Tagged articles
8 articles
Page 1 of 1
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 16, 2026 · Artificial Intelligence

Four CLAUDE.md Rules That Earned 130k GitHub Stars

This article presents four concrete guidelines for writing a CLAUDE.md file that improves Claude Code's behavior, explains the underlying problems with LLMs, details each rule with examples, shows how to install the rules as a plugin or raw file, and provides validation criteria to ensure the guidelines work in practice.

ClaudeCode GenerationGuidelines
0 likes · 9 min read
Four CLAUDE.md Rules That Earned 130k GitHub Stars
Architects' Tech Alliance
Architects' Tech Alliance
Jul 7, 2025 · Artificial Intelligence

Why China’s First AI Large‑Model Private‑Deployment Standard Matters

China’s first group standard, the “AI Large Model Private Deployment Technical Implementation and Evaluation Guide,” has been launched to address the technical, security, and cost challenges of privately deploying large AI models, offering a unified framework for model selection, deployment, optimization, and multi‑party collaboration.

AIGuidelinesPrivate Deployment
0 likes · 10 min read
Why China’s First AI Large‑Model Private‑Deployment Standard Matters
Java Captain
Java Captain
Jun 12, 2025 · Information Security

How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide

This comprehensive 2025 guide explains how to identify WeChat restriction types, prepare necessary evidence and materials, use both client‑side and web‑based self‑service tools, complete assisted verification, and follow new regulations to successfully restore account access.

GuidelinesSecurityWeChat
0 likes · 9 min read
How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide
21CTO
21CTO
Mar 9, 2025 · Fundamentals

How Bjarne Stroustrup Envisions Safer C++ with Mandatory Guidelines

Bjarne Stroustrup urges the C++ community and the WG21 standards committee to adopt mandatory guideline configuration files, known as Profiles, to improve type and memory safety, while highlighting recent language features, upcoming C++23 and C++26 enhancements, and the broader evolution of the language.

Bjarne StroustrupC++C++23
0 likes · 9 min read
How Bjarne Stroustrup Envisions Safer C++ with Mandatory Guidelines
Architects Research Society
Architects Research Society
Oct 11, 2022 · Fundamentals

Application Architecture Guidelines and Enterprise Solution Architecture Roles

This article explains the concept and logical levels of application architecture within enterprise solution architecture, outlines the roles of enterprise and project‑level solution and application architects, and describes how standardization, reuse, and coordination of current and future states are achieved through defined guidelines and SOA practices.

GuidelinesSOArole definition
0 likes · 10 min read
Application Architecture Guidelines and Enterprise Solution Architecture Roles
Architects Research Society
Architects Research Society
May 14, 2020 · Fundamentals

Defining Business Capabilities: Guidelines and Best Practices

This article explains what a business capability is, why it matters, and provides nine practical guidelines to help organizations identify, distinguish, and validate capabilities when building capability maps, emphasizing clear definitions, outcomes, and unique intent.

Guidelinesbusiness capabilitycapability mapping
0 likes · 9 min read
Defining Business Capabilities: Guidelines and Best Practices
Efficient Ops
Efficient Ops
Dec 6, 2018 · Information Security

What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?

The draft "Internet Personal Information Security Protection Guideline" issued by China's Ministry of Public Security outlines comprehensive management mechanisms, technical safeguards, and business processes to help internet enterprises protect personal data throughout its lifecycle, and invites public feedback via the national security platform.

ChinaData ProtectionGuidelines
0 likes · 27 min read
What Are the Key Recommendations in China's Draft Internet Personal Information Security Guidelines?