Tagged articles
260 articles
Page 3 of 3
dbaplus Community
dbaplus Community
Aug 31, 2021 · Big Data

How Meituan Waimai Built and Evolved Its Massive Data Warehouse from V1 to V3

This article details Meituan Waimai's data warehouse evolution—covering business context, four‑layer architecture, Spark‑based ETL, successive V1.0, V2.0, and V3.0 redesigns, data governance practices, resource‑optimization tactics, security measures, and future road‑maps—illustrated with diagrams and concrete technical choices.

Data GovernanceETLResource Optimization
0 likes · 24 min read
How Meituan Waimai Built and Evolved Its Massive Data Warehouse from V1 to V3
Architecture Digest
Architecture Digest
Jul 22, 2021 · Artificial Intelligence

The Hidden Risks of Facial Recognition: When Apps Capture More Than Just Your Face

Facial recognition technology, now ubiquitous in payments, transportation and identity verification, often records the entire camera view and forwards full images to human reviewers, raising serious privacy concerns, especially in third‑party apps that may expose users in vulnerable situations.

artificial intelligencedata securityfacial recognition
0 likes · 7 min read
The Hidden Risks of Facial Recognition: When Apps Capture More Than Just Your Face
Architect
Architect
Jul 1, 2021 · Big Data

Data Governance Practices at Meituan Hotel Travel Platform

This article presents a comprehensive case study of Meituan's hotel‑travel data governance, covering the background, challenges, strategic goals, standardized processes, technical systems, cost and security optimizations, measurable outcomes, and future plans for automated governance.

Big DataCost OptimizationData Governance
0 likes · 29 min read
Data Governance Practices at Meituan Hotel Travel Platform
DataFunTalk
DataFunTalk
May 28, 2021 · Artificial Intelligence

JD's Open‑Source Federated Learning Solution 9N‑FL: Architecture, Features, Timeline, and Business Impact

This article introduces JD's open‑source federated learning platform 9N‑FL, explaining the data‑island problem, the fundamentals and classifications of federated learning, its four key features, the system’s layered architecture, development timeline, real‑world advertising use case results, and future enhancements.

9N-FLBig DataFederated Learning
0 likes · 15 min read
JD's Open‑Source Federated Learning Solution 9N‑FL: Architecture, Features, Timeline, and Business Impact
Meituan Technology Team
Meituan Technology Team
Apr 15, 2021 · Big Data

Data Governance Practices at Meituan Hotel & Travel Platform

Meituan’s hotel‑travel platform tackled exploding data‑quality, cost, efficiency, and security issues by establishing a full‑link governance framework—standardized processes, a Data Management Committee, and unified “One Model, One Logic, One Service, One Portal” systems—that cut per‑unit costs by ~40%, boosted engineer productivity over 60%, eliminated major security incidents, and set the stage for autonomous, AI‑driven data governance.

Big DataData GovernanceData Quality
0 likes · 32 min read
Data Governance Practices at Meituan Hotel & Travel Platform
Liangxu Linux
Liangxu Linux
Mar 31, 2021 · Information Security

Hide Secret Files Inside Images on Linux Using Steghide

This guide explains how to install steghide on Linux, embed a confidential text file into a JPEG image, verify the embedding with MD5 checksums, and later extract the hidden data, covering all required commands and options.

LinuxSteganographydata security
0 likes · 5 min read
Hide Secret Files Inside Images on Linux Using Steghide
Big Data Technology & Architecture
Big Data Technology & Architecture
Mar 11, 2021 · Big Data

Data Governance: Core Questions, Practices, and Implementation in Meituan Delivery

This article examines the three fundamental questions of data governance—what to govern, where to govern, and how to govern—defines data assets, outlines stakeholder roles, presents a ten‑step implementation framework, and showcases Meituan Delivery's practical standards, architecture, metadata, security, and tooling for effective enterprise data governance.

data security
0 likes · 37 min read
Data Governance: Core Questions, Practices, and Implementation in Meituan Delivery
DevOps
DevOps
Mar 10, 2021 · Artificial Intelligence

Ant Financial's Intelligent Middle Platform: AI Applications, Data Infrastructure, and Security Practices

This article presents Ant Financial's intelligent middle platform, detailing AI use cases such as risk control, wealth management, lending, marketing, insurance, and customer service, alongside the AI capability map, data foundation architecture, annotation workflows, security measures, and the overall impact on fintech innovation.

FinTechannotationdata infrastructure
0 likes · 8 min read
Ant Financial's Intelligent Middle Platform: AI Applications, Data Infrastructure, and Security Practices
vivo Internet Technology
vivo Internet Technology
Mar 3, 2021 · Backend Development

Design and Implementation of a Hundred-Million-Level User Center System

The article outlines a microservice‑based user‑center architecture for handling over one hundred million users, detailing gateway, core, and async services, interface design, vertical and horizontal database sharding, token graceful degradation, multi‑layer password security, event‑driven async processing, and comprehensive monitoring for high availability, performance, and security.

Backend ArchitectureMicroservicesSystem Design
0 likes · 14 min read
Design and Implementation of a Hundred-Million-Level User Center System
DataFunTalk
DataFunTalk
Feb 23, 2021 · Big Data

Meituan Hotel & Travel Data Governance: Journey, Practices, and Future Directions

This article outlines Meituan's hotel‑travel data governance evolution, describing the key quality, cost, security, standardization and efficiency challenges faced as the business scaled, and detailing the organizational, technical, metric, service and product‑entry solutions implemented to achieve systematic, measurable, and automated data governance.

Big DataData Governancedata security
0 likes · 19 min read
Meituan Hotel & Travel Data Governance: Journey, Practices, and Future Directions
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Feb 22, 2021 · Information Security

How Meituan-Dianping Secures User Data in the Big Data Era

In the era of big data, Meituan-Dianping implements a comprehensive security management system—including organizational safeguards, deep defense architecture, encryption, and data desensitization—to meet regulatory demands and protect billions of users' privacy and information security.

Meituandata securityinformation security
0 likes · 3 min read
How Meituan-Dianping Secures User Data in the Big Data Era
Didi Tech
Didi Tech
Jan 14, 2021 · Cloud Computing

Design and Implementation of Didi's Logi‑KafkaManager Multi‑tenant Kafka Cloud Platform

Didi’s Logi‑KafkaManager is a multi‑tenant Kafka cloud platform that consolidates dozens of clusters into a secure, isolated gateway‑driven service offering intuitive web‑based topic management, real‑time metrics visualization, automated diagnostics, quota governance and safe scaling, delivering high internal satisfaction and enterprise commercialization.

Big DataKafkacloud platform
0 likes · 17 min read
Design and Implementation of Didi's Logi‑KafkaManager Multi‑tenant Kafka Cloud Platform
ITPUB
ITPUB
Jan 12, 2021 · Databases

What the Latest DTCC Conference Reveals About the Future of Databases

The DTCC conference recap explores emerging data trends, multi‑model databases, governance frameworks, architecture migrations, NewSQL and MySQL high‑availability, distributed transaction challenges, AI‑driven operations, data middle‑platform debates, cloud‑native storage‑compute separation, and comprehensive data security across the full data lifecycle.

Data GovernanceDistributed Systemscloud computing
0 likes · 19 min read
What the Latest DTCC Conference Reveals About the Future of Databases
Efficient Ops
Efficient Ops
Jan 7, 2021 · Fundamentals

Tech Roundup: ECC Controversy, Data Deletion Sentences, GitHub Lifts Iran Ban, and More

This roundup covers Linus Torvalds' criticism of Intel's ECC memory policies, a Chinese real‑estate employee sentenced for deleting 9 TB of data, Pinduoduo's apology over a controversial Zhihu comment, Xiaohongshu's service outage, GitHub restoring access for Iranian developers, the latest TIOBE language rankings, average programmer salaries in China, a UK engineer discarding 7 500 bitcoins, and David Recordon's appointment as White House technology director.

BlockchainECCGitHub
0 likes · 8 min read
Tech Roundup: ECC Controversy, Data Deletion Sentences, GitHub Lifts Iran Ban, and More
Alibaba Cloud Developer
Alibaba Cloud Developer
Dec 7, 2020 · Big Data

How to Build a New‑Retail Data Middle Platform with DataWorks

This article explains how new‑retail companies can design and implement a data middle platform using Alibaba Cloud's DataWorks, covering business model analysis, technical architecture, layer‑by‑layer data modeling, governance, security, and the concrete benefits of turning raw data into actionable business insights.

Big Data ArchitectureData GovernanceData Middle Platform
0 likes · 28 min read
How to Build a New‑Retail Data Middle Platform with DataWorks
Architects Research Society
Architects Research Society
Oct 23, 2020 · Information Security

Understanding Data Security Diagrams and Their Role in Enterprise Architecture

The article explains how data security diagrams map which participants can access specific enterprise data, discusses best practices such as using focused participant‑centric or external‑access diagrams, presents example tables and UML/BPMN and Archimate visualizations, and highlights their role in compliance and trust management.

TOGAFaccess controlcompliance
0 likes · 5 min read
Understanding Data Security Diagrams and Their Role in Enterprise Architecture
21CTO
21CTO
Sep 21, 2020 · Information Security

Why a Programmer Deleted 300M Users' Data – Lessons on Cloud Security

The article recounts the 2020 “delete‑and‑run” incident where a disgruntled employee erased all data from the SaaS platform Weimeng, causing over 300 million users to lose access, a market‑value plunge of over HK$1 billion, and a six‑year prison sentence, while exposing critical flaws in data‑security practices and the risks of insufficient cloud adoption.

SaaScloud computingdata security
0 likes · 8 min read
Why a Programmer Deleted 300M Users' Data – Lessons on Cloud Security
Big Data Technology & Architecture
Big Data Technology & Architecture
Sep 12, 2020 · Big Data

Technical Architecture and Component Selection of a Real‑time Data Platform (RTDP)

This article details the technical architecture of a Real‑time Data Platform (RTDP), covering component selection such as DBus, Kafka, Wormhole, Moonbox and Davinci, and discusses design considerations, data management, security, operational practices, and various deployment modes for big‑data applications.

Big Data ArchitectureRTDPdata security
0 likes · 22 min read
Technical Architecture and Component Selection of a Real‑time Data Platform (RTDP)
Tencent Cloud Developer
Tencent Cloud Developer
Aug 3, 2020 · Information Security

Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions

The article outlines enterprise data‑security risks and regulatory demands, reviews symmetric, asymmetric and hash techniques, highlights cloud‑encryption and key‑management challenges, and presents Tencent Cloud’s comprehensive solutions—including KMS, BYOK, white‑box keys, virtual HSMs, and integrated database encryption—to protect data throughout its lifecycle.

Tencent Cloudcloud computingcompliance
0 likes · 20 min read
Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions
Qunar Tech Salon
Qunar Tech Salon
Jul 27, 2020 · Operations

Website Operations at Qunar: Ensuring Stability, Security, and Efficiency During the Pandemic

The interview with Sun Bin, head of Qunar's website operations, explains how the team acted as a specialized "BlackOps" unit to provide robust technical guarantees, automate problem‑solving, protect user data, optimize resources, and maintain continuous service during the COVID‑19 outbreak.

Cost OptimizationPandemic Responsecloud infrastructure
0 likes · 10 min read
Website Operations at Qunar: Ensuring Stability, Security, and Efficiency During the Pandemic
DataFunTalk
DataFunTalk
Jul 26, 2020 · Artificial Intelligence

Federated Learning: Fundamentals, Applications, Challenges, and Implementation Methods

This article explains federated learning as a privacy‑preserving distributed machine learning paradigm, discusses why it has become popular, describes its three core components, demonstrates its advantages over traditional models, outlines real‑world use cases in medicine and finance, and analyzes current technical and commercial challenges together with implementation techniques such as horizontal/vertical federation and homomorphic encryption.

data securitydistributed machine learning
0 likes · 32 min read
Federated Learning: Fundamentals, Applications, Challenges, and Implementation Methods
dbaplus Community
dbaplus Community
Jul 2, 2020 · Information Security

How 58 Daojia Secures Data in the DT Era: Threats, Practices, and Lessons

This article summarizes Liu Huan's presentation on data security in the DT era, covering the current security landscape, internal and external threats to enterprise data, and 58 Daojia's practical approaches to data discovery, classification, authentication, monitoring, and incident response.

DT eradata securityenterprise security
0 likes · 14 min read
How 58 Daojia Secures Data in the DT Era: Threats, Practices, and Lessons
TAL Education Technology
TAL Education Technology
Jun 4, 2020 · Information Security

Data Security Governance: Motivation, Technical Objectives, Classification, and Management Practices

The article explains why data security governance is essential for rapidly growing businesses, outlines technical goals across the data lifecycle, describes data classification and labeling methods, and details approval processes, network security zones, and management controls to protect data throughout its lifecycle.

classificationdata securitygovernance
0 likes · 10 min read
Data Security Governance: Motivation, Technical Objectives, Classification, and Management Practices
Java Architecture Diary
Java Architecture Diary
May 26, 2020 · Backend Development

Secure Your Data with MyBatis‑Plus 3.3.2: New Encryption Features Explained

Version 3.3.2 of MyBatis‑Plus introduces elegant data‑security measures, including YML‑based encrypted configuration, AES key generation, and encrypted database credentials, while also delivering numerous bug fixes and enhancements such as pagination improvements, generator updates, and support for additional databases.

BackendJavadata security
0 likes · 4 min read
Secure Your Data with MyBatis‑Plus 3.3.2: New Encryption Features Explained
Big Data Technology & Architecture
Big Data Technology & Architecture
May 24, 2020 · Big Data

Data Governance Core Areas and Practices for Banking

The article provides a comprehensive overview of banking data governance, covering core domains such as data models, metadata, standards, quality, lifecycle, distribution, exchange, security, and services, and explains how big‑data techniques can improve risk control, product innovation, and operational efficiency.

BankingData Qualitydata security
0 likes · 16 min read
Data Governance Core Areas and Practices for Banking
Architects Research Society
Architects Research Society
Apr 23, 2020 · Fundamentals

The Rise of the Internet of Things (IoT) and Its Business Impact in 2017 and Beyond

The article explains how the Internet of Things (IoT) is transforming everyday objects into data sources, outlines growth predictions for smart homes, wearables, and connected cars, and discusses how businesses can leverage IoT for inventory management, faster purchasing cycles, data‑driven insights, and remote work while highlighting emerging security challenges.

Connected CarsIoTWearables
0 likes · 7 min read
The Rise of the Internet of Things (IoT) and Its Business Impact in 2017 and Beyond
JD Tech Talk
JD Tech Talk
Apr 3, 2020 · Artificial Intelligence

Federated Learning: Application Prospects, Deployment Challenges, and Implementation Methods

This article examines federated learning’s wide‑range application prospects in healthcare, mobile internet, and finance, analyzes the technical and regulatory challenges of deploying such systems, and explains the concrete implementation steps for horizontal and vertical federated learning architectures.

AIFederated LearningHealthcare
0 likes · 11 min read
Federated Learning: Application Prospects, Deployment Challenges, and Implementation Methods
JD Tech Talk
JD Tech Talk
Mar 27, 2020 · Artificial Intelligence

Understanding Federated Learning: Origins, Applications, and Privacy Protection Techniques

This article explains the rapid rise of federated learning, its technical foundations combining machine learning, distributed computing, and privacy protection, practical use cases, intuitive privacy examples, and empirical evidence that it can improve model performance without compromising data security.

Federated Learningartificial intelligencedata security
0 likes · 15 min read
Understanding Federated Learning: Origins, Applications, and Privacy Protection Techniques
Meituan Technology Team
Meituan Technology Team
Mar 12, 2020 · Big Data

Data Governance Practices in Meituan Delivery: Architecture, Standards, and Security

Meituan Delivery’s data‑governance framework combines a four‑layer warehouse architecture with comprehensive business, technical, security, and resource‑management standards, continuous metadata and security controls, and tools such as Wherehows and QuickSight, delivering standardized, secure, and easily shareable data while guiding future optimization and emerging‑technology adoption.

Big DataData ArchitectureData Governance
0 likes · 27 min read
Data Governance Practices in Meituan Delivery: Architecture, Standards, and Security
Tencent Tech
Tencent Tech
Feb 28, 2020 · Information Security

How to Safeguard Enterprise Data in the Cloud: Practical Strategies

This article explains why data security is vital for businesses, outlines common technical, process and human threats, and provides actionable cloud‑based measures—including backup strategies, snapshot usage, permission management, data classification, and encryption—to protect enterprise data throughout its lifecycle.

BackupCloud Servicesaccess control
0 likes · 13 min read
How to Safeguard Enterprise Data in the Cloud: Practical Strategies
YooTech Youzu Tech Team
YooTech Youzu Tech Team
Oct 28, 2019 · Information Security

Key Takeaways from YOOZOO’s First Innovation Security Developer Salon

The first YOOZOO Innovation Security Developer Salon gathered five expert engineers who shared practical solutions on enterprise data security, osquery host monitoring, cloud DDoS defense, black‑box payload generation, and Linux kernel‑mode HIDS, offering deep technical insights for modern security practitioners.

HIDSSecuritycloud security
0 likes · 8 min read
Key Takeaways from YOOZOO’s First Innovation Security Developer Salon
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2019 · Information Security

How Elastic Assured Continuous Data Protection Reduces RPO to Zero

This article examines the rising importance of data security, explains continuous data protection (CDP) concepts, compares traditional backup methods with CDP, outlines implementation models, reviews major vendor solutions, and introduces an elastic, verifiable CDP approach for cloud environments.

Continuous Data ProtectionRPORTO
0 likes · 15 min read
How Elastic Assured Continuous Data Protection Reduces RPO to Zero
Qunar Tech Salon
Qunar Tech Salon
Aug 6, 2019 · Information Security

Data Security Construction at Qunar: Practices and Experience

This article describes Qunar's comprehensive data security framework, covering data classification, warehouse access control, permission compliance, encryption, leakage detection, and the supporting institutional policies that together enable a small security team to protect large‑scale business data.

Qunaraccess controldata classification
0 likes · 13 min read
Data Security Construction at Qunar: Practices and Experience
Didi Tech
Didi Tech
Jul 5, 2019 · Artificial Intelligence

Didi's Open-Source Contributions and Technical Innovations in AI and Big Data

Didi’s platform handles over 700 billion daily ETA requests using AI‑driven real‑time calculations, while its 6,000‑plus engineers rely on open‑source big‑data, cloud and AI frameworks, contribute 23 projects that have earned more than 36,000 stars, and provide anonymized traffic data to academia for transportation and urban‑planning research.

AIBig DataTech Innovation
0 likes · 9 min read
Didi's Open-Source Contributions and Technical Innovations in AI and Big Data
HomeTech
HomeTech
Jun 12, 2019 · Cloud Computing

Design and Implementation of Autohome Enterprise Cloud Disk

The article describes the background, goals, architecture, security, and future plans of Autohome's internally developed enterprise cloud disk, detailing its multi‑layer design, RBAC permission model, file processing, task scheduling, and integration with various corporate systems to improve collaborative work efficiency.

EnterpriseRBACcloud storage
0 likes · 16 min read
Design and Implementation of Autohome Enterprise Cloud Disk
360 Tech Engineering
360 Tech Engineering
Jun 10, 2019 · Information Security

Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director

In this interview, 360’s Big Data Center Technical Director Xu Hao discusses the critical data security challenges faced by enterprises, outlines regulatory, system‑level, and managerial risks, and shares practical strategies for building robust security governance, platform architecture, permission controls, and cloud‑based data protection.

Big Datacloud securitydata security
0 likes · 13 min read
Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director
Tencent Cloud Developer
Tencent Cloud Developer
Apr 17, 2019 · Industry Insights

How Serverless Is Redefining the Big Front‑End Landscape

A panel of 26 front‑end experts explored Serverless's technical value, the resistance of traditional development models, data security concerns, and the organizational shifts required for developers to thrive in a unified full‑stack, serverless ecosystem.

Big Front-EndServerlesscloud development
0 likes · 8 min read
How Serverless Is Redefining the Big Front‑End Landscape
ITPUB
ITPUB
Feb 15, 2019 · Information Security

How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model

This article details Meituan's data security platform architecture, explaining why traditional ACL and RBAC models fall short for data‑level control, how a new hierarchical permission model and plug‑in services were designed, and the microservice, caching, and high‑availability techniques used to support flexible, high‑QPS data governance across multiple business lines.

MicroservicesPermission Modelaccess control
0 likes · 18 min read
How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model
Tencent Cloud Developer
Tencent Cloud Developer
Feb 15, 2019 · Artificial Intelligence

Trends and Challenges in Artificial Intelligence: Data Security, Deployment Bottlenecks, and Transfer Learning

The article reviews China's AI progress and lingering gaps, highlights data‑security regulations and deployment bottlenecks caused by siloed “small data,” champions transfer learning as a solution for limited data, dispels AI‑cold‑war and job‑loss myths, and forecasts continued growth through secure, collaborative, and efficient AI deployment.

AI trendsartificial intelligencedata security
0 likes · 13 min read
Trends and Challenges in Artificial Intelligence: Data Security, Deployment Bottlenecks, and Transfer Learning
Youzan Coder
Youzan Coder
Jan 18, 2019 · Information Security

Security Architecture and Data Masking in a Big Data Platform

The article outlines Youzan’s evolving security architecture for its big‑data platform—starting with Apache Ranger‑based permission control, moving to a centralized permission‑management service for easier requests and audits, and finally implementing column‑level masking via SQL rewriting to protect sensitive data while balancing usability.

Column MaskingSQL Rewritingaccess control
0 likes · 10 min read
Security Architecture and Data Masking in a Big Data Platform
UCloud Tech
UCloud Tech
May 28, 2018 · Blockchain

How Intel SGX Enhances Blockchain Smart Contracts for Secure Data Flow

This article explains how integrating Intel SGX's trusted execution environment with blockchain smart contracts enhances data confidentiality, enables complex computations, and addresses privacy and scalability challenges in decentralized data exchange for various applications.

BlockchainDecentralizationIntel SGX
0 likes · 7 min read
How Intel SGX Enhances Blockchain Smart Contracts for Secure Data Flow
Alibaba Cloud Developer
Alibaba Cloud Developer
May 10, 2018 · Backend Development

How Alibaba Engineered a Scalable Global HR Shared Service Platform

Alibaba's HRSSC initiative tackles internationalization, compliance, and rapid deployment challenges by building a flexible, secure, and cloud‑native shared service platform that empowers overseas HR operations with zero‑code configurability, dynamic templates, and end‑to‑end data encryption.

BackendHRcloud
0 likes · 11 min read
How Alibaba Engineered a Scalable Global HR Shared Service Platform
Architects Research Society
Architects Research Society
Feb 24, 2018 · Blockchain

Beyond Cryptocurrency: The Expanding Potential of Blockchain Technology

The article explores how blockchain, as highlighted by Pangea Money Transfer’s VP Joshua Gordon‑Blake, offers far‑reaching benefits beyond digital currencies, including secure asset digitization, reduced transaction costs, improved supply‑chain transparency, digital identity for immigrants, and transformative applications in remittances, healthcare, and government services.

data securitydigital identityfinancial inclusion
0 likes · 5 min read
Beyond Cryptocurrency: The Expanding Potential of Blockchain Technology
Architects' Tech Alliance
Architects' Tech Alliance
Jan 3, 2018 · Information Security

Data Security and Encryption Technologies: Standards, Solutions, and Best Practices

Data breaches have surged, affecting governments, enterprises, and security vendors, prompting the need for robust encryption across storage, application, and gateway layers, with standards such as FIPS 140‑2 and solutions from Vormetric and SafeNet offering transparent, compatible, and managed encryption for on‑premises and cloud environments.

FIPS140-2cloud encryptiondata security
0 likes · 9 min read
Data Security and Encryption Technologies: Standards, Solutions, and Best Practices
21CTO
21CTO
Nov 21, 2017 · Operations

How We Scaled WeChat Pay’s Transaction Records to Billions Daily

This article chronicles the evolution of WeChat Pay’s transaction record system—from early key/value storage bottlenecks and incomplete data to a distributed, tiered architecture that supports billions of daily records, improves query performance, ensures data security, and handles holiday traffic spikes through flexible throttling.

Distributed SystemsWeChat Paydata security
0 likes · 11 min read
How We Scaled WeChat Pay’s Transaction Records to Billions Daily
Tencent Architect
Tencent Architect
Nov 21, 2017 · Operations

Redesign and Optimization of the WeChat Pay Transaction Record System

This article presents a comprehensive case study of how WeChat Pay rebuilt its transaction record storage to handle massive data growth, improve performance, ensure data completeness, and strengthen security through a distributed key‑value architecture, hierarchical archiving, and robust operational safeguards.

Distributed KVSystem ArchitectureWeChat Pay
0 likes · 10 min read
Redesign and Optimization of the WeChat Pay Transaction Record System
dbaplus Community
dbaplus Community
Oct 9, 2017 · Information Security

How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies

This article explains how MongoDB’s security features—including access control, authentication, encryption, data discovery, retention policies, zone sharding, backup, monitoring, and audit logging—help organizations meet GDPR requirements while minimizing operational overhead and ensuring data sovereignty.

BackupGDPRMongoDB
0 likes · 18 min read
How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies
ITPUB
ITPUB
Sep 23, 2017 · Databases

Essential DBA Checklist: Avoid Common MySQL Mistakes and Boost Reliability

This guide shares a seasoned DBA's practical checklist covering environment awareness, hardware considerations, runtime monitoring, data security, routine operations, fault‑prevention plans, architecture insights, and the right mindset to help database professionals reduce errors and improve system stability.

DBADatabase operationsdata security
0 likes · 19 min read
Essential DBA Checklist: Avoid Common MySQL Mistakes and Boost Reliability
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Apr 2, 2017 · Artificial Intelligence

AI Leaders Discuss China’s Opportunities and Challenges – Key Takeaways

At the 2017 China (Shenzhen) IT Leaders Summit, top executives from Tencent, Baidu, Microsoft and Digital China debated the four essential elements for AI advancement—scenarios, big data, computing power, and talent—while addressing data security, openness, and the broader impact of artificial intelligence on industry and society.

AI strategyChinaartificial intelligence
0 likes · 8 min read
AI Leaders Discuss China’s Opportunities and Challenges – Key Takeaways
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 30, 2016 · Big Data

How Alibaba’s Double 11 Turned Big Data into a Global E‑Commerce Game‑Changer

MIT Technology Review reports that Alibaba’s 2022 Double 11 shopping festival set new e‑commerce records while showcasing the company’s advanced big‑data, AI, and cloud‑computing technologies, highlighting massive transaction volumes, high‑quality data processing, robust security measures, and the strategic push toward global digital infrastructure.

Big Datacloud computingdata security
0 likes · 11 min read
How Alibaba’s Double 11 Turned Big Data into a Global E‑Commerce Game‑Changer
Architect
Architect
Mar 10, 2016 · Big Data

Analysis and Practice of a Real-Time Hadoop Data Security Solution

The article presents a detailed technical overview of Apache Eagle's real-time Hadoop data security architecture, covering distributed data collection, stream processing, metadata‑driven policy enforcement, machine‑learning‑based anomaly detection, and integration with Hadoop ecosystem components such as HBase, Kafka, and Storm.

Apache EagleBig DataHadoop
0 likes · 25 min read
Analysis and Practice of a Real-Time Hadoop Data Security Solution
Architect
Architect
Jan 5, 2016 · Big Data

Apache Eagle: eBay’s Open‑Source Real‑Time Hadoop Data Security Platform

The article provides a comprehensive technical overview of Apache Eagle, an open‑source, distributed, real‑time security monitoring and alerting platform for Hadoop developed by eBay, covering its motivation, architecture, core components, machine‑learning based detection, typical use cases, and future development directions.

Apache EagleBig DataHadoop
0 likes · 15 min read
Apache Eagle: eBay’s Open‑Source Real‑Time Hadoop Data Security Platform