Tagged articles
17 articles
Page 1 of 1
Weekly Large Model Application
Weekly Large Model Application
May 5, 2026 · Artificial Intelligence

Why More GPUs and Data Aren’t Enough: Defining Scenarios and Data for Speech Model Training

The article argues that successful speech model training starts with understanding user scenarios, then selecting appropriate data, and finally choosing metrics, detailing six key questions, data sourcing strategies, evaluation criteria, and compliance considerations to avoid the misconception that sheer data volume guarantees performance.

AI trainingModel Evaluationdata collection
0 likes · 6 min read
Why More GPUs and Data Aren’t Enough: Defining Scenarios and Data for Speech Model Training
Woodpecker Software Testing
Woodpecker Software Testing
Apr 4, 2026 · Product Management

2026 A/B Testing Automation: Emerging Trends and Real‑World Practices

The article examines how 2026’s new A/B testing automation paradigm—combining dynamic traffic allocation, real‑time causal modeling, metric‑autonomy systems, and built‑in privacy compliance—dramatically shortens experiment cycles, boosts statistical power, and transforms experimentation from a manual chore into a scalable, trustworthy decision engine.

A/B testingAutomationGrowth Engineering
0 likes · 8 min read
2026 A/B Testing Automation: Emerging Trends and Real‑World Practices
Alibaba Cloud Observability
Alibaba Cloud Observability
Sep 15, 2025 · Information Security

How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance

This article explains why data desensitization is now a compliance must‑have, reviews Alibaba Cloud Log Service’s existing masking pipelines, introduces the new mask function with its keyword and built‑in modes, compares its performance against regex solutions, and showcases three real‑world use cases covering transaction logs, large‑model interactions, and Nginx URI parameters.

AILog ProcessingSLS
0 likes · 12 min read
How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance
Alibaba Cloud Native
Alibaba Cloud Native
Sep 10, 2025 · Information Security

How Alibaba Cloud SLS’s New mask Function Simplifies Large‑Scale Log Desensitization

In the AI era, massive interaction data drives rapid smart‑app growth, but personal privacy risks demand robust data‑masking; Alibaba Cloud Log Service (SLS) introduces a versatile mask function that replaces complex regex pipelines with concise configurations, boosting performance, reducing maintenance, and meeting strict compliance such as GDPR and China’s Personal Information Protection Law.

Cloud NativeLog ProcessingSLS
0 likes · 12 min read
How Alibaba Cloud SLS’s New mask Function Simplifies Large‑Scale Log Desensitization
Eric Tech Circle
Eric Tech Circle
Dec 22, 2024 · Mobile Development

How to Pass WeChat Mini Program Review: Common Pitfalls and Practical Fixes

This guide explains the WeChat Mini Program review workflow, lists the most frequent rejection reasons such as missing privacy policies, incomplete content, mismatched categories, and provides concrete steps—including code adjustments and documentation tips—to dramatically improve approval chances.

App SubmissionDebuggingMobile Development
0 likes · 5 min read
How to Pass WeChat Mini Program Review: Common Pitfalls and Practical Fixes
Data Thinking Notes
Data Thinking Notes
Jun 12, 2024 · Information Security

How to Implement Data Classification and Grading for Robust Security

This article outlines the national‑standard‑based methodology for classifying and grading data, detailing industry‑specific processes, core and important data identification criteria, general data handling, and a privacy‑focused governance framework that enables organizations to protect sensitive information effectively.

Data ProtectionSecurity Governancedata classification
0 likes · 13 min read
How to Implement Data Classification and Grading for Robust Security
Huolala Tech
Huolala Tech
Jun 8, 2023 · Big Data

How Huolala Built a Robust Big Data Security Framework: Lessons and Practices

This article details Huolala's practical experience in constructing a comprehensive big data security system, covering data lifecycle protection, classification standards, capability development, and governance, while balancing regulatory compliance and business growth.

Big DataData Governancecloud infrastructure
0 likes · 10 min read
How Huolala Built a Robust Big Data Security Framework: Lessons and Practices
DataFunSummit
DataFunSummit
Jan 5, 2023 · Information Security

ByteDance Big Data Platform Security and Permission Governance Practices

This article outlines ByteDance's comprehensive big‑data security framework, detailing current challenges, fine‑grained permission control, asset protection, data deletion capabilities, and the governance principles that balance compliance with operational efficiency.

access controldata deletiondata security
0 likes · 13 min read
ByteDance Big Data Platform Security and Permission Governance Practices
JD.com Experience Design Center
JD.com Experience Design Center
Dec 27, 2022 · Product Management

What JD Learned Building the Content Assistant App: A Product Manager’s Journey

The article recounts a JD product manager’s year‑long journey developing the Content Assistant app, sharing practical lessons on product vision, login design, live‑stream shortcuts, video audit, single‑product creation, selection tools, privacy compliance, and release management for mobile e‑commerce creators.

User experiencemobile app developmentprivacy compliance
0 likes · 17 min read
What JD Learned Building the Content Assistant App: A Product Manager’s Journey
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Endpoint Protectioncloud-edge collaborationprivacy compliance
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
AntTech
AntTech
Jul 8, 2022 · Information Security

Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights

This article reviews Ant Group's award‑winning mPaaS mobile security solution, detailing the current mobile app security landscape, regulatory pressures, and the four‑layer full‑chain protection architecture—including data security, privacy control, biometric authentication, and app hardening—along with practical compliance and risk‑mitigation practices.

Ant GroupApplication SecurityData Protection
0 likes · 8 min read
Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights
OPPO Amber Lab
OPPO Amber Lab
Jan 8, 2021 · Information Security

How Third-Party SDKs Threaten Mobile Apps and How to Secure Them

This article reviews OPPO's sixth Technical Open Day session on application and data security, detailing the current state, case studies, detection methods, and SDL integration for third‑party SDKs, and offers practical recommendations to mitigate privacy leaks, code execution, and other high‑risk vulnerabilities.

SDLprivacy compliancethird-party SDK
0 likes · 11 min read
How Third-Party SDKs Threaten Mobile Apps and How to Secure Them
DevOps
DevOps
Sep 7, 2020 · Information Security

OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle

OPPO’s security team outlines its DevSecOps transformation, detailing how security and privacy activities are embedded across product lifecycles—from requirement reviews and automated CI/CD scans to comprehensive protection layers, cultural initiatives, external collaborations, and continuous improvement to meet global compliance challenges.

DevSecOpsOPPOci/cd
0 likes · 12 min read
OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle
Baidu App Technology
Baidu App Technology
Jul 2, 2019 · Mobile Development

Inside Baidu’s Mobile Tech Salon: Network Optimization, AI, Flutter & More

The 27th technology salon co‑hosted by Baidu, Huawei and the Alliance gathered over 35,000 online developers to showcase Baidu App's network optimization, AI integration, Flutter cross‑platform exploration, smart mini‑program architecture, privacy compliance tools, and Mate X folding‑screen adaptation, delivering a wealth of practical technical insights.

AIBaiduFlutter
0 likes · 7 min read
Inside Baidu’s Mobile Tech Salon: Network Optimization, AI, Flutter & More