Tagged articles
98 articles
Page 1 of 1
Woodpecker Software Testing
Woodpecker Software Testing
May 14, 2026 · Artificial Intelligence

How to Accurately Calculate the Cost‑Benefit of AI Safety Testing

The article breaks down AI safety testing costs—including hidden labor, data and compute, and compliance penalties—quantifies benefits from risk mitigation to strategic value, proposes a dynamic risk‑exposure formula, and shows real‑world ROI cases that turn testing into a measurable investment.

AI GovernanceAI Safetyadversarial testing
0 likes · 8 min read
How to Accurately Calculate the Cost‑Benefit of AI Safety Testing
Woodpecker Software Testing
Woodpecker Software Testing
May 7, 2026 · Industry Insights

Four Hidden Pitfalls That 90% of Test Experts Fall Into When Shifting Left

The article analyzes why many teams see defect escape rates rise despite early test involvement, identifies four common shift‑left misconceptions with real project examples, and proposes concrete checklists, responsibility shifts, infrastructure fixes, and upstream metrics to make shift‑left testing truly effective.

DevOpsShift-Left TestingSoftware quality
0 likes · 8 min read
Four Hidden Pitfalls That 90% of Test Experts Fall Into When Shifting Left
Smart Workplace Lab
Smart Workplace Lab
Apr 16, 2026 · Industry Insights

Boost AI Communication Trust: Empathy Prompt Templates & Risk Checklist

This guide explains why AI‑generated messages often feel robotic, presents a set of prompt templates that inject emotion, relationship, and cultural context into LLM outputs, and offers a risk‑assessment checklist to ensure safe, high‑impact workplace communication.

AILanguage ModelPrompt engineering
0 likes · 6 min read
Boost AI Communication Trust: Empathy Prompt Templates & Risk Checklist
Data Party THU
Data Party THU
Apr 15, 2026 · Artificial Intelligence

Why “Raising Lobsters” (OpenClaw) Is the Hottest AI Agent Trend in 2026

The article examines the rapid rise of OpenClaw, the open‑source AI agent dubbed “raising lobsters,” outlining its deployment steps, five major benefits, three key risks, and the six user profiles best suited for this execution‑type AI, while urging cautious adoption.

AI agentsDeploymentOpenClaw
0 likes · 11 min read
Why “Raising Lobsters” (OpenClaw) Is the Hottest AI Agent Trend in 2026
Test Development Learning Exchange
Test Development Learning Exchange
Apr 11, 2026 · Industry Insights

How to Rigorously Evaluate AI Testing Tools: A 5‑Dimension Framework

This guide presents a structured, data‑driven approach for assessing AI testing tools, covering three pre‑adoption questions, a five‑dimension evaluation model with concrete metrics, scenario‑specific focus, a four‑step validation process, and common pitfalls to avoid, helping teams quantify ROI and manage risk.

AI testingROISoftware Testing
0 likes · 8 min read
How to Rigorously Evaluate AI Testing Tools: A 5‑Dimension Framework
FunTester
FunTester
Apr 9, 2026 · Fundamentals

Why Passing Tests Aren’t Proof of Correctness: Dijkstra’s Insight & Modern Strategies

The article explains that a green test run only shows the absence of detected bugs under specific inputs, environments, and assumptions, explores the asymmetry between verification and falsification, discusses the test‑oracle problem, property‑based testing, formal verification, and proposes a risk‑calibrated testing approach.

DijkstraSoftware Testingformal verification
0 likes · 17 min read
Why Passing Tests Aren’t Proof of Correctness: Dijkstra’s Insight & Modern Strategies
Test Development Learning Exchange
Test Development Learning Exchange
Apr 1, 2026 · Artificial Intelligence

How to Safely Review AI‑Generated Test Cases: A 7‑Point Checklist

This article presents a practical checklist that helps teams identify seven major risk categories in AI‑generated test cases—covering business logic, critical path coverage, boundary handling, executability, security, automation fit, and duplication—to ensure the outputs are reliable, executable, and production‑ready.

AI testingSoftware qualitychecklist
0 likes · 8 min read
How to Safely Review AI‑Generated Test Cases: A 7‑Point Checklist
Data STUDIO
Data STUDIO
Mar 26, 2026 · Artificial Intelligence

Metacognitive Agents: Teaching AI to Self‑Assess Before Answering

The article introduces metacognitive agents that equip AI with a self‑model to evaluate confidence, domain relevance, tool availability, and risk before acting, demonstrating a LangGraph‑based medical triage assistant with code, workflow, safety advantages, and practical test results.

AI SafetyLLMLangGraph
0 likes · 22 min read
Metacognitive Agents: Teaching AI to Self‑Assess Before Answering
Woodpecker Software Testing
Woodpecker Software Testing
Mar 6, 2026 · Artificial Intelligence

A Practical Guide to Implementing AI Security Testing in Production

With AI now core to production systems, this guide outlines a four‑step, measurable, auditable approach—defining security boundaries, building lightweight test toolchains, creating explainable test cases, and establishing cross‑functional collaboration—backed by real‑world banking and healthcare deployments and concrete metrics.

AI securitybehavioral contractsci/cd
0 likes · 8 min read
A Practical Guide to Implementing AI Security Testing in Production
AI Explorer
AI Explorer
Mar 4, 2026 · Artificial Intelligence

When AI Simulates a Nuclear Crisis: Unveiling Complex Strategic Reasoning

A groundbreaking experiment by King's College London placed top AI models, including GPT‑5.2, into a 300‑round simulated nuclear crisis, revealing that these systems can perform nuanced, narrative‑driven strategic reasoning under extreme uncertainty, hinting at future roles in high‑risk global decision‑making.

AIGPT-5.2decision making
0 likes · 6 min read
When AI Simulates a Nuclear Crisis: Unveiling Complex Strategic Reasoning
SuanNi
SuanNi
Mar 3, 2026 · Information Security

Why OpenClaw’s 24‑Hour AI Assistant Fails Security Tests: 6 Critical Blind Spots

A comprehensive security audit of the OpenClaw autonomous AI agent reveals a 58.9% overall pass rate across 34 scenarios, exposing severe vulnerabilities in ambiguous command handling, prompt‑injection, and high‑privilege tool use, and proposes concrete defensive measures to mitigate these risks.

AI SafetyAgent Securityrisk assessment
0 likes · 12 min read
Why OpenClaw’s 24‑Hour AI Assistant Fails Security Tests: 6 Critical Blind Spots
Black & White Path
Black & White Path
Feb 11, 2026 · Information Security

New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge

The new “Automotive Data Outbound Security Guidelines (2026)” issued by MIIT and other ministries seeks to balance data security with cross‑border flow, defining a two‑layer demand, detailing data categories, assessment, contracts, certification, and protection measures, and signalling a massive market opportunity for data‑security services in the automotive industry.

Regulatory ComplianceVulnerability Managementautomotive
0 likes · 15 min read
New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge
Huolala Tech
Huolala Tech
Jan 21, 2026 · Artificial Intelligence

Building an Automated Red‑Team Framework for LLM Security Testing

This article presents a systematic approach to evaluating large language model security by defining threat models, categorizing attack surfaces such as jailbreak and privacy leakage, and describing an automated red‑team platform that generates, mutates, scores, and evolves adversarial prompts to continuously assess model robustness.

LLM SecurityRed Teamadversarial AI
0 likes · 20 min read
Building an Automated Red‑Team Framework for LLM Security Testing
Model Perspective
Model Perspective
Jan 14, 2026 · Fundamentals

Why Some Celebrity Gaffes Explode: An SIR Model of Social Media Virality

The article applies the epidemiological SIR model to explain how a celebrity's comment about household income sparked a massive online controversy, analyzing the high transmission rate, low recovery rate, and resulting risk factors that kept the story alive far beyond a typical news cycle.

SIR modelinformation diffusionrisk assessment
0 likes · 7 min read
Why Some Celebrity Gaffes Explode: An SIR Model of Social Media Virality
Model Perspective
Model Perspective
Jan 5, 2026 · Fundamentals

How to Turn Gut Feelings into Precise Decisions Using Boolean Algebra

The article explains how everyday intuition can be formalized with Boolean algebra by breaking down vague judgments into binary variables, applying logical operations and laws, and using a step‑by‑step methodology to create transparent, repeatable decision models for jobs, medical diagnosis, risk assessment, and product selection.

Methodologyboolean algebradecision making
0 likes · 9 min read
How to Turn Gut Feelings into Precise Decisions Using Boolean Algebra
PMTalk Product Manager Community
PMTalk Product Manager Community
Dec 24, 2025 · Artificial Intelligence

Why AI Hallucinates and How Product Managers Can Tame It

The article explains the internal and external causes of AI hallucinations, examines how pre‑training data flaws and fine‑tuning choices amplify them, and presents a five‑pronged technical toolbox—including RAG, prompt engineering, chain‑of‑thought, self‑verification, and safety APIs—plus risk‑based product strategies for different industries.

AI hallucinationPrompt engineeringRAG
0 likes · 12 min read
Why AI Hallucinates and How Product Managers Can Tame It
AI Info Trend
AI Info Trend
Dec 10, 2025 · Artificial Intelligence

How AI Agents Are Evolving from Chatbots to Decision Partners

An in‑depth review of the WEF‑Capgemini 2025 whitepaper reveals how AI agents are transitioning from simple chatbots to autonomous decision‑making partners, outlining a three‑layer architecture, new communication protocols, governance challenges, risk assessment frameworks, and practical steps for enterprises to deploy trustworthy agents.

AI agentsEnterprise AIMCP protocol
0 likes · 8 min read
How AI Agents Are Evolving from Chatbots to Decision Partners
Advanced AI Application Practice
Advanced AI Application Practice
Nov 25, 2025 · Fundamentals

How to Prioritize Multiple Testing Requests? A Step‑by‑Step Method for Test Engineers

The article presents a systematic, risk‑and‑value‑driven framework that test engineers can use to rank multiple testing tasks, showing how to collect information, score each demand, visualize results with a priority matrix, reach team consensus, and define concrete test strategies for each priority level.

QA methodologySoftware Testingrisk assessment
0 likes · 13 min read
How to Prioritize Multiple Testing Requests? A Step‑by‑Step Method for Test Engineers
PMTalk Product Manager Community
PMTalk Product Manager Community
Nov 25, 2025 · Product Management

Avoid the 3 Common AI Product Management Pitfalls: Prompt Engineering, RAG, and Fine‑Tuning

The article examines why AI product managers repeatedly fall into three traps—over‑relying on prompt engineering, blindly adopting Retrieval‑Augmented Generation, or costly fine‑tuning—by presenting real‑world failures, debunking myths, and offering a five‑layer decision framework with cost, data, resource, and risk analysis to choose the right solution.

AI product managementPrompt engineeringRAG
0 likes · 24 min read
Avoid the 3 Common AI Product Management Pitfalls: Prompt Engineering, RAG, and Fine‑Tuning
Model Perspective
Model Perspective
Nov 5, 2025 · Fundamentals

Can Traditional Martial Arts Survive the Physics of Power Slap? A Biomechanical Model

This article builds a quantitative biomechanical model of Power Slap, analyzes the stages of a slap, derives force, energy and pressure equations, evaluates key variables such as speed, contact time, angle and area, and uses the case of Zhao Hong‑gang to illustrate how physics, training and strategy determine victory or knockout while highlighting safety and ethical concerns.

biomechanicsimpact modelingmartial arts
0 likes · 19 min read
Can Traditional Martial Arts Survive the Physics of Power Slap? A Biomechanical Model
Advanced AI Application Practice
Advanced AI Application Practice
Oct 22, 2025 · Operations

AI-Powered Linux Disk Cleanup: A Complete Guide

This guide presents an AI‑assisted workflow for Linux disk maintenance, including scripts for rapid diagnosis, risk assessment, personalized cleanup plans, safe log and cache removal, large‑file analysis, interactive cleanup modes, real‑time feedback, automated backups, and a one‑click execution script.

AI automationDisk CleanupLinux
0 likes · 11 min read
AI-Powered Linux Disk Cleanup: A Complete Guide
Volcano Engine Developer Services
Volcano Engine Developer Services
Sep 23, 2025 · Information Security

How to Secure Model Context Protocol (MCP) in AI Ecosystems: Threats and Solutions

This article examines the security challenges of the Model Context Protocol (MCP) in AI applications, analyzes attack surface expansion across creation, runtime, and update phases, and presents a comprehensive AI‑enhanced scanning architecture with mitigation strategies to protect the entire AI ecosystem.

AI securityCloud NativeMCP
0 likes · 23 min read
How to Secure Model Context Protocol (MCP) in AI Ecosystems: Threats and Solutions
Old Zhao – Management Systems Only
Old Zhao – Management Systems Only
Sep 19, 2025 · Operations

10 Essential Procurement Metrics Every Business Should Track

This article explains why modern procurement goes beyond price negotiation and introduces ten key performance indicators—cost‑saving rate, price variance, on‑time delivery, order fulfillment, quality pass rate, supplier concentration, inventory turnover, cycle time, emergency purchase ratio, and risk index—to help companies balance cost, quality, speed, and risk in their supply chains.

Cost Savingsinventory turnoverperformance metrics
0 likes · 10 min read
10 Essential Procurement Metrics Every Business Should Track
AntTech
AntTech
Jul 28, 2025 · Information Security

Securing AI Agents on Devices by 2025: Key Findings from the New Report

The newly released “Terminal Agent Security 2025” report, unveiled at the World AI Conference, systematically categorizes AI agent risks, outlines detection and defense methods, and proposes three protection pathways—single‑agent safety, trustworthy multi‑agent interconnection, and AI‑terminal security—to guide the emerging ecosystem of intelligent edge devices.

2025agent trustedge AI
0 likes · 6 min read
Securing AI Agents on Devices by 2025: Key Findings from the New Report
Swan Home Tech Team
Swan Home Tech Team
Jul 21, 2025 · Information Security

Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies

This article dissects modern phishing and ransomware threats, detailing preparation, bait construction, email header spoofing, and open‑source tools like Gophish, then outlines comprehensive defensive measures—from endpoint security and threat intelligence to risk‑based response economics—offering a systematic, technology‑to‑tactics‑to‑strategy framework for information security teams.

Gophishinformation securityphishing
0 likes · 15 min read
Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies
IT Architects Alliance
IT Architects Alliance
Jul 9, 2025 · Backend Development

Why Building Your Own Microservice Framework Can Cost 15× More Than Open‑Source Solutions

A detailed cost analysis shows that developing a custom enterprise microservice framework can require 100‑150 person‑months and cost up to 12 million CNY, making it roughly fifteen times more expensive than adopting mature open‑source solutions, while also incurring higher maintenance, personnel, time, and risk expenses.

Backend DevelopmentFrameworkMicroservice
0 likes · 13 min read
Why Building Your Own Microservice Framework Can Cost 15× More Than Open‑Source Solutions
Model Perspective
Model Perspective
Jun 22, 2025 · Fundamentals

How Economists Quantify a Life’s Value: WTP, Wage‑Risk, and VPF Explained

This article examines how governments and economists assign monetary values to human lives using willingness‑to‑pay, wage‑risk, and prevention‑of‑a‑death methods, presenting formulas, real‑world examples, and international VSL estimates to illustrate the strengths and limits of each approach.

cost-benefit analysiseconomicspublic policy
0 likes · 8 min read
How Economists Quantify a Life’s Value: WTP, Wage‑Risk, and VPF Explained
Architecture and Beyond
Architecture and Beyond
May 10, 2025 · Operations

What Heinrich’s 1:29:300 Rule Reveals About Preventing Online Outages

The article explains Heinrich's Law, its 1:29:300 accident pyramid, and how applying its principles—tracking minor incidents, hidden hazards, and systemic risks—can help software teams anticipate, diagnose, and prevent major online failures through systematic safety management and data‑driven practices.

Heinrich's LawOperationsincident management
0 likes · 15 min read
What Heinrich’s 1:29:300 Rule Reveals About Preventing Online Outages
Ops Development & AI Practice
Ops Development & AI Practice
Apr 24, 2025 · R&D Management

Why We Underestimate Tasks and How to Beat Optimism Bias in Software Projects

The article examines the common optimism bias that leads engineers to underestimate task complexity, explains its ripple effects on individuals and teams, and offers concrete, risk‑aware estimation techniques such as task breakdown, buffer time, three‑point estimation, and pre‑mortem analysis to improve project outcomes.

optimism biasproductivityrisk assessment
0 likes · 9 min read
Why We Underestimate Tasks and How to Beat Optimism Bias in Software Projects
Model Perspective
Model Perspective
Apr 18, 2025 · Fundamentals

What Is a “System Wind Rose” and How It Redefines Complex System Analysis

The article introduces the “System Wind Rose” – a visual model that places a central object at the core and maps multi‑directional influences with varying strengths, probabilities, and dynamics, offering a strategic lens for risk identification, structural balance, and decision‑making across diverse scenarios.

risk assessmentstrategic modelingsystem analysis
0 likes · 8 min read
What Is a “System Wind Rose” and How It Redefines Complex System Analysis
Model Perspective
Model Perspective
Mar 2, 2025 · Fundamentals

How Tornado Charts Reveal the Most Impactful Factors in Sensitivity Analysis

This article explains the core concepts and methods of sensitivity analysis, distinguishes local and global approaches, outlines the simple variation method, and demonstrates how to construct and interpret a tornado chart—complete with a real‑world example of market factors affecting sales—providing clear guidance for robust model evaluation.

Modelingdecision analysisrisk assessment
0 likes · 7 min read
How Tornado Charts Reveal the Most Impactful Factors in Sensitivity Analysis
AntTech
AntTech
Jan 3, 2025 · Artificial Intelligence

2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference

The 2024 Generative Large Model Security Assessment White Paper, jointly authored by the Chinese Academy of Sciences, the Ministry of Public Security's Third Research Institute, and Ant Group's Ant Security Lab, was unveiled at the inaugural CCF China Data Conference, offering a comprehensive review of model risks, ethical concerns, and evaluation methods to guide research, industry practice, and policy making.

AI ethicsant securitygenerative AI
0 likes · 5 min read
2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference
Model Perspective
Model Perspective
Dec 2, 2024 · Fundamentals

What Is the Beta Distribution and Why It Matters in A/B Testing?

The Beta distribution is a flexible probability model defined on the interval [0,1] with two shape parameters that control its form, offering useful properties such as mean and variance, and is widely applied in A/B testing, risk assessment, and machine‑learning tasks to model proportions and uncertainties.

A/B testingbeta distributionmachine learning
0 likes · 5 min read
What Is the Beta Distribution and Why It Matters in A/B Testing?
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 20, 2024 · Fundamentals

Guidelines and Standards for Setting Code Coverage Targets in Software Testing

The article reviews typical code‑coverage goals such as 70‑80% for system testing, explains how factors like failure cost, resource constraints, testability, and development stage influence target selection, discusses why full coverage is often impractical, and summarizes major industry standards and coverage metrics used in safety‑critical domains.

Software Testingcode coveragecoverage metrics
0 likes · 8 min read
Guidelines and Standards for Setting Code Coverage Targets in Software Testing
Model Perspective
Model Perspective
Jun 18, 2024 · Fundamentals

Why Statistics Mislead Us: Common Data Traps and How to Spot Them

Statistics permeate daily life, from news to personal decisions, yet common pitfalls like misleading averages, ambiguous percentages, and false causal links often trick us, so understanding these traps helps us interpret data more accurately and avoid faulty judgments.

cognitive biasdata interpretationmisinformation
0 likes · 4 min read
Why Statistics Mislead Us: Common Data Traps and How to Spot Them
Data Thinking Notes
Data Thinking Notes
May 28, 2024 · Information Security

What Can Government Data Security Standards Teach Other Industries?

The article outlines a comprehensive government data processing security framework—including management, technical, personal information protection, operational, regulatory, and assessment requirements—that offers reusable, practical guidance for data security across various sectors.

data securitygovernment standardsprivacy protection
0 likes · 4 min read
What Can Government Data Security Standards Teach Other Industries?
FunTester
FunTester
Apr 22, 2024 · Fundamentals

How to Build and Evolve an Effective Regression Test Suite

This guide outlines a structured approach to creating, maintaining, and scaling regression test suites, covering test selection criteria, step‑by‑step processes for identifying code changes, choosing relevant tests, balancing suite size, and handling execution results with automation and risk‑based prioritization.

AutomationSoftware qualityTest Selection
0 likes · 19 min read
How to Build and Evolve an Effective Regression Test Suite
Qunar Tech Salon
Qunar Tech Salon
Jan 18, 2024 · Databases

Optimization Journey of Qunar's Database Inspection and Alarm Systems

This article details Qunar's DBA team's systematic analysis of shortcomings in their original database inspection and alarm systems, the design and implementation of comprehensive metric enhancements, risk‑level classification, automated reporting, and alarm noise reduction, and reports the significant improvements in stability, efficiency, and fault‑free operation achieved through these optimizations.

Database Monitoringalarm systeminspection system
0 likes · 15 min read
Optimization Journey of Qunar's Database Inspection and Alarm Systems
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 17, 2023 · Artificial Intelligence

Levels of AGI: A Framework for Evaluating Artificial General Intelligence

The article presents Google DeepMind's AGI evaluation framework, outlining six guiding principles, nine representative definitions, and a hierarchical five‑level classification system to assess AGI performance, autonomy, and societal impact, aiming to provide a common language for model comparison, risk assessment, and progress tracking.

AGIArtificial General Intelligencerisk assessment
0 likes · 15 min read
Levels of AGI: A Framework for Evaluating Artificial General Intelligence
Meituan Technology Team
Meituan Technology Team
Sep 21, 2023 · Backend Development

Code Change Risk Visualization and Quality Assurance Practices at Meituan

The article details Meituan's design and deployment of a code‑change risk visualization platform—named Houyi—covering risk categories, system architecture, technical challenges, eight practical application scenarios, and future plans to enhance code analysis and risk detection.

MeituanMicroservicescode change visualization
0 likes · 21 min read
Code Change Risk Visualization and Quality Assurance Practices at Meituan
Huolala Tech
Huolala Tech
Aug 15, 2023 · Information Security

How Modern Security Risk Assessment Evolved: Key Features and Practical Insights

This article examines the expanded scope, updated standards, and practical workflow of security risk assessment in today's regulatory environment, offering detailed guidance on assessment criteria, target objects, methodologies, organizational steps, and decision‑making for effective risk management.

Data Protectioncomplianceinformation security
0 likes · 9 min read
How Modern Security Risk Assessment Evolved: Key Features and Practical Insights
Architecture and Beyond
Architecture and Beyond
Jun 10, 2023 · Operations

What Is Systemic Risk in Technology and How to Manage It Effectively

The article explains the concept of systemic risk in both economics and technology, compares it with non‑systemic risk, describes how it propagates, lists common sources, outlines its impact on technical teams and business value, and provides a step‑by‑step framework for modeling, identifying, and governing such risks.

Operationsgovernancerisk assessment
0 likes · 23 min read
What Is Systemic Risk in Technology and How to Manage It Effectively
Model Perspective
Model Perspective
Feb 21, 2023 · Fundamentals

How Fuzzy Comprehensive Evaluation Enhances Construction Worker Safety Psychology

An in‑depth exploration of the fuzzy comprehensive evaluation method demonstrates how to convert qualitative safety‑psychology assessments of construction workers into quantitative scores, detailing factor selection, weight determination, membership functions, and a full case study that guides risk‑aware decision‑making.

constructiondecision makingfuzzy evaluation
0 likes · 8 min read
How Fuzzy Comprehensive Evaluation Enhances Construction Worker Safety Psychology
We-Design
We-Design
Jan 10, 2023 · Product Management

How Narrative Design Can Streamline Product Development and Reduce Risk

Narrative design replaces visual mock‑ups with text‑based stories to explore user flows, clarify concepts, assess risks, and gather feedback across platforms, enabling faster iteration and clearer communication between designers, developers, and stakeholders.

Narrative DesignUser experiencedesign process
0 likes · 11 min read
How Narrative Design Can Streamline Product Development and Reduce Risk
JD Tech
JD Tech
Dec 15, 2022 · R&D Management

Project Management Practices for Test Roles: Risk Identification and Collaborative Delivery Across Development Stages

This article explains how test engineers can adopt project‑management awareness throughout requirement review, design review, scheduling, test‑case creation, coding, code review, smoke, functional, integration, stability, UAT and regression testing to proactively identify risks, coordinate with stakeholders, and ensure high‑quality, efficient delivery.

CollaborationProject Managementrisk assessment
0 likes · 17 min read
Project Management Practices for Test Roles: Risk Identification and Collaborative Delivery Across Development Stages
AntTech
AntTech
Nov 28, 2022 · Information Security

Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response

This article details the evolution, architecture, and key technologies of Ant Group's anti‑intrusion platform, explaining how it handles trillion‑level data streams for intrusion detection, performs multi‑dimensional risk assessment and attribution, and enables rapid, automated security incident response across massive enterprise environments.

anti-intrusioninformation securityintrusion detection
0 likes · 15 min read
Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response
Baidu Intelligent Testing
Baidu Intelligent Testing
Oct 19, 2022 · Artificial Intelligence

Intelligent Test Evaluation: Risk Dimension Mining, Admission Assessment, Multi‑Dimensional Activity Data Mining, and Model‑Based Risk Evaluation

This article presents an end‑to‑end intelligent testing framework that mines development‑stage risk dimensions, conducts admission risk assessment, extracts multi‑dimensional activity data such as coverage metrics, and applies model‑based risk evaluation to guide quality‑assurance decisions and improve release safety.

ModelingSoftware Testingartificial intelligence
0 likes · 11 min read
Intelligent Test Evaluation: Risk Dimension Mining, Admission Assessment, Multi‑Dimensional Activity Data Mining, and Model‑Based Risk Evaluation
Baidu Geek Talk
Baidu Geek Talk
Oct 18, 2022 · Artificial Intelligence

Intelligent Test Evaluation and Risk Assessment in Software Quality Assurance

The article describes an intelligent test‑evaluation framework that gathers performance data, quantifies project, personnel, and code risk dimensions, feeds them into rule‑based and logistic‑regression models to produce risk scores and risk‑driven testing plans, and demonstrates how this approach identified thousands of high‑risk projects, prevented hundreds of bugs, and saved thousands of person‑days.

Software Testingdata miningrisk assessment
0 likes · 9 min read
Intelligent Test Evaluation and Risk Assessment in Software Quality Assurance
ITPUB
ITPUB
Jul 25, 2022 · Information Security

How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint

This article details 58.com’s end‑to‑end approach to securing mobile, H5, and server SDKs—covering security fundamentals, the 5A methodology, the 金盾 architecture, integration steps, data‑flow encryption, comprehensive risk‑based testing, performance evaluation, and release decision making.

MobileSDKSecurity
0 likes · 18 min read
How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 19, 2022 · Fundamentals

Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)

This article presents fifteen practical guidelines for managing software dependencies, covering pre‑inclusion checks such as design review, code quality, testing, security, licensing, and transitive dependencies, as well as post‑use practices like encapsulation, isolation, update strategies, and continuous monitoring to maintain a secure and reliable supply chain.

Securitydependency managementrisk assessment
0 likes · 19 min read
Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)
Cloud Native Technology Community
Cloud Native Technology Community
Apr 14, 2022 · Information Security

Navigating Cloud‑Native Security: Six Critical Risks and DevSecOps Solutions

The article examines how rapid cloud‑native adoption reshapes application design and operations while introducing six distinct security risks, and proposes a comprehensive DevSecOps framework that integrates early‑stage security controls across infrastructure, compute, development, and management to protect modern containerized environments.

ContainerDevSecOpsKubernetes
0 likes · 13 min read
Navigating Cloud‑Native Security: Six Critical Risks and DevSecOps Solutions
JD Tech
JD Tech
Feb 28, 2022 · Information Security

Integrating Functional Security Testing into Daily Test Practices: Concepts, SDL Roles, and Test‑Case Design

This article explains how test engineers can incorporate functional security testing into routine testing by outlining the differences between security and functional testing, describing the Security Development Lifecycle (SDL) responsibilities, and providing concrete test‑case design guidelines for various security scenarios.

SDLSoftware Securityfunctional testing
0 likes · 12 min read
Integrating Functional Security Testing into Daily Test Practices: Concepts, SDL Roles, and Test‑Case Design
Xianyu Technology
Xianyu Technology
Nov 23, 2021 · Backend Development

Precise Backend Interface Testing via Code Diff Analysis and Traffic Recording

The platform listens to GitLab change events, parses Java, ObjC, and Flutter diffs to locate modified methods, maps those methods to entry HTTP/RPC interfaces using recorded traffic call chains, and automatically selects corresponding regression test cases, dramatically cutting testing effort while enabling future risk analysis.

code analysisinterface testingrisk assessment
0 likes · 8 min read
Precise Backend Interface Testing via Code Diff Analysis and Traffic Recording
Baidu Geek Talk
Baidu Geek Talk
Nov 8, 2021 · Artificial Intelligence

Application of Intelligent Grading and Risk Assessment Models in Commercial Platforms

The article describes an intelligent grading and risk‑assessment framework for commercial platforms that unifies process control, feature mining, data collection, storage, strategy management, and annotation, enabling automated testing conversion with 94% accuracy, 90% recall, 8% conversion uplift, and surfacing dozens of bugs while supporting scalable, configurable deployment.

AIAutomationData Platform
0 likes · 13 min read
Application of Intelligent Grading and Risk Assessment Models in Commercial Platforms
Open Source Linux
Open Source Linux
Sep 12, 2021 · Information Security

Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies

This article explains what DDoS attacks are, outlines their severe business, reputation, and data‑leakage impacts, highlights recent growth trends, and offers practical prevention measures such as bandwidth scaling and professional high‑defense services.

Attack MitigationDDoScybersecurity
0 likes · 6 min read
Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies
Java Architect Essentials
Java Architect Essentials
Aug 19, 2021 · Backend Development

When and How to Adopt Microservices: Evaluation, Risks, and Best Practices

This article examines the transition from monolithic to microservice architectures, outlining the advantages and costs of microservices, the conditions under which they should be adopted, practical implementation options, risk assessments, service‑splitting strategies, and a concise comparison with SOA.

architecturerisk assessmentservice decomposition
0 likes · 17 min read
When and How to Adopt Microservices: Evaluation, Risks, and Best Practices
21CTO
21CTO
Jul 3, 2021 · Information Security

How Google’s OpenSSF Scorecards Boost Open‑Source Security Ratings

Google’s open‑source security tool, OpenSSF Scorecards, now at version 2.0, automates risk assessment for thousands of projects by providing pass/fail checks, binary‑artifact analysis, dependency verification, and CI/CD token controls, helping organizations identify vulnerable code, malicious contributors, and unsafe dependencies.

OpenSSFScorecardsci/cd
0 likes · 8 min read
How Google’s OpenSSF Scorecards Boost Open‑Source Security Ratings
Baidu Intelligent Testing
Baidu Intelligent Testing
Apr 14, 2021 · Artificial Intelligence

Quality Metric Model for Automated Testing and Risk Assessment in Commercial Platforms

This article describes Baidu's quality metric model that integrates development process data, self‑testing and automation data to automate test prioritization, estimate project risk, and improve testing efficiency through a six‑component platform covering process control, feature mining, data collection, storage, strategy management, and annotation.

AIAutomated TestingData Platform
0 likes · 15 min read
Quality Metric Model for Automated Testing and Risk Assessment in Commercial Platforms
Meituan Technology Team
Meituan Technology Team
Apr 8, 2021 · Information Security

Threat Modeling: Practices, Challenges, and Implementation Guide

Threat modeling is a systematic, cross‑functional practice that identifies design‑level security flaws early, prioritizes mitigations using methods like ASTRIDE, and integrates risk assessment into DevSecOps, despite tool scarcity and process integration challenges, to reduce costs, meet compliance, and improve overall security maturity.

DevSecOpsSecurity ArchitectureSoftware Security
0 likes · 31 min read
Threat Modeling: Practices, Challenges, and Implementation Guide
iQIYI Technical Product Team
iQIYI Technical Product Team
Apr 2, 2021 · Artificial Intelligence

Intelligent UGC Content Moderation with User Safety Rating at iQIYI

iQIYI’s intelligent UGC moderation system combines AI content classifiers with a user‑level safety rating generated by an unsupervised pipeline and fused GBDT‑DeepFM models, enabling fast‑track handling for trusted users, high‑risk detection, a 25 % cut in compute usage and an 80 % reduction in review time while preserving content safety.

AI Content DetectionUGC moderationiQIYI
0 likes · 12 min read
Intelligent UGC Content Moderation with User Safety Rating at iQIYI
Baidu Intelligent Testing
Baidu Intelligent Testing
Mar 3, 2021 · Artificial Intelligence

Quality Scoring Model: Intelligent Test Grading and Risk Assessment for Software Delivery

This article introduces a quality scoring model that leverages structured development and testing data to objectively assess project risk, automate test grading, and enable data‑driven decisions for test execution and release, thereby improving delivery efficiency and reducing manual evaluation errors.

Data‑Driven Testingmachine learningquality scoring
0 likes · 24 min read
Quality Scoring Model: Intelligent Test Grading and Risk Assessment for Software Delivery
iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 25, 2020 · Information Security

iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)

iQiyi Security Incident Response Center Vulnerability Handling Policy version 3.0 outlines scope, principles, reporting process, severity scoring, reward system, user levels, dispute resolution, and prohibitions, emphasizing dedicated handling, point-based rewards, and strict rules for disclosures and malicious activity.

Bug BountyVulnerability Managementinformation security
0 likes · 13 min read
iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)
Continuous Delivery 2.0
Continuous Delivery 2.0
Dec 16, 2020 · Fundamentals

Code Coverage Best Practices

The article outlines why code coverage is valuable for developers, warns against chasing high percentages without quality, emphasizes risk‑based assessment of uncovered code, and provides practical guidelines for incrementally improving coverage, integrating it into reviews, and setting sensible thresholds.

Software Testingci/cdcode coverage
0 likes · 11 min read
Code Coverage Best Practices
Youzan Coder
Youzan Coder
Nov 25, 2020 · Information Security

Design and Implementation of an Interface Authorization Scanning Platform

The article presents a systematic, automated platform that captures, replays, and compares API requests using intelligent sampling and vertical/horizontal privilege checks to detect authorization flaws, dramatically reducing manual testing effort, uncovering over twenty issues monthly, and outlining future CI integration and AI‑enhanced detection.

APIAuthorizationAutomation
0 likes · 16 min read
Design and Implementation of an Interface Authorization Scanning Platform
Meituan Technology Team
Meituan Technology Team
Oct 29, 2020 · Industry Insights

How Distributed Control Enables Urban Drone Highways: A Technical Deep Dive

This article presents a comprehensive technical overview of urban aerial highways for low‑altitude UAV traffic, covering the background, spatiotemporal big‑data foundations, safety‑radius modeling, risk assessment, network and drone models, centralized and distributed control algorithms, simulation platforms, experimental results, and future research directions.

UAVairwaydistributed control
0 likes · 21 min read
How Distributed Control Enables Urban Drone Highways: A Technical Deep Dive
Tencent Tech
Tencent Tech
Sep 25, 2020 · Artificial Intelligence

What’s Inside Tencent’s AI Security Attack Matrix? A Minefield Guide

Tencent’s AI Security Attack Matrix, the industry’s first AI‑focused risk framework, maps attack tactics, techniques, and processes across the AI lifecycle, offering practical guidance for researchers and developers to identify and mitigate security threats in AI systems.

AI SafetyAI securityTencent
0 likes · 5 min read
What’s Inside Tencent’s AI Security Attack Matrix? A Minefield Guide
Architects Research Society
Architects Research Society
Sep 20, 2020 · Information Security

Introduction to Technical Risk Management

This guide explains what technical risk is, why it matters, and provides a step‑by‑step methodology for assessing, mitigating, and managing technology‑related risks—including lifecycle, compliance, and complexity considerations—to improve cost efficiency, agility, and security across the enterprise.

IT lifecyclecomplianceenterprise architecture
0 likes · 17 min read
Introduction to Technical Risk Management
HaoDF Tech Team
HaoDF Tech Team
Sep 7, 2020 · Operations

Analyzing Latency and Slow Interface Detection in a Full‑Chain Monitoring System

This article explains how latency is used as a key indicator for application risk identification, defines slow interfaces, describes why percentile‑based thresholds are preferred over averages, and outlines the architecture, task workflow, and practical optimization strategies for a full‑chain monitoring system in a microservice environment.

LatencyMicroservicesSRE
0 likes · 14 min read
Analyzing Latency and Slow Interface Detection in a Full‑Chain Monitoring System
Top Architect
Top Architect
Sep 6, 2020 · Cloud Native

Microservice Architecture: Evaluation, Adoption Timing, and Implementation Considerations

This article examines the transition from monolithic to microservice architecture, outlining the benefits and drawbacks of each, the conditions under which microservices should be adopted, the necessary technical and team resources, risk assessments, and practical guidance on service decomposition and migration.

Microservicesarchitecturerisk assessment
0 likes · 18 min read
Microservice Architecture: Evaluation, Adoption Timing, and Implementation Considerations
Architects Research Society
Architects Research Society
Aug 12, 2020 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity best practices for 2019, covering biometric security, tiered policies, risk‑based approaches, data backup, IoT protection, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing defense, and employee awareness to safeguard sensitive data.

Data ProtectionMulti-Factor Authenticationbest practices
0 likes · 22 min read
12 Best Cybersecurity Practices for 2019
Alibaba Terminal Technology
Alibaba Terminal Technology
Apr 1, 2020 · Frontend Development

How to Build a Robust Frontend Safety Production System for High‑Reliability Web Apps

This article explains the concept of frontend safety production, outlines its evolution from basic monitoring to a systematic, cloud‑enabled framework, and details the core capabilities—pre‑change CI checks, gray‑release gating, and real‑time monitoring—required to ensure high‑quality, risk‑free frontend deployments.

AutomationCIfrontend
0 likes · 12 min read
How to Build a Robust Frontend Safety Production System for High‑Reliability Web Apps
Top Architect
Top Architect
Mar 4, 2020 · Information Security

ISO 27001 Security Framework and Building an Enterprise Information Security System

This article explains why enterprises need information security, outlines the core security requirements such as data protection and business continuity, and presents a phased ISO 27001‑based roadmap—including short‑term, medium‑term goals, management policies, network segmentation, third‑party compliance, and budgeting—to establish a comprehensive security architecture.

ISO 27001complianceinformation security
0 likes · 6 min read
ISO 27001 Security Framework and Building an Enterprise Information Security System
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

Data ProtectionMFAbest practices
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
360 Tech Engineering
360 Tech Engineering
Jun 14, 2019 · Information Security

A Guide to Producing Threat Intelligence from a Security Analysis Perspective

This article explains how threat intelligence is generated by defining it as judged security information, outlines methods for collecting and evaluating security data, introduces a two‑dimensional reliability/quality rating system, and provides a step‑by‑step engineering workflow for enterprise threat‑intelligence operations.

information collectionmachine learningrisk assessment
0 likes · 10 min read
A Guide to Producing Threat Intelligence from a Security Analysis Perspective
Efficient Ops
Efficient Ops
Apr 24, 2019 · Operations

Why Every Ops Change Should Be Treated Like a Project

This article shares practical lessons from a real‑world ops incident, emphasizing the need for clear change background, optimal timing, project‑style management, and strict process adherence to reduce risk and improve production reliability.

DevOpsOperationsbest practices
0 likes · 9 min read
Why Every Ops Change Should Be Treated Like a Project
Architect's Tech Stack
Architect's Tech Stack
Nov 29, 2018 · Backend Development

Comprehensive Overview of Payment System Architecture and Core Processes

This article provides a detailed overview of payment system architecture, covering functional modules, core payment, refund, reconciliation, and settlement workflows, as well as design considerations such as gateway integration, routing, risk assessment, asynchronous processing, and transaction logging for robust backend development.

Payment ArchitectureReconciliationgateway integration
0 likes · 19 min read
Comprehensive Overview of Payment System Architecture and Core Processes
DataFunTalk
DataFunTalk
May 22, 2018 · Information Security

Designing a Credit-Based Content Management System: Strategies, Risk Assessment, and AI Techniques

The article outlines how to build a credit‑based content management platform by describing the evolution of security practices, defining user‑generated, professional‑generated, and occupational content models, proposing a credit‑audit workflow with risk assessment, and presenting AI‑driven text classification and anti‑cheat methods to balance traffic, quality, and trust.

Big Dataartificial intelligencecontent moderation
0 likes · 12 min read
Designing a Credit-Based Content Management System: Strategies, Risk Assessment, and AI Techniques
iQIYI Technical Product Team
iQIYI Technical Product Team
Aug 25, 2017 · R&D Management

Handling Urgent Requirement Insertion: Risks, Benefits, and Process

The article outlines how project managers can balance the risks and benefits of inserting urgent, high‑priority requirements by classifying project types, assessing stage‑specific impacts, answering six key decision questions, and following a structured review and approval workflow to avoid morale loss or missed opportunities.

risk assessmenturgent requirements
0 likes · 13 min read
Handling Urgent Requirement Insertion: Risks, Benefits, and Process
Efficient Ops
Efficient Ops
Mar 23, 2017 · Information Security

Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks

The article examines common security risks such as weak passwords, GitHub credential leaks, and misconfigurations in DevOps pipelines, illustrating how attackers exploit these flaws and offering practical mitigation strategies like access control, least‑privilege policies, robust password rules, and vulnerability tracking.

Password policygit securityinformation security
0 likes · 10 min read
Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks
21CTO
21CTO
Feb 18, 2017 · R&D Management

Is Your CTO a Silver Bullet or a Toxic Threat? How to Spot the Danger

The article examines common pitfalls of startup CTOs, illustrating how poor technical decisions, nepotistic hiring, and lack of accountability can cripple product development and waste resources, and offers practical signs CEOs should watch for to determine whether their CTO is an asset or a liability.

CTOrisk assessment
0 likes · 9 min read
Is Your CTO a Silver Bullet or a Toxic Threat? How to Spot the Danger
Baidu Intelligent Testing
Baidu Intelligent Testing
Jul 7, 2016 · Operations

Challenges and Pain Points of Distributed System Integration Testing

This article examines the common pain points of integration testing in distributed systems, including weak cross‑coupling coverage, lack of clear standards, chaotic composite scenarios, and insufficient risk assessment, and discusses current mitigation approaches and open questions for future exploration.

Distributed SystemsSoftware Testingintegration testing
0 likes · 7 min read
Challenges and Pain Points of Distributed System Integration Testing
Efficient Ops
Efficient Ops
Nov 16, 2015 · Operations

Mastering IT Change Management: Tools, Processes, and Risk Strategies

This article outlines effective IT operations change management by emphasizing the need for robust tools, standardized forms, precise steps, reusable templates, a change calendar, and clear risk classification, culminating in six simple principles to streamline execution and minimize disruptions.

Tool integrationprocess automationrisk assessment
0 likes · 12 min read
Mastering IT Change Management: Tools, Processes, and Risk Strategies