Tagged articles
53 articles
Page 1 of 1
21CTO
21CTO
May 16, 2026 · Industry Insights

What Rust’s New LLM Usage Policy Means for Contributors

The Rust team has published a living policy that defines allowed and prohibited uses of large language models in the rust-lang/rust repository, aiming to curb low‑quality AI‑generated pull requests and clarify contributor responsibilities.

AI GovernanceLLMRust
0 likes · 5 min read
What Rust’s New LLM Usage Policy Means for Contributors
Digital Planet
Digital Planet
Apr 25, 2026 · Industry Insights

SpaceX/Musk to Acquire Cursor for $60B as Moon's Dark Side Unveils KimiK2.6

This week’s AI roundup highlights rapid technical iteration and market rollout, including SpaceX’s $60 billion acquisition of Cursor, the release of Moon’s Dark Side flagship model KimiK2.6, new Windows 11 preview agents, policy pushes from China’s State Council, and multiple major model launches and investigations across the globe.

AIacquisitionsagents
0 likes · 9 min read
SpaceX/Musk to Acquire Cursor for $60B as Moon's Dark Side Unveils KimiK2.6
AI Large-Model Wave and Transformation Guide
AI Large-Model Wave and Transformation Guide
Apr 20, 2026 · Industry Insights

What the Latest AI Industry Updates Reveal: GPT‑4.5, GLM‑5.1, Optimus, Nvidia B200 and More

A comprehensive roundup shows OpenAI's GPT‑4.5 expanding context to 5 million tokens, Zhipu's GLM‑5.1 ecosystem surpassing 500 fine‑tuned models, Tesla's Optimus field test at BMW, Nvidia's B200 production delay, DeepMind's AlphaEvolve 2.0 chip‑design breakthrough, and a wave of AI policy, market, and regulatory moves across China and the globe.

AI industryBenchmarkMarket analysis
0 likes · 13 min read
What the Latest AI Industry Updates Reveal: GPT‑4.5, GLM‑5.1, Optimus, Nvidia B200 and More
Linux Kernel Journey
Linux Kernel Journey
Apr 9, 2026 · Information Security

Why Traditional AI Agent Sandboxes Fail and How Sandlock Provides a Lightweight Alternative

The article argues that heavy container‑ or micro‑VM‑based sandboxes mis‑solve AI agent security, because the real threat is prompt injection at the application layer, and demonstrates that a policy‑first approach using Linux Landlock, seccomp and per‑tool isolation—embodied in the open‑source Sandlock sandbox—delivers strong protection without root or heavyweight isolation.

AI agentsLandlockLinux
0 likes · 15 min read
Why Traditional AI Agent Sandboxes Fail and How Sandlock Provides a Lightweight Alternative
Black & White Path
Black & White Path
Feb 8, 2026 · Industry Insights

Why the White House Is Pushing Built‑In Security for AI

The U.S. White House’s Office of the National Cyber Director is drafting an AI safety policy framework that embeds security into the national AI stack, citing concerns such as data‑poisoning attacks and autonomous hacking tools while aiming to avoid the retroactive fixes that plagued the early Internet.

AI SafetyAnthropicUnited States
0 likes · 4 min read
Why the White House Is Pushing Built‑In Security for AI
AI Info Trend
AI Info Trend
Jan 20, 2026 · Industry Insights

How ChatGPT Is Transforming US Healthcare: Key Findings from OpenAI’s New Report

OpenAI’s recent “AI as a Healthcare Ally” report reveals that ChatGPT is now embedded in everyday medical interactions across the United States, with millions of health‑related queries daily, doctors increasingly relying on AI tools, and policy recommendations aimed at expanding safe, equitable AI‑driven healthcare services.

AIChatGPTHealthcare
0 likes · 8 min read
How ChatGPT Is Transforming US Healthcare: Key Findings from OpenAI’s New Report
Data Party THU
Data Party THU
Oct 19, 2025 · Industry Insights

Will AI Trigger a Massive White‑Collar Layoff? Experts Warn of 10‑20% Unemployment

Recent data shows that AI has already eliminated over 10,000 U.S. jobs in early 2025, prompting CEOs and scholars to warn that up to half of entry‑level office positions could disappear within five years, potentially pushing unemployment rates to 10‑20% and sparking a fierce debate over government versus private‑sector solutions.

AIIndustry analysisLayoffs
0 likes · 8 min read
Will AI Trigger a Massive White‑Collar Layoff? Experts Warn of 10‑20% Unemployment
AI Info Trend
AI Info Trend
Sep 21, 2025 · Industry Insights

How the Global AI Race Will Redefine Nations and Economies by 2030

A new BCG‑FICCI white paper shows AI could add $15.7 trillion to global GDP by 2030, but stark differences in compute, data, models and talent across countries risk widening a digital divide, prompting governments and firms to adopt the RISE framework for coordinated action.

AIEconomic ImpactRISE Framework
0 likes · 8 min read
How the Global AI Race Will Redefine Nations and Economies by 2030
AI Info Trend
AI Info Trend
Aug 31, 2025 · Industry Insights

China’s AI+ Strategy: Roadmap, Goals, and Industry Opportunities

The article outlines China’s newly released "AI+" action plan, detailing its three‑stage development targets through 2027, 2030 and 2035, six priority initiatives, eight foundational support capabilities, and the expected impact on the AI industry and broader economy.

AI MarketChinaartificial intelligence
0 likes · 7 min read
China’s AI+ Strategy: Roadmap, Goals, and Industry Opportunities
Software Development Quality
Software Development Quality
Aug 21, 2025 · Information Security

Essential Data Security Red Lines: What Every Employee Must Follow

This document outlines the background, scope, key definitions, and strict data security red lines that all employees must adhere to, including prohibitions on bypassing security measures, unauthorized data use, external disclosures, cross‑border transfers, and requirements for handling sensitive information.

Data Protectioncompliancedata security
0 likes · 4 min read
Essential Data Security Red Lines: What Every Employee Must Follow
AI Info Trend
AI Info Trend
Jul 22, 2025 · Industry Insights

What the 2025 China AI Report Reveals About the Next AI Boom

The 2025 China AI Application Development Report, jointly released by China Central Television and Alibaba Cloud Research Institute, outlines a new "654" framework, highlights six major technology trends, five emerging application scenarios, a four‑force industry model, and offers policy recommendations to accelerate AI adoption across the nation.

AIChinaReport
0 likes · 5 min read
What the 2025 China AI Report Reveals About the Next AI Boom
AI Algorithm Path
AI Algorithm Path
May 18, 2025 · Artificial Intelligence

Reinforcement Learning Tutorial Part 1: Core Concepts Explained

This article introduces the fundamental concepts of reinforcement learning, covering the agent‑environment interaction, key terminology, reward structures, task types, policies, value functions, the Bellman equations, and how optimal strategies are derived and approximated in practice.

Bellman equationMarkov Decision ProcessOptimal Policy
0 likes · 13 min read
Reinforcement Learning Tutorial Part 1: Core Concepts Explained
Architects' Tech Alliance
Architects' Tech Alliance
May 11, 2025 · Industry Insights

Why China’s Intelligent Computing Centers Are Poised for Explosive Growth

The article analyzes China’s rapid expansion of intelligent computing centers, covering market forecasts, government policies, regional deployment patterns, major telecom operators' strategies, the industry value chain, and future trends that together signal a sustained surge in AI‑focused compute infrastructure across the nation.

AI InfrastructureChinaHPC
0 likes · 11 min read
Why China’s Intelligent Computing Centers Are Poised for Explosive Growth
MaGe Linux Operations
MaGe Linux Operations
May 9, 2025 · Artificial Intelligence

Will Trump’s Simple AI Chip Export Plan Undermine Global Tech Controls?

Trump’s administration plans to overturn the Biden-era AI chip export curbs, proposing a streamlined global licensing system that critics say could boost US innovation but also raise security concerns, while market reactions see Nvidia and AMD shares rise and Chinese AI chip development accelerates.

BidenChip ExportTrump
0 likes · 6 min read
Will Trump’s Simple AI Chip Export Plan Undermine Global Tech Controls?
Architects' Tech Alliance
Architects' Tech Alliance
Apr 14, 2025 · Industry Insights

US vs China AI: Who Leads the Race in 2025? A Deep Industry Comparison

This article provides a comprehensive analysis of the divergent AI development paths of the United States and China, covering policy, hardware, software ecosystems, market scale, and future competitive dynamics, and highlights the strengths, weaknesses, and strategic challenges each side faces in the global AI landscape.

2025AIChina
0 likes · 11 min read
US vs China AI: Who Leads the Race in 2025? A Deep Industry Comparison
Architecture Breakthrough
Architecture Breakthrough
Feb 25, 2025 · Industry Insights

How China’s ‘One Committee, One Bank, One Bureau, One Council’ Reshapes Financial Supervision

The article outlines China’s newly restructured financial regulatory framework—centered on a single central committee, the People’s Bank, a dedicated bureau and council—detailing its party‑state leadership model, key institutions, historical evolution, and the implications for stable financial governance.

ChinaGovernmentfinancial regulation
0 likes · 8 min read
How China’s ‘One Committee, One Bank, One Bureau, One Council’ Reshapes Financial Supervision
AntTech
AntTech
Jan 3, 2025 · Artificial Intelligence

2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference

The 2024 Generative Large Model Security Assessment White Paper, jointly authored by the Chinese Academy of Sciences, the Ministry of Public Security's Third Research Institute, and Ant Group's Ant Security Lab, was unveiled at the inaugural CCF China Data Conference, offering a comprehensive review of model risks, ethical concerns, and evaluation methods to guide research, industry practice, and policy making.

AI ethicsant securitygenerative AI
0 likes · 5 min read
2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference
DataFunTalk
DataFunTalk
Dec 22, 2024 · Artificial Intelligence

Speech by Academician Sun Ninghui on the Development, Challenges, and Future of Artificial Intelligence and Intelligent Computing in China

The speech outlines the rapid rise of generative AI models, traces the historical evolution of computing technology, examines AI safety risks and regulatory responses, and proposes strategic pathways for China to advance intelligent computing through open, closed, or hybrid ecosystems while addressing talent, hardware, and cost challenges.

AI SafetyChinaIntelligent Computing
0 likes · 26 min read
Speech by Academician Sun Ninghui on the Development, Challenges, and Future of Artificial Intelligence and Intelligent Computing in China
Model Perspective
Model Perspective
Dec 6, 2024 · Fundamentals

12 Leverage Points to Transform Complex Systems—from Parameters to Paradigms

This article outlines twelve leverage points for system transformation, ranging from simple parameter adjustments to paradigm‑shifting rule changes, and illustrates each with real‑world Chinese policy examples, helping readers choose the most effective intervention for social, economic, or environmental challenges.

Systemscomplexityleverage points
0 likes · 12 min read
12 Leverage Points to Transform Complex Systems—from Parameters to Paradigms
Data Thinking Notes
Data Thinking Notes
Sep 23, 2024 · Big Data

Why Data Asset Rights Matter: Unlocking Value in the Digital Economy

This article examines the definition, policy background, and significance of data asset rights in China, outlining how clear ownership structures can incentivize data production, promote circulation, resolve data silos, and support the rapid growth of the digital economy.

Big DataData AssetData Governance
0 likes · 15 min read
Why Data Asset Rights Matter: Unlocking Value in the Digital Economy
Software Development Quality
Software Development Quality
Sep 21, 2024 · Information Security

How to Classify Security Incidents: A Comprehensive Grading Policy

This document outlines a security incident grading policy that defines purpose, scope, detailed classification across application, network, host, and data layers, and provides remarks on applicability, data‑related events, and the definition of critical (S0) vulnerabilities, helping organizations assess and prioritize security faults.

incident classificationinformation securitypolicy
0 likes · 3 min read
How to Classify Security Incidents: A Comprehensive Grading Policy
php Courses
php Courses
Aug 27, 2024 · Backend Development

Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide

This article explains how Laravel's policy-based authorization works, covering policy creation, registration, usage in controllers and Blade, custom methods, response handling, guest user support, and testing, with full code examples for implementing secure and maintainable access control.

AuthorizationGateLaravel
0 likes · 5 min read
Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide
Architects' Tech Alliance
Architects' Tech Alliance
Jun 10, 2024 · Industry Insights

What China Can Learn from Domestic Large‑Model Compute: Challenges and Strategic Recommendations

The article analyzes the computing characteristics and system challenges of domestically trained large AI models, outlines the shortcomings of current Chinese efforts, and proposes six strategic actions—including scaling compute, improving data management, building a national R&D team, and boosting funding and policy support—to accelerate China’s transition from following to leading in AI.

AIChinaCompute infrastructure
0 likes · 5 min read
What China Can Learn from Domestic Large‑Model Compute: Challenges and Strategic Recommendations
Advanced AI Application Practice
Advanced AI Application Practice
Mar 5, 2024 · Industry Insights

Why Automakers Are Racing Into the Electric Vehicle Market: Size, Policy, and Tech Drivers

The article analyzes the rapid growth of the electric vehicle sector, outlining its massive market potential, strong policy backing, technological breakthroughs, environmental imperatives, and the resulting employment opportunities while warning that firms unable to adapt may be eliminated.

Market analysisautomotive industryelectric vehicles
0 likes · 6 min read
Why Automakers Are Racing Into the Electric Vehicle Market: Size, Policy, and Tech Drivers
IT Services Circle
IT Services Circle
Nov 25, 2023 · Operations

Enabling Microsoft Edge Uninstall on Windows 11 via System Policy

This article explains how the European Union's Digital Markets Act forces Microsoft to provide uninstall options for built‑in apps like Edge, shows where to edit the IntegratedServicesRegionPolicySet.json file to change the disabled flag, and offers a third‑party tool for additional Windows 11 tweaks.

DMAEdgeSystem Administration
0 likes · 4 min read
Enabling Microsoft Edge Uninstall on Windows 11 via System Policy
php Courses
php Courses
Oct 27, 2023 · Artificial Intelligence

UN Secretary-General Announces New AI Advisory Body to Strengthen Global AI Governance

On October 26, UN Secretary‑General António Guterres announced the creation of a new AI advisory body composed of 39 experts from government, industry, academia and civil society, aimed at fostering a multistakeholder, multidisciplinary global dialogue to maximize AI benefits, mitigate risks, and support sustainable development goals.

AIInternational CooperationSustainable Development
0 likes · 3 min read
UN Secretary-General Announces New AI Advisory Body to Strengthen Global AI Governance
Java Architect Essentials
Java Architect Essentials
Oct 8, 2023 · Industry Insights

Why Are Shell Apps Still Surging on the App Store? An Inside Look

The article examines the recurring wave of shell apps on the App Store, highlighting how disguised learning tools with illicit content climb the free‑app rankings, why Apple's removal process is sluggish, and what challenges the current review system faces in curbing such violations.

App StoreShell AppsiOS
0 likes · 2 min read
Why Are Shell Apps Still Surging on the App Store? An Inside Look
Cloud Native Technology Community
Cloud Native Technology Community
Aug 22, 2023 · Cloud Native

Building a Robust Internal Developer Platform on Kubernetes: Components, Governance, and Policies

This article explains how to construct an Internal Developer Platform (IDP) on Kubernetes by outlining its essential components, adding default add‑on tools, establishing governance and policies, and implementing continuous integration/continuous delivery pipelines to provide developers with a safe, efficient, and cost‑effective experience.

Internal Developer PlatformKubernetesgovernance
0 likes · 7 min read
Building a Robust Internal Developer Platform on Kubernetes: Components, Governance, and Policies
DeWu Technology
DeWu Technology
Mar 14, 2023 · Industry Insights

What Shanghai’s “Panshi Action” Cyber Drill Reveals About Industry Security

The 2022 Shanghai "Panshi Action" cybersecurity drill, organized by multiple municipal regulators, brought together 30 top security teams to test the defenses of 123 telecom and internet firms, resulting in awards, policy insights, and a call for stronger collaborative security measures across the city’s digital ecosystem.

Panshi ActionShanghaicybersecurity
0 likes · 5 min read
What Shanghai’s “Panshi Action” Cyber Drill Reveals About Industry Security
DataFunSummit
DataFunSummit
Mar 8, 2023 · Information Security

Comprehensive Framework for Data Governance and Institutional Construction in China

The article outlines a coordinated approach to building eight fundamental data governance systems—including property rights, circulation, transaction, usage, revenue distribution, credit, governance, and security—while emphasizing the role of the National Data Bureau, government, enterprises, and individuals in shaping China’s data policy landscape.

Chinapolicy
0 likes · 12 min read
Comprehensive Framework for Data Governance and Institutional Construction in China
Cloud Native Technology Community
Cloud Native Technology Community
Aug 30, 2022 · Cloud Native

Governing the Rapid Adoption of Kubernetes in Enterprises

Enterprises face governance challenges as Kubernetes adoption surges, requiring centralized platforms, standardized blueprints, role‑based access control, policy enforcement, drift detection, and lifecycle management to maintain control, security, and agility across multiple clusters.

Cloud NativeDevOpsEnterprise
0 likes · 8 min read
Governing the Rapid Adoption of Kubernetes in Enterprises

State Council Notice on Issuing the 14th Five-Year Plan for Digital Economy Development

The State Council’s notice issues the 14th Five-Year Plan for Digital Economy Development, outlining China’s current digital economy status, strategic goals, infrastructure upgrades, data governance, industry digitalization, security measures, and international cooperation to drive high‑quality, inclusive growth through data and technology.

ChinaDigital EconomyDigital Transformation
0 likes · 32 min read
State Council Notice on Issuing the 14th Five-Year Plan for Digital Economy Development
21CTO
21CTO
Dec 2, 2021 · Fundamentals

Why China Is Betting on Open‑Source to Revitalize Its Software Industry

China's Ministry of Industry and Information Technology warns that the domestic software sector lags internationally and outlines a comprehensive plan—ranging from talent cultivation and open‑source community building to big‑data expansion—to transform the industry by 2025.

Big DataChinaSoftware Industry
0 likes · 5 min read
Why China Is Betting on Open‑Source to Revitalize Its Software Industry
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 4, 2021 · Information Security

Overview of SELinux and Its Use in Android

The article explains SELinux’s origins, core architecture, mandatory access control mechanisms such as type enforcement and MLS, and how Android incorporates SELinux as SEAndroid—detailing its evolution from permissive to enforcing mode, policy file structure, Android O’s split policies, and example domain and object transitions.

AndroidMacSELinux
0 likes · 17 min read
Overview of SELinux and Its Use in Android
Laravel Tech Community
Laravel Tech Community
Mar 16, 2021 · Fundamentals

2020 Chinese Software and Information Technology Services Enterprise Competitiveness Index Report

The report presents the methodology, grading system, 2019 performance data, and key characteristics of the top 100 Chinese software and IT service enterprises, followed by policy guidance from the Ministry of Industry and Information Technology outlining four strategic priorities for the sector's future development.

ChinaDigital EconomyInnovation
0 likes · 12 min read
2020 Chinese Software and Information Technology Services Enterprise Competitiveness Index Report
Practical DevOps Architecture
Practical DevOps Architecture
Mar 5, 2021 · Information Security

Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure

In his 2021 Two‑Session submission, Zhou Hongyi, founder of 360, urges the Chinese government to recognize and incentivize elite hackers, strengthen cybersecurity for connected cars, and build city‑level security infrastructure to protect smart‑city systems, outlining concrete policy recommendations for each area.

city infrastructurecybersecuritypolicy
0 likes · 8 min read
Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure
IT Architects Alliance
IT Architects Alliance
Sep 20, 2020 · Industry Insights

Unlocking the $25 Trillion Smart City Market: Trends, Challenges, and Opportunities

This article examines the rapid rise of smart cities in China and globally, detailing market size forecasts, the evolution of urban challenges, policy drivers, industry chain structures, major players, and the technological and talent hurdles that shape the future of this $25 trillion opportunity.

ChinaDigital InfrastructureIndustry analysis
0 likes · 17 min read
Unlocking the $25 Trillion Smart City Market: Trends, Challenges, and Opportunities
IT Architects Alliance
IT Architects Alliance
Aug 30, 2020 · Industry Insights

Will TikTok’s Core Algorithm Face Export Bans? China’s New Tech Export Controls Explained

China’s latest revision of its technology export control catalogue adds data‑driven personalized push technology, potentially barring TikTok’s core algorithm from export, and experts advise firms like ByteDance to pause negotiations and complete licensing procedures amid heightened regulatory scrutiny.

ChinaExport controlsTechnology Trade
0 likes · 4 min read
Will TikTok’s Core Algorithm Face Export Bans? China’s New Tech Export Controls Explained
Suning Technology
Suning Technology
Mar 10, 2020 · R&D Management

Will Internet Healthcare Surpass Traditional Clinics? Expert Insights Revealed

An in‑depth interview with unnamed internet‑healthcare experts and retail technology specialists examines the pandemic‑driven surge in online medical services, highlighting their workflow advantages, regional resource balancing, policy constraints, platform profitability challenges, and the limited trust among doctors and patients, while forecasting a complementary role alongside conventional hospitals.

Healthcareindustrypolicy
0 likes · 10 min read
Will Internet Healthcare Surpass Traditional Clinics? Expert Insights Revealed
Tencent Cloud Developer
Tencent Cloud Developer
Oct 26, 2019 · Industry Insights

How Blockchain Is Transforming Industries: Insights from Tencent’s 2019 Whitepaper

The 2019 Tencent Blockchain Whitepaper analyzes policy support, market growth, and the integration of blockchain into traditional and financial sectors, highlighting Tencent’s TrustSQL and TBaaS platforms and outlining the emerging ecosystem of infrastructure, applications, and services driving digital transformation.

BlockchainDigital TransformationFinancial Services
0 likes · 15 min read
How Blockchain Is Transforming Industries: Insights from Tencent’s 2019 Whitepaper
Efficient Ops
Efficient Ops
Aug 8, 2018 · Cloud Computing

Why China's Public Cloud Market Is Growing Over 50% and What It Means for the Future

China’s 2018 Cloud Computing Development White Paper reveals that the public cloud market grew over 50% in 2017, predicts continued rapid expansion, highlights fierce competition among industry clouds, the rise of hybrid and multi‑cloud strategies, growing security concerns, open‑source adoption, and evolving policy and technology trends.

Market TrendsSecuritycloud computing
0 likes · 10 min read
Why China's Public Cloud Market Is Growing Over 50% and What It Means for the Future
Architects Research Society
Architects Research Society
Mar 17, 2018 · Blockchain

Overview of Global Crypto and Blockchain Industry Associations

The article surveys major cryptocurrency and blockchain associations worldwide, including CryptoUK, Crypto Valley, Russian Crypto Union, Blockchain Research Institute, Digital Chamber of Commerce, Coin Center, and others, highlighting their formation, objectives, government lobbying efforts, research activities, and influence on policy and industry standards.

cryptocurrencyindustry associationslobbying
0 likes · 8 min read
Overview of Global Crypto and Blockchain Industry Associations
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Dec 6, 2016 · Information Security

Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges

A recent seminar in Beijing gathered government, academic, and industry representatives to discuss the rapid growth of the internet, the rising threats of black‑gray markets, gaps in legislation, the need for unified standards, and collaborative measures to strengthen the overall cybersecurity ecosystem.

CollaborationInternet SecurityLegal Framework
0 likes · 6 min read
Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges
Practical DevOps Architecture
Practical DevOps Architecture
May 12, 2015 · Information Security

Configuring Email Filtering Policies on USG Firewall

This guide details how to set up USG firewall email filtering to block specific attachment types, limit attachment size, and prevent messages containing prohibited keywords by creating pattern groups, defining a mail‑filter policy, applying it to the outbound interzone firewall view, and verifying the configuration.

USGattachment controlemail filtering
0 likes · 5 min read
Configuring Email Filtering Policies on USG Firewall