbig data platformdata security
0 likes · 18 min read
Data Development Production Environment Isolation: Xiaomi's Experience, Technical Choices, and Implementation
AntTech
AntTech
Jul 7, 2023 · Information Security

Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”

At the 2023 World AI Conference summit, Ant Group unveiled its YinYu Open‑Source Framework 1.0 and the HyperEnclave financial‑grade TEE, detailing their technical features, industry‑wide standards contributions, and how they aim to boost the usability, security, and interoperability of privacy computing for AI applications.

AIAnt GroupPrivacy Computing
0 likes · 7 min read
Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”
Data Thinking Notes
Data Thinking Notes
Jul 5, 2023 · Big Data

Top 10 Big Data Trends Shaping China’s Data Industry in 2023

At the 2023 Big Data Industry Development Conference in Beijing, the China Communications Standards Association unveiled the top ten big‑data keywords, highlighting trends such as lake‑warehouse integration, data assetization, DataOps, intelligent analytics, data ethics, security, public data licensing, and cross‑border data flows.

Big DataData EthicsData Governance
0 likes · 16 min read
Top 10 Big Data Trends Shaping China’s Data Industry in 2023
Data Thinking Notes
Data Thinking Notes
Jul 2, 2023 · Big Data

Mastering Data Governance: A Comprehensive Framework for Enterprise Success

This article outlines a complete data governance framework, detailing the five managerial domains—control, process, governance, technology, and value—along with strategies for data strategy, organizational structure, policies, processes, standards, quality, security, and platform tools, and highlights AI’s pivotal role in enhancing governance efficiency.

Big DataData GovernanceData Quality
0 likes · 10 min read
Mastering Data Governance: A Comprehensive Framework for Enterprise Success
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 9, 2023 · Information Security

Linux Disk Encryption Technology: FDE, FBE and eCryptfs Implementation Analysis

This article reviews Linux disk‑encryption technologies, explaining data‑at‑rest security concepts, comparing full‑disk encryption (hardware and dm‑crypt/LUKS) with filesystem‑based encryption (stacked eCryptfs and native fscrypt), and providing an in‑depth analysis of eCryptfs architecture, key management, and implementation details.

FBEFDELinux kernel
0 likes · 20 min read
Linux Disk Encryption Technology: FDE, FBE and eCryptfs Implementation Analysis
Huolala Tech
Huolala Tech
Jun 8, 2023 · Big Data

How Huolala Built a Robust Big Data Security Framework: Lessons and Practices

This article details Huolala's practical experience in constructing a comprehensive big data security system, covering data lifecycle protection, classification standards, capability development, and governance, while balancing regulatory compliance and business growth.

Big DataData Governancecloud infrastructure
0 likes · 10 min read
How Huolala Built a Robust Big Data Security Framework: Lessons and Practices
DevOps
DevOps
May 26, 2023 · Artificial Intelligence

Why ChatGPT Is Facing a Wave of Backlash: Data Security, Misinformation, and Job Displacement Concerns

The article examines the growing controversy surrounding ChatGPT, highlighting data‑security risks, the spread of false information, corporate and governmental restrictions, and fears that AI could displace jobs, while also proposing technical, legislative, and public‑awareness measures to prepare for the AI era.

ChatGPTdata securityjob impact
0 likes · 12 min read
Why ChatGPT Is Facing a Wave of Backlash: Data Security, Misinformation, and Job Displacement Concerns
DataFunSummit
DataFunSummit
May 13, 2023 · Big Data

Expert Interview on Data Governance: Core Domains, Challenges, and Future Trends

In this interview, three data‑governance experts from Tencent, ByteDance, and Alibaba discuss the fundamental processes, core domains such as metadata, data lineage, metric systems, data quality and security, the main challenges they face, and emerging trends like DataOps, AI‑driven automation, and privacy‑preserving technologies.

Data GovernanceData LineageData Quality
0 likes · 14 min read
Expert Interview on Data Governance: Core Domains, Challenges, and Future Trends
AntTech
AntTech
May 12, 2023 · Information Security

Exploring a Composite Data Security Governance System: Practices from Ant Group at the 6th Digital China Summit

At the 6th Digital China Construction Summit in Fuzhou, Ant Group’s Song Zheng presented a comprehensive data security governance framework that integrates strategy, management, and technology, outlining four key characteristics—strategic positioning, combat‑driven implementation, full‑staff participation, and technological breakthrough—to guide industry practice.

data securitydigital Chinainformation security
0 likes · 3 min read
Exploring a Composite Data Security Governance System: Practices from Ant Group at the 6th Digital China Summit
AntTech
AntTech
Apr 28, 2023 · Information Security

Threshold Proxy Re‑Encryption (TPRE) with National Cryptographic Algorithms for Secure Data Sharing

The article explains how cryptographic access control, especially a hybrid‑encrypted Threshold Proxy Re‑Encryption scheme built on national SM2/SM3/SM4 algorithms, offers high‑strength, decentralized, and efficient data authorization and sharing, addressing the limitations of traditional role‑based models.

Distributed Systemsaccess controlcryptography
0 likes · 5 min read
Threshold Proxy Re‑Encryption (TPRE) with National Cryptographic Algorithms for Secure Data Sharing
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Apr 14, 2023 · Information Security

How to Build a Secure Enterprise Data Platform: End‑to‑End Architecture and Controls

This article explains the security risks of enterprise data platforms, analyzes gaps in traditional protection methods, and presents a comprehensive three‑layer security architecture—asset, capability, and control layers—along with pre‑, during‑, and post‑process measures to ensure data safety throughout its lifecycle.

Data GovernanceEnterprise Data PlatformSecurity Architecture
0 likes · 19 min read
How to Build a Secure Enterprise Data Platform: End‑to‑End Architecture and Controls
Liangxu Linux
Liangxu Linux
Mar 13, 2023 · Databases

Why Docker Struggles with MySQL: 5 Key Reasons and Workarounds

The article examines why running MySQL in Docker containers often leads to data‑security, performance, state, and resource‑isolation problems, outlines practical mitigation strategies, and identifies scenarios where containerizing MySQL can still be viable.

Dockercontainerizationdata security
0 likes · 7 min read
Why Docker Struggles with MySQL: 5 Key Reasons and Workarounds
DataFunTalk
DataFunTalk
Mar 10, 2023 · Information Security

Data Security Management Practices and Future Outlook in a Large Commercial Bank

The article outlines a large commercial bank’s understanding of data security, shares its comprehensive management practices—including governance, lifecycle protection, technical support, and industry collaboration—and presents a forward‑looking perspective on future challenges and enhancements in data security.

Financial IndustryPrivacy Computingdata security
0 likes · 16 min read
Data Security Management Practices and Future Outlook in a Large Commercial Bank
Architect's Guide
Architect's Guide
Feb 23, 2023 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods, Pros and Cons

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—silly, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, storage costs, and practical recommendations for secure yet searchable data.

algorithmdata security
0 likes · 12 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods, Pros and Cons
DataFunSummit
DataFunSummit
Feb 15, 2023 · Information Security

Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping

The interview with Alibaba Cloud Datatrust chief architect Liang Aiping examines the early-stage adoption of privacy computing, highlighting low technical challenges in data sources, the gap between theory and engineering in algorithms, complex system management for interoperability, and key product considerations such as security, performance, cost, and deployment.

Privacy ComputingSystem Managementalgorithm evaluation
0 likes · 13 min read
Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping
DataFunSummit
DataFunSummit
Feb 12, 2023 · Information Security

Privacy Computing: Technical Routes Overview and Ant Group’s Contributions

This article introduces and compares major privacy computing technologies—including MPC, federated learning, TEE, and proxy MPC—evaluating them across security, development cost, operational cost, accuracy, performance, participant scale, control, hardware cost, and trust, and then outlines Ant Group’s privacy computing framework, applications, and standards work.

Ant GroupFederated LearningMPC
0 likes · 8 min read
Privacy Computing: Technical Routes Overview and Ant Group’s Contributions
DataFunTalk
DataFunTalk
Feb 11, 2023 · Information Security

Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping

The interview with Alibaba Cloud Datatrust architect Liang Aiping reveals that privacy computing is still in its early stage, facing technical challenges in data sources, algorithm theory‑engineering gaps, system management interoperability, and product trade‑offs, while outlining future trends toward cross‑platform interoperability and distributed computing.

InteroperabilityPrivacy ComputingSystem Management
0 likes · 13 min read
Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping
Data Thinking Notes
Data Thinking Notes
Jan 29, 2023 · Big Data

How to Turn Data Assets into Business Value: A Roadmap for Enterprises

Enterprises must shift their perception of data assets and embed data‑value into every digital process, establishing governance, unified asset catalogs, operational metrics, security controls, integration, services, and visualization to transform raw data into strategic business outcomes.

Big DataData GovernanceData Integration
0 likes · 12 min read
How to Turn Data Assets into Business Value: A Roadmap for Enterprises
DataFunTalk
DataFunTalk
Jan 19, 2023 · Big Data

Data Governance Strategies: Concepts, Practices, and Case Studies

The article explains the importance of data governance for organizations handling big data, outlines narrow and broad governance approaches, presents strategic design principles, and shares practical case studies from leading companies, while also offering a downloadable ebook of governance strategies.

Case StudiesData Managementdata security
0 likes · 7 min read
Data Governance Strategies: Concepts, Practices, and Case Studies
DataFunSummit
DataFunSummit
Jan 5, 2023 · Information Security

ByteDance Big Data Platform Security and Permission Governance Practices

This article outlines ByteDance's comprehensive big‑data security framework, detailing current challenges, fine‑grained permission control, asset protection, data deletion capabilities, and the governance principles that balance compliance with operational efficiency.

access controldata deletiondata security
0 likes · 13 min read
ByteDance Big Data Platform Security and Permission Governance Practices
AntTech
AntTech
Dec 30, 2022 · Information Security

Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol

The 2022 Trusted Privacy Computing Summit announced and released the industry's first open white‑box protocol, the ECDH‑PSI interconnection protocol, detailing its design, implementation highlights, and open‑source availability to promote interoperable and secure privacy‑preserving data collaboration across platforms.

ECDH-PSIInteroperabilityPrivacy Computing
0 likes · 6 min read
Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol
Baidu Geek Talk
Baidu Geek Talk
Dec 28, 2022 · Information Security

RBAC Permission System Design and Implementation for Local Life Services Platform

This article explains Baidu's Duoli Bear permission system, detailing its business context, challenges of multi‑role and platform isolation, and the custom RBAC design that uses a tree‑structured menu, role‑based data rules, and business‑line isolation to manage access across diverse services.

Backend ArchitectureDatabase designPermission System
0 likes · 13 min read
RBAC Permission System Design and Implementation for Local Life Services Platform
DataFunSummit
DataFunSummit
Dec 26, 2022 · Information Security

Privacy Computing in Digital Government: Background, Technical Roadmap, Case Studies, Challenges, and Recommendations

This article introduces the background, technical roadmap, real-world cases, implementation challenges, and suggested approaches for privacy computing in digital government, highlighting how secure multi‑party computation, federated learning, and trusted execution environments can enable safe data sharing.

Federated LearningPrivacy Computingdata security
0 likes · 18 min read
Privacy Computing in Digital Government: Background, Technical Roadmap, Case Studies, Challenges, and Recommendations
AntTech
AntTech
Dec 22, 2022 · Information Security

From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing

The article explores how the shift from plaintext data to fully encrypted "data‑in‑state" (密态) is reshaping data security, privacy‑preserving computation, regulatory compliance, and market commercialization, with insights from Ant Group’s VP Dr. Wei Tao on technology pathways, challenges, and future prospects.

Privacy Computingdata securityencrypted data
0 likes · 30 min read
From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing
DataFunSummit
DataFunSummit
Dec 18, 2022 · Information Security

Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group

This article explains Ant Group's privacy computing framework, covering its fundamental concepts, layered product architecture, and four concrete use‑cases in the medical sector—including insurance, hospitals, health commissions, and medical device manufacturers—demonstrating how secure multi‑party computation and federated learning enable data collaboration while preserving privacy.

Ant GroupFederated LearningPrivacy Computing
0 likes · 12 min read
Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group
dbaplus Community
dbaplus Community
Dec 18, 2022 · Information Security

Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data

This article outlines Vivo’s comprehensive approach to large‑scale database security, covering recent data‑leak incidents, legal compliance, the current challenges of sensitive data governance, a field‑level discovery method, classification standards, automated scoring, and multiple encryption solutions including Proxy, MyBatis, and ShardingSphere.

compliancedata classificationdata security
0 likes · 17 min read
Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data
AntTech
AntTech
Dec 3, 2022 · Information Security

IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group

The IEEE Standards Association has officially launched the Trusted Enclave Computing (P3181) standard project, led by Ant Group with participation from Chinese research institutes and companies, aiming to define technical frameworks, security requirements, and guidelines for designing, developing, testing, and maintaining privacy-preserving computing systems.

IEEE StandardPrivacy ComputingTECC
0 likes · 4 min read
IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESalgorithmdata security
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
dbaplus Community
dbaplus Community
Nov 26, 2022 · Databases

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation steps, performance trade‑offs, storage costs, and practical suitability for real‑world systems.

data securityencryptionfuzzy-search
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
Data Thinking Notes
Data Thinking Notes
Nov 24, 2022 · Fundamentals

How to Build an Enterprise Data Governance System from Scratch

This article explains what data governance is, why enterprises need it, the key components such as data quality, metadata, master data, asset and security management, and provides a step‑by‑step framework, organizational structure, platform features, evaluation methods and common pitfalls.

Data AssetsData GovernanceData Quality
0 likes · 17 min read
How to Build an Enterprise Data Governance System from Scratch
DataFunSummit
DataFunSummit
Nov 24, 2022 · Big Data

Metadata Management and Governance Practices at Wing Payment: Architecture, Techniques, and Future Outlook

This article explains how Wing Payment uses metadata as the foundation of its data‑governance practice, describing the challenges of data quality, efficiency, cost and security, the four‑step governance framework, the design of its metadata platform, and future directions such as multi‑source management and intelligent recommendation.

Master Datadata securitymetadata
0 likes · 18 min read
Metadata Management and Governance Practices at Wing Payment: Architecture, Techniques, and Future Outlook
DataFunTalk
DataFunTalk
Nov 20, 2022 · Big Data

Evolution and Practices of Modern Data Governance at NetEase DataFun

This article outlines NetEase DataFun's journey in building a full‑stack big data platform, describing the four‑stage development of data governance—from designing a unified data middle‑platform to addressing cost, quality, and security challenges—and presents the principles of modern data governance that integrate development, consumption, and continuous improvement.

Data Platformdata security
0 likes · 23 min read
Evolution and Practices of Modern Data Governance at NetEase DataFun
Zhongtong Tech
Zhongtong Tech
Nov 18, 2022 · Information Security

Data Security Insights from CIS 2022: Balancing Compliance and Business Growth

At the CIS 2022 Cybersecurity Innovation Conference in Shanghai, ZTO Express’s security chief shared practical strategies for data security governance, highlighting legal compliance, management vs. technical controls, and the emerging role of privacy computing in sustaining business operations.

Privacy Computingcompliancedata security
0 likes · 5 min read
Data Security Insights from CIS 2022: Balancing Compliance and Business Growth
政采云技术
政采云技术
Nov 7, 2022 · Information Security

Zhejiang Government Procurement Cloud's Data Security and Compliance Framework

Zhejiang Government Procurement Cloud's CTO Liu Changyu presented at the Cloud Summit, detailing the company's comprehensive data security and compliance framework including 'three-in-one' certifications, 'four-in-one' data security construction, and intelligent data classification strategies.

Regulatory Compliancecompliance frameworkdata classification
0 likes · 5 min read
Zhejiang Government Procurement Cloud's Data Security and Compliance Framework
Top Architect
Top Architect
Sep 24, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve (sand‑wich), conventional, and advanced (super)—detailing their implementation ideas, performance implications, and suitability for real‑world applications.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs
Meituan Technology Team
Meituan Technology Team
Sep 22, 2022 · Information Security

Tokenization for Data Security: Design, Implementation, and Engineering Practices

The article explains how tokenization transforms data security into a built‑in attribute that automatically scales with data growth, detailing its design principles, generation methods, architectural layers, security safeguards, and practical engineering experiences to address exposure risks in modern digital businesses.

Data GovernancePIISecurity Architecture
0 likes · 24 min read
Tokenization for Data Security: Design, Implementation, and Engineering Practices
Tencent Cloud Developer
Tencent Cloud Developer
Sep 20, 2022 · Information Security

Data Classification and Grading Architecture for Enterprise Data Security

The article details a practical, reusable enterprise architecture for data classification and grading that combines scanning tools, a rule‑engine with hot‑updates, a high‑performance identification service, and a security enforcement platform, addressing massive real‑time data volumes, diverse storage types, cross‑department isolation, and compliance with China’s data security laws.

Big DataCloud NativeKafka
0 likes · 14 min read
Data Classification and Grading Architecture for Enterprise Data Security
DataFunSummit
DataFunSummit
Sep 18, 2022 · Information Security

Privacy Computing and Blockchain: Enabling Secure Data Collaboration

This article explains how privacy computing technologies such as federated learning, multi‑party computation, and trusted execution environments, combined with blockchain, address data sharing challenges in the digital economy by protecting privacy, ensuring compliance, and enabling secure, trusted collaboration across enterprises and government agencies.

BlockchainConfidential ComputingPrivacy Computing
0 likes · 11 min read
Privacy Computing and Blockchain: Enabling Secure Data Collaboration
Java High-Performance Architecture
Java High-Performance Architecture
Sep 13, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation approaches—from naive in‑memory decryption to conventional database tricks and advanced algorithmic solutions—evaluates their security, performance, and storage impacts, and provides practical references for real‑world systems.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs
AntTech
AntTech
Sep 3, 2022 · Information Security

Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

The Trusted Privacy Computing Summit at the 2022 World AI Conference gathered leading scholars and industry experts to discuss cryptographic techniques, data security, and the practical rollout of privacy‑computing technologies across finance, healthcare, and cross‑border data services, emphasizing responsible digital economy development.

AIPrivacy Computingcryptography
0 likes · 8 min read
Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization

This article explains the design and implementation of a unified data security control platform that protects user privacy and corporate data across multiple big‑data components (Hive, Hetu, GaussDB) by integrating Apache Ranger, custom authorization APIs, asynchronous processing, distributed locking, and SDK‑based authentication to achieve fine‑grained, one‑stop permission management.

AuthorizationBig DataDistributed Systems
0 likes · 17 min read
How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization
DataFunTalk
DataFunTalk
Aug 19, 2022 · Big Data

Multi‑Tenant Architecture in Public‑Cloud Big Data Platforms: Design, Challenges, and MaxCompute Implementation

This article explains the different multi‑tenant models used by public‑cloud big data platforms, analyzes their advantages and challenges, and details how Alibaba Cloud's MaxCompute realizes strong multi‑tenancy through storage design, resource scheduling, security containers, virtual networking, and future evolution directions.

MaxComputedata securitymulti-tenancy
0 likes · 15 min read
Multi‑Tenant Architecture in Public‑Cloud Big Data Platforms: Design, Challenges, and MaxCompute Implementation
DataFunSummit
DataFunSummit
Aug 17, 2022 · Big Data

Data Governance Practices and Frameworks: Insights from Alibaba

This article presents an overview of data governance concepts, common enterprise challenges, and Alibaba's comprehensive data governance framework, covering theory, demand layers, practical solutions for stability, quality, standards, security, cost control, and the supporting platforms and operational practices.

AlibabaBig DataData Governance
0 likes · 13 min read
Data Governance Practices and Frameworks: Insights from Alibaba
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Aug 9, 2022 · Big Data

Unlocking MaxCompute: How Alibaba’s Big Data Platform Secures Your Data

This article provides a comprehensive overview of Alibaba Cloud MaxCompute, covering its product features, architecture, ecosystem integrations, and in‑depth data security mechanisms such as authentication, RAM roles, access control policies, label‑based security, project protection, audit logging, encryption, backup, disaster recovery, and the complementary DataWorks security capabilities.

Big DataCloud NativeMaxCompute
0 likes · 31 min read
Unlocking MaxCompute: How Alibaba’s Big Data Platform Secures Your Data
Programmer DD
Programmer DD
Aug 8, 2022 · Databases

Why Docker May Not Be Ideal for MySQL: Risks and Workarounds

This article examines the challenges of running MySQL in Docker containers, highlighting data safety concerns, I/O performance bottlenecks, statefulness issues, and resource isolation limits, while also outlining scenarios where containerization can work and offering practical mitigation strategies.

ContainersDockerResource Isolation
0 likes · 7 min read
Why Docker May Not Be Ideal for MySQL: Risks and Workarounds
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Privacy ComputingTECCcryptography
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
AntTech
AntTech
Jul 26, 2022 · Information Security

Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview

TECC (Trusted‑Environment‑based Cryptographic Computing) combines trusted computing and cryptographic protocols to enable large‑scale, secure, high‑performance privacy‑preserving data analysis, offering superior security, reliability, cost‑effectiveness, and applicability across diverse multi‑party scenarios such as East‑West computing and joint risk control.

Privacy ComputingTECCcryptography
0 likes · 14 min read
Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview
ITPUB
ITPUB
Jul 23, 2022 · Information Security

How Bilibili Secured Hadoop: Ranger‑Based HDFS and Hive Access Control Deep Dive

This article details Bilibili's implementation of Apache Ranger for fine‑grained access control across Hadoop, HDFS, Hive, Spark, and Presto, covering architecture, API redesign, admin optimizations, gray‑release strategies, permission pre‑checks, data masking, and future plans for incremental policy loading.

HDFSHivePresto
0 likes · 16 min read
How Bilibili Secured Hadoop: Ranger‑Based HDFS and Hive Access Control Deep Dive
DataFunTalk
DataFunTalk
Jul 22, 2022 · Artificial Intelligence

Federated Learning, Secure Multiparty Computation, and Data Privacy: Challenges, Legal Context, and Technical Solutions

This article provides a comprehensive overview of federated learning as an emerging AI technology, discussing data‑security incidents, relevant regulations such as GDPR and China’s Data Security Law, the core challenges of learning, privacy, communication and security, and presenting cryptographic solutions including homomorphic encryption, secret sharing and Google PAM.

artificial intelligencedata securityprivacy
0 likes · 17 min read
Federated Learning, Secure Multiparty Computation, and Data Privacy: Challenges, Legal Context, and Technical Solutions
AntTech
AntTech
Jul 21, 2022 · Information Security

Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders

In early July Ant Group announced the open‑source release of its trusted privacy‑computing framework “YinYu”, with Chinese Academy of Sciences academician Wang Xiaoyun and senior officials from the banking and telecom sectors discussing the technology’s security challenges, compliance issues, performance trade‑offs, and the broader impact of open‑source on data sharing and industry innovation.

Industry collaborationPrivacy Computingcryptography
0 likes · 8 min read
Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders
DataFunTalk
DataFunTalk
Jul 8, 2022 · Information Security

DataFun 2022 Summit on Privacy Computing and Data Security

DataFun's 2022 summit brings together leading experts from academia and industry to discuss privacy computing, federated learning, secure data sharing, and their applications across finance, healthcare, telecom, and blockchain, offering insights into technologies, standards, and real-world implementations that enable data utility while protecting privacy.

Big DataFederated LearningPrivacy Computing
0 likes · 43 min read
DataFun 2022 Summit on Privacy Computing and Data Security
AntTech
AntTech
Jun 29, 2022 · Information Security

Data Confidentiality Era: Development and Security – Highlights from Wei Tao’s 2022 Big Data Summit Speech

Wei Tao, Vice President of Ant Group, outlined the transition to a data‑confidentiality era, emphasizing the need for privacy‑computing security grading, technical requirements, and industry collaboration to safely circulate data as a new production factor in the post‑2022 big data landscape.

Data GovernancePrivacy Computingconfidential data
0 likes · 11 min read
Data Confidentiality Era: Development and Security – Highlights from Wei Tao’s 2022 Big Data Summit Speech
21CTO
21CTO
Jun 20, 2022 · Cloud Computing

Why TikTok Is Moving All U.S. User Data to Oracle Cloud

TikTok announced that 100% of its U.S. user traffic will be routed to Oracle Cloud, a move aimed at addressing national‑security concerns over data access while continuing to back up data in its Singapore facilities and planning a full migration away from its own data centers.

Oracle CloudTikTokUS Data Privacy
0 likes · 6 min read
Why TikTok Is Moving All U.S. User Data to Oracle Cloud
AntTech
AntTech
Jun 16, 2022 · Information Security

Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points

This article examines the rapid growth of privacy computing in China, outlining policy and market drivers, explaining key technologies such as secure multiparty computation, trusted execution environments, homomorphic encryption, differential privacy and federated learning, and discussing the legal, technical and ecosystem challenges that hinder its wider adoption.

Federated LearningHomomorphic EncryptionPrivacy Computing
0 likes · 11 min read
Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points
DataFunSummit
DataFunSummit
May 22, 2022 · Information Security

Enterprise Data Security Governance: DSG Framework and CARTA Model for Compliance

This article outlines the evolution of data security legislation in China, introduces the DSG data‑security architecture and the CARTA control model, and provides a step‑by‑step guide for enterprises to plan, implement, and monitor data‑security governance in line with the new legal requirements.

CARTA ModelDSG FrameworkEnterprise Governance
0 likes · 15 min read
Enterprise Data Security Governance: DSG Framework and CARTA Model for Compliance
DataFunSummit
DataFunSummit
May 17, 2022 · Information Security

Data Security Governance Practices and Frameworks: A Comprehensive Overview

This article presents a detailed overview of data security governance in China, covering policy milestones, major security incidents, current challenges, a three‑layer governance model, practical workflow steps, classification methods, emerging zero‑trust concepts, and real‑world case studies, offering actionable insights for organizations seeking robust data protection.

Big DataZero Trustdata security
0 likes · 11 min read
Data Security Governance Practices and Frameworks: A Comprehensive Overview
Architects Research Society
Architects Research Society
May 17, 2022 · Information Security

Understanding Data Governance, Models, Policies, and Best Practices

The article explains data governance concepts, outlines four common governance models, details key policy elements such as availability, quality, integrity, usability, and security, and highlights the benefits, risks, and best‑practice recommendations for implementing effective data governance in organizations.

Data GovernanceData Managementcompliance
0 likes · 10 min read
Understanding Data Governance, Models, Policies, and Best Practices
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Dynamic Maskingdata maskingdata security
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
AntTech
AntTech
Apr 26, 2022 · Information Security

Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations

The article explores the rapid growth of privacy computing in China, highlighting new data protection laws, a surge in patents, real‑world applications such as medical data sharing, and personal stories of Ant Group engineers who develop cutting‑edge cryptographic frameworks and champion interdisciplinary research.

AIAnt GroupPrivacy Computing
0 likes · 13 min read
Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations
AntTech
AntTech
Apr 8, 2022 · Artificial Intelligence

Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning

On March 29, the Beijing FinTech Industry Alliance published two white‑papers—‘Multi‑Party Secure Computation Financial Application Status and Implementation Guide’ and ‘Federated Learning Technology Financial Application White Paper’—detailing policies, standards, case studies, and recommendations for deploying privacy‑preserving AI technologies in the financial sector.

AIFederated LearningMPC
0 likes · 4 min read
Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning
AntTech
AntTech
Mar 30, 2022 · Information Security

Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality

The article examines how the rapid growth of industrial internet data demands robust privacy‑preserving technologies, outlines the regulatory backdrop, describes the technical challenges of achieving high performance, stability, low cost, flexibility and strong security, and proposes trusted privacy computing as a comprehensive solution for the emerging data‑confidentiality era.

AIIndustrial InternetPrivacy Computing
0 likes · 15 min read
Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality
HaoDF Tech Team
HaoDF Tech Team
Feb 28, 2022 · Information Security

Partner Data Security Closed‑Loop Management at Haodf Online

This article outlines how Haodf Online implements a closed‑loop partner data security framework—covering background regulations, SDL‑based lifecycle stages, partner information handling, security assessment, API testing, monitoring, and continuous improvement—to protect sensitive medical data across its ecosystem.

API SecuritySDLcompliance
0 likes · 14 min read
Partner Data Security Closed‑Loop Management at Haodf Online
AntTech
AntTech
Feb 21, 2022 · Information Security

Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era

The article analyzes the shift from plaintext data exchange to a data‑confidentiality era, outlines regulatory drivers, describes technical challenges of privacy‑preserving computation, evaluates existing cryptographic approaches, and argues that trusted privacy computing is the most promising solution to meet performance, reliability, cost, applicability, and security requirements.

Privacy Computingcomplianceconfidential data
0 likes · 19 min read
Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era
DataFunSummit
DataFunSummit
Jan 23, 2022 · Big Data

MobTech's Integrated Data Governance Practices and Architecture

This article presents MobTech's comprehensive data governance and security practices, covering the necessity of governance, challenges in large‑scale data environments, the full‑link governance chain, modular architecture, and specific implementations for financial risk‑control scenarios.

Big DataData ArchitectureData Governance
0 likes · 19 min read
MobTech's Integrated Data Governance Practices and Architecture
DataFunTalk
DataFunTalk
Jan 18, 2022 · Information Security

Data Security Governance: Concepts, Goals, Tool Framework, and Practices

This presentation introduces data security concepts, outlines security goals and the 4A/5A model, describes the data lifecycle, and details practical tools and frameworks for identity authentication, access control, asset protection, and comprehensive governance to ensure secure data handling across its full lifecycle.

Data Lifecycleaccess controldata security
0 likes · 16 min read
Data Security Governance: Concepts, Goals, Tool Framework, and Practices
DataFunSummit
DataFunSummit
Jan 12, 2022 · Big Data

Exploring JD's Big Data Security and Distributed Permission System: Architecture, Principles, and Practices

This article presents JD's comprehensive big‑data security framework and distributed permission system, detailing the overall planning of the security center, data lifecycle protection strategies, core modules such as subjects, resources, policy language, and high‑performance access control, and how they address national compliance, business scalability, and technical challenges.

Big DataDistributed SystemsJD.com
0 likes · 11 min read
Exploring JD's Big Data Security and Distributed Permission System: Architecture, Principles, and Practices
AntTech
AntTech
Dec 27, 2021 · Information Security

Overview of the Data Security Composite Governance and Practice Whitepaper

The jointly authored whitepaper by China Software Testing Center, National Information Center, and Ant Group introduces a data security composite governance model, detailing strategic, managerial, and technical dimensions, multi‑view security measurement, and practical implementation guidance for enterprises under the new data security law.

composite modeldata securitygovernance
0 likes · 8 min read
Overview of the Data Security Composite Governance and Practice Whitepaper
AntTech
AntTech
Dec 21, 2021 · Information Security

Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview

The article explains how combining hardware and software solutions can address the data‑lifecycle security and cryptographic performance challenges of privacy computing, describing the underlying technology stack, acceleration techniques, and the integrated privacy‑computing appliance released by Ant Group.

Hardware accelerationPrivacy Computingcryptography
0 likes · 13 min read
Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview
Architecture Digest
Architecture Digest
Dec 11, 2021 · Big Data

Design and Implementation of BanYu's Big Data Permission System

This article describes the background, design goals, authentication and authorization mechanisms, system architecture, policy configuration, and Metabase integration of BanYu's big data permission system, highlighting how it balances security and efficiency across Hive, Presto, HDFS, and other components.

Apache RangerHivePresto
0 likes · 16 min read
Design and Implementation of BanYu's Big Data Permission System
21CTO
21CTO
Dec 9, 2021 · Big Data

Designing a Scalable Big Data Permission System: From Hive to Metabase

BanYu’s early data warehouse lacked any access controls, prompting the creation of a comprehensive big‑data permission system that integrates authentication and authorization across Hive, Presto, HDFS, and Metabase using LDAP, Ranger policies, workflow automation, and both synchronous and asynchronous policy initialization.

AuthorizationBig DataHive
0 likes · 16 min read
Designing a Scalable Big Data Permission System: From Hive to Metabase
DataFunTalk
DataFunTalk
Nov 27, 2021 · Big Data

iQIYI Data Middle Platform: Architecture, Data Governance Practices, and Future Plans

The article details iQIYI’s data middle platform architecture and its comprehensive data governance practices, covering platform overview, data flow, unified standards, metadata management, production quality assurance, and future AI‑driven enhancements, illustrating how centralized data services improve reliability, efficiency, and security.

Big DataData GovernanceData Quality
0 likes · 27 min read
iQIYI Data Middle Platform: Architecture, Data Governance Practices, and Future Plans
21CTO
21CTO
Nov 23, 2021 · Information Security

Dynamic Data Security: Unlocking Data Value and Protecting Privacy in Banking

In a recent statement, ICBC’s CTO emphasizes that data, as a crucial production factor, derives its core value during use, urging dynamic data security and personal information protection, cross‑institution collaboration, regulated data markets, and safe cross‑border flows to support a healthy digital economy.

Data GovernancePrivacy Computingcross‑border data
0 likes · 3 min read
Dynamic Data Security: Unlocking Data Value and Protecting Privacy in Banking
AntTech
AntTech
Nov 19, 2021 · Information Security

Privacy Computing: Current Applications and Challenges in Finance, Healthcare, and Government

The 2021 China Internet Law Conference report shows that privacy‑preserving computation has begun pilot deployments in finance, medical and public‑sector domains, delivering fraud‑risk reduction, secure biomedical research, and collaborative power‑grid analytics, yet it remains in early stages and faces scalability, standards, and policy challenges.

Federated LearningPrivacy Computingdata security
0 likes · 7 min read
Privacy Computing: Current Applications and Challenges in Finance, Healthcare, and Government
Big Data Technology & Architecture
Big Data Technology & Architecture
Nov 10, 2021 · Fundamentals

What Is Data Governance and How to Implement It: Concepts, Goals, Methodology, Tools, and Case Studies

This article explains data governance—from its definition and why it’s needed, to its goals, core components, PDCA‑based methodology, essential tools, and real‑world implementations at Meituan and Ant Financial—providing a comprehensive guide for organizations seeking to manage and leverage their data assets effectively.

data securitymetadata
0 likes · 25 min read
What Is Data Governance and How to Implement It: Concepts, Goals, Methodology, Tools, and Case Studies
Programmer DD
Programmer DD
Oct 11, 2021 · Information Security

How to Secure Your Files with Cryptomator: A Step‑by‑Step Guide

This article introduces the open‑source encryption tool Cryptomator, explains its security‑first design, and provides a detailed, illustrated walkthrough for creating a vault, adding files, and locking the vault so that sensitive data stays hidden on local disks and cloud drives.

Cryptomatorcloud storagedata security
0 likes · 4 min read
How to Secure Your Files with Cryptomator: A Step‑by‑Step Guide