Tagged articles
13 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Dec 31, 2025 · Operations

Automate DDoS‑Resistant Nginx Clusters with Ansible in Minutes

This guide demonstrates how to use Ansible to automatically deploy a multi‑node Nginx cluster with built‑in DDoS protection, covering architecture design, environment preparation, playbook creation, monitoring integration, performance testing, troubleshooting, and future extension options.

AnsibleAutomationDDoS protection
0 likes · 12 min read
Automate DDoS‑Resistant Nginx Clusters with Ansible in Minutes
Alibaba Cloud Observability
Alibaba Cloud Observability
Feb 11, 2025 · Information Security

DeepSeek Attack Reveals AI Security Risks and Cloud‑Native Observability Best Practices

The article examines DeepSeek's rapid rise and the large‑scale malicious attacks it faced, highlighting AI security vulnerabilities, and then provides a detailed, cloud‑native guide on building a comprehensive, observable security architecture on Alibaba Cloud using DDoS protection, WAF, logging, and anomaly detection.

AI securityAlibaba CloudDDoS protection
0 likes · 13 min read
DeepSeek Attack Reveals AI Security Risks and Cloud‑Native Observability Best Practices
Alibaba Cloud Native
Alibaba Cloud Native
Feb 7, 2025 · Information Security

How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability

The article examines DeepSeek’s rapid rise, the large‑scale malicious attacks it suffered, and then provides a detailed, cloud‑native security observability guide using Alibaba Cloud services such as DDoS protection, WAF, CLB, SAS, and SLS for logging, monitoring, anomaly detection, and alert response.

AI securityAlibaba CloudCloud Native
0 likes · 15 min read
How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability
JavaEdge
JavaEdge
Dec 15, 2024 · Cloud Computing

Is Serverless a Scam? Uncovering Hidden Costs, Complexity, and Reliability Risks

The article argues that serverless platforms often hide high costs, operational complexity, and reliability issues, contrasting them with traditional VPS and Cloudflare solutions while highlighting DDoS protection, pricing traps, and the challenges of managing micro‑service architectures.

DDoS protectionServerlesscloud computing
0 likes · 11 min read
Is Serverless a Scam? Uncovering Hidden Costs, Complexity, and Reliability Risks
Open Source Linux
Open Source Linux
Jun 27, 2024 · Operations

Comprehensive Guide to Building a Resilient, High‑Performance Web Infrastructure

This guide outlines essential steps for creating a robust, high‑availability website architecture, covering domain acquisition, DNS management, CDN deployment, image caching, data center selection, monitoring, DDoS mitigation, redundancy, server configuration, database replication, testing environments, security practices, and operational tooling.

Cloud ServicesDDoS protectionOperations
0 likes · 12 min read
Comprehensive Guide to Building a Resilient, High‑Performance Web Infrastructure
JD Retail Technology
JD Retail Technology
Jun 10, 2022 · Operations

JD International 618 Promotion: Technical Operations, DDoS Protection, and Performance Testing

The article details JD International's technical preparation for the 618 sales event, covering operational planning, DDoS mitigation with Cloudflare, performance testing methodologies, cross‑team collaboration, and real‑time monitoring to ensure system stability and a seamless shopping experience across multiple regions.

DDoS protectionPerformance Testingcloud computing
0 likes · 13 min read
JD International 618 Promotion: Technical Operations, DDoS Protection, and Performance Testing
JD Cloud Developers
JD Cloud Developers
Nov 11, 2020 · Information Security

How JD.com Secures Its 11.11 Shopping Festival: Inside the Fortress

This article explains how JD.com treats its platform as a bustling city and builds a multi‑layered security fortress—including baseline inspections, asset management, rapid vulnerability scanning, key‑system hardening, red‑blue attack simulations, and TB‑level DDoS defense—to ensure safe, orderly operations during the massive 11.11 sales event.

DDoS protectionLarge-Scale EventsRed-Blue Team
0 likes · 9 min read
How JD.com Secures Its 11.11 Shopping Festival: Inside the Fortress
Youzan Coder
Youzan Coder
Feb 27, 2020 · Information Security

System Stability and Security Measures in SaaS: Yazan's Approach

Yazan’s SaaS platform maintains 99.99% uptime through robust IaaS infrastructure, dedicated DBA and network teams, while defending against DDoS attacks and data breaches with ISO‑27001 and CSA C*STAR‑aligned security controls, employing multi‑cloud real‑time and cold backups and offering compensation for outage‑related business impacts.

DDoS protectionSaaSbusiness continuity
0 likes · 17 min read
System Stability and Security Measures in SaaS: Yazan's Approach
Tencent Cloud Developer
Tencent Cloud Developer
Dec 4, 2019 · Cloud Computing

IPv6 Development in China and Tencent Cloud's Large-Scale Transformation Practice

The article traces China’s IPv6 evolution from the 1999 RIPE NCC allocation through low adoption rates, the 2017 national action plan, and the 2019 IPv4 exhaustion, while detailing Tencent Cloud’s four‑phase, dual‑stack migration—spanning over 50 products and 150 million users—driven by innovative SDN, DDoS defense, and automated address management technologies.

DDoS protectionDual-Stack NetworkIPv6
0 likes · 15 min read
IPv6 Development in China and Tencent Cloud's Large-Scale Transformation Practice
UCloud Tech
UCloud Tech
Nov 26, 2019 · Information Security

Uncover the Top Cloud Security Threats and Proven Defense Strategies

This article outlines the most common cloud computing security risks—including DDoS, CC, web application, host intrusion, data leakage, site hijacking, and insider leaks—then presents corresponding cloud security services such as anti‑DDoS cleaning, intrusion detection, and advanced protection features to help safeguard cloud assets.

DDoS protectionintrusion detectionrisk mitigation
0 likes · 7 min read
Uncover the Top Cloud Security Threats and Proven Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Mar 15, 2018 · Information Security

Cloud Security Solutions by Tencent

Tencent Cloud Security, led by Deputy Director Xu Dongshan, delivers a multi‑stage strategy—from monitoring partner services in the open platform era, to enforcing industry‑standard safeguards in public cloud, and offering targeted internet‑industry solutions—covering governance, physical, platform, compliance, network, host and application protection through flagship products Dayu (4 TB+ DDoS mitigation), Tianyu (anti‑scraping, content verification, captcha) and Legu (customizable mobile hardening).

Big YuDDoS protectionLe Fu
0 likes · 9 min read
Cloud Security Solutions by Tencent
Efficient Ops
Efficient Ops
Feb 20, 2017 · Information Security

Inside YY's Security Ops: Real-World Incident Stories and Architecture

This article shares YY's security operations journey, detailing real incident response scenarios, the evolution of their security infrastructure from 2012 onward, and the key factors considered when building a robust security ops system, including DDoS protection, WAF, vulnerability scanning, intrusion detection, and data‑driven automation.

DDoS protectionSecurity Operationsbig data analytics
0 likes · 24 min read
Inside YY's Security Ops: Real-World Incident Stories and Architecture