Tagged articles
428 articles
Page 5 of 5
Architecture Digest
Architecture Digest
Jul 1, 2016 · Fundamentals

Key Architectural Practices and Insights for Scalable, High‑Availability Systems

This article collection reviews essential architectural concepts—including scalable web development, business‑centric high‑availability design, front‑end/back‑end separation with REST, large‑scale instant‑messaging platforms, industrial IoT frameworks, software‑defined storage, and the personal growth required of architects—providing practical guidance for building robust, adaptable systems.

IoTScalabilitySoftware-Defined Storage
0 likes · 7 min read
Key Architectural Practices and Insights for Scalable, High‑Availability Systems
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Apr 20, 2016 · Operations

Why Telecom Operators Are Poised to Lead the Smart Home Revolution

The article analyzes how telecom operators leverage their extensive cloud‑network capabilities, trusted brand, and widespread offline channels to dominate the emerging smart‑home market, outlines three operator‑centric business models, and details Huawei's OpenLife solution, standards work, and market forecasts for the IoT ecosystem.

Business ModelIoTOpenLife
0 likes · 11 min read
Why Telecom Operators Are Poised to Lead the Smart Home Revolution
Architects' Tech Alliance
Architects' Tech Alliance
Apr 19, 2016 · Fundamentals

An Overview of the Internet of Things (IoT): Architecture, Market Trends, Security, and Network Challenges

This article provides a comprehensive overview of the Internet of Things (IoT), covering its definition, layered architecture, rapid market growth, key application domains, data integration challenges, security concerns, and network load management, highlighting the shift from traditional IT to cloud‑enabled, sensor‑driven infrastructures.

IoTSecuritycloud computing
0 likes · 12 min read
An Overview of the Internet of Things (IoT): Architecture, Market Trends, Security, and Network Challenges
21CTO
21CTO
Feb 27, 2016 · Information Security

Samy Kamkar’s YouTube Hacks: Turning Everyday Gadgets into Security Experiments

Samy Kamkar’s YouTube series “Applied Hacking” showcases a range of inventive security experiments—from toy‑controlled garage doors and 3D‑printed lock‑picking robots to USB keyloggers, drone hijacking, remote‑car exploits, and credit‑card cloning tools—illustrating how everyday devices can be repurposed for hacking.

Hardware HackingIoTSamy Kamkar
0 likes · 9 min read
Samy Kamkar’s YouTube Hacks: Turning Everyday Gadgets into Security Experiments
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Feb 14, 2016 · Cloud Computing

5 Key Insights into the Evolving IoT Platform Landscape

An in‑depth look at the rapidly growing IoT platform market reveals four platform types, an eight‑component architecture, diverse entry strategies, the pivotal role of open‑source interoperability, and how data and connectivity drive true platform value, backed by market forecasts and real‑world examples.

IoTarchitecturemarket
0 likes · 12 min read
5 Key Insights into the Evolving IoT Platform Landscape
21CTO
21CTO
Feb 12, 2016 · Artificial Intelligence

Inside Alphabet’s 2015 Projects: AI, VR, Self‑Driving Cars, and More

The article surveys Alphabet’s 2015 initiatives—including AI research at DeepMind, virtual‑reality hardware, autonomous‑driving efforts, robotics, IoT platforms, and experimental products like Google Glass and Tango—highlighting how Google’s restructuring has spawned a sprawling portfolio of cutting‑edge technologies.

AlphabetGoogleIoT
0 likes · 40 min read
Inside Alphabet’s 2015 Projects: AI, VR, Self‑Driving Cars, and More
21CTO
21CTO
Feb 9, 2016 · Fundamentals

9 Bold Predictions Shaping the Future of Programming

This article surveys nine forward‑looking predictions—from REST‑driven IoT and resurging binary protocols to video‑centric web experiences, smartphone‑only functionalities, massive databases, evolving JavaScript roles, a PHP comeback, and universal coding education—offering a roadmap for developers navigating rapid technological change.

IoTbinary protocolsfuture of software
0 likes · 15 min read
9 Bold Predictions Shaping the Future of Programming
21CTO
21CTO
Nov 23, 2015 · Fundamentals

Designing Reliable Industrial IoT: Architecture, Middleware & Real-World Cases

This article explains the technical differences between "Internet+" and industrial IoT, outlines the three‑tier architecture (device, cloud, monitoring), details middleware platforms YFIOs and YFCloud, and presents several practical deployment examples across agriculture, health, fisheries and wastewater treatment.

Industrial IoTIoTarchitecture
0 likes · 19 min read
Designing Reliable Industrial IoT: Architecture, Middleware & Real-World Cases
21CTO
21CTO
Nov 10, 2015 · Fundamentals

What Core Technologies Will Power the Future Industrial Internet?

The article outlines the foundational technologies and strategic components—such as ubiquitous super‑computing terminals, software‑defined machines, knowledge‑work automation, cross‑enterprise standards, system security, robotics, distributed 3D‑printing, brain‑machine interfaces, and virtual worlds—that together shape the emerging Industrial Internet ecosystem.

AIIndustrial InternetIoT
0 likes · 26 min read
What Core Technologies Will Power the Future Industrial Internet?
21CTO
21CTO
Nov 1, 2015 · Product Management

Why “Internet+” Isn’t Just Adding Tech – It’s Redefining Connections

The article explains how “Internet+” differs from simply adding the internet to existing businesses, emphasizing that true digital transformation reshapes connections, user experience, and business models, and outlines emerging trends like IoE, IoT, and the shift from customer‑centric to user‑centric thinking.

Business ModelDigital TransformationInternet
0 likes · 14 min read
Why “Internet+” Isn’t Just Adding Tech – It’s Redefining Connections
21CTO
21CTO
Oct 26, 2015 · Big Data

Why the Internet May Fade: The Rise of the Internet of Things

The article explores Eric Schmidt's bold claim that the traditional Internet will disappear, outlines how the Internet of Things is poised to dominate with massive market potential, highlights major tech companies' IoT strategies, compares IoT with the Internet, and details the key technologies driving this new ecosystem.

Big DataIoTinternet of things
0 likes · 11 min read
Why the Internet May Fade: The Rise of the Internet of Things
21CTO
21CTO
Sep 2, 2015 · Product Management

Why Most Smart Gadgets Fail: The Real Need for Pain Points and Frequency

The article argues that many smart products suffer from pseudo‑demand because they ignore genuine user pain points and usage frequency, illustrating the point with examples like a smart mouse trap, a connected water cup, and Xiaomi's phone strategy.

IoTMarket Strategypseudo demand
0 likes · 8 min read
Why Most Smart Gadgets Fail: The Real Need for Pain Points and Frequency
Architect
Architect
Aug 27, 2015 · Fundamentals

IoT Architecture Model and Layered Design for the Lan Platform

This article presents a practical IoT layered architecture model, contrasting the classic three‑tier view with a four‑tier structure (hardware, coordination, service, and application layers), explains the role of each layer, and advocates using hexagonal architecture for the service layer in the Lan platform.

Hexagonal ArchitectureIoTLayered Design
0 likes · 4 min read
IoT Architecture Model and Layered Design for the Lan Platform
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Jul 31, 2015 · R&D Management

How IoT Can Stop Children From Being Locked Inside Cars

This article examines recent tragic cases of children trapped in vehicles, explains why conventional self‑rescue methods fail for infants, and presents an IoT‑based safety‑seat monitoring system that detects lock status, vehicle power state, and environmental hazards to alert caregivers instantly.

IoTautomotive sensorschild safety
0 likes · 6 min read
How IoT Can Stop Children From Being Locked Inside Cars
Architect
Architect
Jul 3, 2015 · Information Security

Evolution of DDoS Attacks and Mitigation Strategies

The article outlines the evolution of DDoS attacks from early botnet‑based floods to reflection attacks leveraging open servers and finally IoT‑device protocols like SSDP, explains their amplification mechanisms, presents statistical trends, and discusses comprehensive mitigation techniques including source verification, traffic shaping, ISP cooperation, CDN protection, and big‑data analytics.

BotnetDDoSIoT
0 likes · 11 min read
Evolution of DDoS Attacks and Mitigation Strategies
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 3, 2015 · Backend Development

Designing Scalable Netty Push Services: Real‑World IoT Lessons

This article analyzes common push‑service questions, presents a memory‑leak case from an IoT MQTT middleware, and provides detailed Netty design guidelines—including file‑handle limits, CLOSE_WAIT handling, thread and task management, heartbeat tuning, buffer allocation, memory‑pool usage, logging pitfalls, TCP and JVM optimizations—to help engineers build stable, high‑performance million‑connection push servers.

IoTNettyPush Service
0 likes · 23 min read
Designing Scalable Netty Push Services: Real‑World IoT Lessons
Baidu Tech Salon
Baidu Tech Salon
Oct 13, 2014 · Fundamentals

12 Speculative Futures for the Programming World

Looking ahead, programmers may see GPUs supplant CPUs, databases handle complex analytics, JavaScript dominate browsers and servers, Android power every device, the Internet of Things expand, open‑source ecosystems seek sustainable funding, CMS tools become richer, plugin‑centric development replace monolithic coding, command‑line interfaces endure, education strives for true simplification, outsourcing battles automation, and managers risk growing technically illiterate.

AndroidGPUIoT
0 likes · 10 min read
12 Speculative Futures for the Programming World
Suning Design
Suning Design
May 15, 2014 · Mobile Development

How Beacons Transform Mobile Experiences: From Retail to Real‑World Interaction

Beacon technology creates a proximity system that lets mobile apps automatically deliver context‑aware information to users in physical spaces, enabling new experiences in museums, retail, coffee shops, hotels, and beyond while raising design, privacy, and implementation considerations.

IoTLocation-Based ServicesProximity
0 likes · 11 min read
How Beacons Transform Mobile Experiences: From Retail to Real‑World Interaction
Baidu Tech Salon
Baidu Tech Salon
Apr 9, 2014 · Fundamentals

Key Highlights of Java SE 8 and Its Role in Modern Development

Java remains the dominant, widely‑employed language—especially in China—and Java SE 8 revitalizes it with lambda expressions, default interface methods, a modern date‑time API and numerous refinements, while its cross‑platform design fuels IoT and embedded growth and sustains a lucrative, evolving ecosystem.

IoTJavaJava SE 8
0 likes · 4 min read
Key Highlights of Java SE 8 and Its Role in Modern Development