Tagged articles
370 articles
Page 2 of 4
DataFunTalk
DataFunTalk
Mar 6, 2025 · Artificial Intelligence

AI Large Model Applications in Chinese Regional Banks: Cases, Challenges, and Strategies

Chinese regional banks are leveraging AI large models across fourteen use cases—from intelligent customer service and risk control to credit approval and regulatory compliance—highlighting operational efficiencies, data-driven credit assessments, and challenges such as compute costs, data sovereignty, and talent gaps, while proposing solutions like elastic compute pools and privacy-preserving federated learning.

AIBankingFinTech
0 likes · 12 min read
AI Large Model Applications in Chinese Regional Banks: Cases, Challenges, and Strategies
Huolala Tech
Huolala Tech
Feb 14, 2025 · Artificial Intelligence

How AI‑Driven Loss Prevention Transforms Risk Management Across the Software Lifecycle

This article explains a comprehensive AI‑powered loss‑prevention framework that automatically identifies financial‑risk scenarios in both existing and new code, integrates model‑based detection into product, development, testing, and release stages, and continuously refines coverage through intelligent monitoring and rule enforcement.

AIModel TrainingSoftware Engineering
0 likes · 11 min read
How AI‑Driven Loss Prevention Transforms Risk Management Across the Software Lifecycle
Chen Tian Universe
Chen Tian Universe
Feb 14, 2025 · Operations

How Credit Lending Works: From Borrowers to Factoring and ABS Explained

This article provides a comprehensive overview of credit lending, detailing the roles of borrowers, platforms, and funders, exploring B‑ and C‑side market scenarios, various cooperation and financing models such as self‑operated loans, assisted lending, joint lending, factoring, bill discounting, and receivable‑backed securities, while also addressing associated risks and mitigation strategies.

ABSFactoringcredit
0 likes · 17 min read
How Credit Lending Works: From Borrowers to Factoring and ABS Explained
DataFunSummit
DataFunSummit
Feb 13, 2025 · Information Security

Building and Optimizing a Comprehensive Security System: Practices, Innovations, and Future Outlook

This article presents a detailed walkthrough of constructing a robust security architecture, covering single‑person security team strategies, risk perception and quantification, rapid incident response, automated detection, precise strike mechanisms, deterrence tactics, and forward‑looking plans for intelligent, data‑driven risk management.

AutomationSecuritySecurity Architecture
0 likes · 21 min read
Building and Optimizing a Comprehensive Security System: Practices, Innovations, and Future Outlook
Model Perspective
Model Perspective
Feb 6, 2025 · R&D Management

Mastering Project Implementation: Overcoming Real‑World Challenges with the OODA Loop

This article explores the final stage of the thinking‑chain—implementation—detailing the dynamic obstacles teams face, three core challenges, practical principles for acceptance, flexibility, and goal maximization, and how the OODA loop can guide rapid, adaptive decision‑making in complex projects.

OODA loopProject Managementdecision making
0 likes · 9 min read
Mastering Project Implementation: Overcoming Real‑World Challenges with the OODA Loop
Huolala Tech
Huolala Tech
Dec 19, 2024 · Backend Development

How We Automated Driver Withdrawals: Architecture Evolution & Risk Controls

Facing rapid growth, Huolala transformed its driver withdrawal flow from a manual, siloed PHP system to a Java‑based platform with automated risk controls, monitoring dashboards, and weekend payouts, achieving full‑order security, higher stability, improved driver satisfaction, and significant cost reductions.

Backend Architecturefinancial technologyrisk management
0 likes · 9 min read
How We Automated Driver Withdrawals: Architecture Evolution & Risk Controls
Radish, Keep Going!
Radish, Keep Going!
Dec 19, 2024 · Information Security

Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX

The article critiques hollow security‑first slogans, explores the endless nature of security, the tension between security and user experience, and offers practical risk‑scoring frameworks and phrasing advice for organizations seeking a realistic balance between protection and usability.

SecurityUser experienceinformation security
0 likes · 10 min read
Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX
Model Perspective
Model Perspective
Dec 19, 2024 · Fundamentals

How Calculus Powers Optimal Investment Strategies

This article explains how calculus and mathematical modeling can maximize investment returns, balance risk and reward, and optimize portfolio allocation, using derivative analysis, utility functions, Lagrange multipliers, and integration for long‑term planning, illustrating the scientific power behind financial decision‑making.

calculusinvestmentmathematical modeling
0 likes · 5 min read
How Calculus Powers Optimal Investment Strategies
Bilibili Tech
Bilibili Tech
Nov 22, 2024 · Product Management

Crowdsourced Testing Platform for Bilibili: Background, Challenges, Risks, and Management

Bilibili launched a crowdsourced testing platform that mobilizes its engaged head‑users to run product tests across diverse devices, addressing limited professional resources and scenario mismatches, while mitigating information leakage, security, and compliance risks through confidentiality agreements, whitelist access, and an intelligent management mini‑program that tracks recruitment, feedback quality, and incentives.

crowdsourced testingplatform architecturerisk management
0 likes · 18 min read
Crowdsourced Testing Platform for Bilibili: Background, Challenges, Risks, and Management
Java Backend Technology
Java Backend Technology
Nov 17, 2024 · Databases

How a One‑Digit Decimal Error Multiplied Interest Tenfold – Database Lessons

A developer mistakenly entered an extra zero in a SQL update for daily interest rates, expanding calculated interest by ten times, and the error slipped through code review, testing, and production verification due to inadequate processes, highlighting the need for strict data‑change procedures, thorough testing, and monitoring.

Code reviewdatabaseprocess
0 likes · 13 min read
How a One‑Digit Decimal Error Multiplied Interest Tenfold – Database Lessons
Alimama Tech
Alimama Tech
Nov 13, 2024 · Artificial Intelligence

DeepString: Alibaba's Anti‑Fraud Platform Using Large Models for Real‑Time Traffic Detection

Alibaba's anti-fraud platform DeepString uses large unsupervised models to detect abnormal traffic in real time across multiple advertising products, combining a foundation model for event mining, anomaly measurement, and an alignment model for online filtering, reducing reliance on manual labeling and domain expertise.

algorithm frameworkanti-fraudlarge models
0 likes · 19 min read
DeepString: Alibaba's Anti‑Fraud Platform Using Large Models for Real‑Time Traffic Detection
JD Retail Technology
JD Retail Technology
Nov 13, 2024 · R&D Management

Guidelines for New Project Managers: Initiation, Planning, Execution, and Monitoring

This article shares practical advice for novice project managers, covering the four process groups—initiation, planning, execution, and monitoring—through real‑world examples, stakeholder identification, risk handling, change control, and communication techniques to help them deliver value and grow their teams.

PlanningProject Managementexecution
0 likes · 25 min read
Guidelines for New Project Managers: Initiation, Planning, Execution, and Monitoring
FunTester
FunTester
Nov 7, 2024 · Operations

Mastering Software Risk Management: Proven Strategies to Prevent Project Failures

Effective software risk management—by identifying technical and business risks, integrating quality assurance, using structured processes, and leveraging risk‑management tools—helps avoid financial loss, project delays, and reputational damage while ensuring project success and operational stability.

OperationsProject Managementquality assurance
0 likes · 11 min read
Mastering Software Risk Management: Proven Strategies to Prevent Project Failures
DevOps
DevOps
Nov 5, 2024 · R&D Management

Project Management Six Grabs and Six Releases: Balancing Control and Flexibility for Successful Projects

The article outlines a 'six grabs, six releases' framework for project management, detailing how to focus on clear goals, detailed planning, effective teams, communication, risk mitigation, and monitoring while also letting go of perfectionism, hero‑complex, micromanagement, ego, and outdated experience to foster project success.

LeadershipProject Managementcommunication
0 likes · 9 min read
Project Management Six Grabs and Six Releases: Balancing Control and Flexibility for Successful Projects
vivo Internet Technology
vivo Internet Technology
Oct 23, 2024 · Fundamentals

Technical Debt: Definition, Classification, and Management Practices

Technical debt, introduced by Ward Cunningham, describes the hidden cost of rushed or sub‑optimal code that degrades efficiency, quality, and developer experience; it arises from intentional or unintentional shortcuts across four dimensions, and can be managed through systematic identification, analysis, resolution, review, and dedicated ownership, yielding more stable, higher‑quality software.

Technical Debtcode qualitydevelopment process
0 likes · 17 min read
Technical Debt: Definition, Classification, and Management Practices
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2024 · Fundamentals

Key Practices for Test Team Management and Quality Assurance

This article outlines comprehensive strategies for test managers, covering daily responsibilities, building and motivating efficient test teams, handling conflicts, time‑critical testing, cross‑department coordination, performance evaluation, risk management, communication with non‑technical stakeholders, QA throughout the software lifecycle, tool selection, process optimization, and emerging testing trends.

AutomationDevOpsPerformance Testing
0 likes · 12 min read
Key Practices for Test Team Management and Quality Assurance
Data Thinking Notes
Data Thinking Notes
Oct 14, 2024 · Information Security

12 Critical Data Security Risks Every Enterprise Must Address

From data lifecycle vulnerabilities to inadequate audit coverage, API misconfigurations, weak privileged access, and insufficient encryption, this article outlines twelve common data security risks and their real‑world impacts, helping organizations identify and remediate gaps before breaches occur.

access controlauditdata security
0 likes · 21 min read
12 Critical Data Security Risks Every Enterprise Must Address
Model Perspective
Model Perspective
Oct 11, 2024 · Fundamentals

Beyond Maximizing: Exploring Diverse Decision‑Making Perspectives

This article examines how decision makers can move beyond a single "maximization" goal by considering satisficing, risk minimization, multi‑objective optimization, and regret minimization, offering a richer set of viewpoints for tackling complex, uncertain choices.

decision makingmulti-objectiveoptimization
0 likes · 10 min read
Beyond Maximizing: Exploring Diverse Decision‑Making Perspectives
Test Development Learning Exchange
Test Development Learning Exchange
Oct 10, 2024 · R&D Management

Comprehensive Guide to Bug Incident Management, Post‑mortem, and Process Improvement

This guide outlines a complete workflow for handling software bugs—from immediate reporting and triage through impact assessment, resolution strategies, post‑incident analysis, and long‑term process, testing, and organizational improvements—to ensure stable releases and continuous quality enhancement.

bug managementci/cdpostmortem
0 likes · 14 min read
Comprehensive Guide to Bug Incident Management, Post‑mortem, and Process Improvement
Software Development Quality
Software Development Quality
Sep 21, 2024 · Information Security

How to Classify Security Incidents: A Comprehensive Grading Policy

This document outlines a security incident grading policy that defines purpose, scope, detailed classification across application, network, host, and data layers, and provides remarks on applicability, data‑related events, and the definition of critical (S0) vulnerabilities, helping organizations assess and prioritize security faults.

incident classificationinformation securitypolicy
0 likes · 3 min read
How to Classify Security Incidents: A Comprehensive Grading Policy
Model Perspective
Model Perspective
Sep 11, 2024 · Fundamentals

How Expectation Theory Can Guide Your Life Decisions

This article explores how the mathematical concept of expectation helps us understand and manage everyday hopes, assess risk, and make more rational decisions by balancing optimism with realistic assessments of uncertainty and variability.

Psychologydecision makingexpectation
0 likes · 9 min read
How Expectation Theory Can Guide Your Life Decisions
Efficient Ops
Efficient Ops
Sep 3, 2024 · Operations

Mastering Script Development: Essential Skills and Risk Controls for Ops Engineers

This article explores the essential competencies, coding standards, risk‑management practices, and collaborative strategies that script developers need to excel in modern digital operations, offering practical guidance on fundamentals, readability, security, logging, deployment, and teamwork.

coding standardsrisk managementscript development
0 likes · 13 min read
Mastering Script Development: Essential Skills and Risk Controls for Ops Engineers
JD Retail Technology
JD Retail Technology
Aug 28, 2024 · Industry Insights

How JD Retail Secures E‑Commerce with AI‑Driven Content Compliance

This article examines JD Retail's content compliance platform, detailing user‑facing problems, business‑level audit responsibilities, key performance metrics, operational workflows, and a technical case study on detecting price over‑pricing using comparable‑price models and large‑scale price prediction.

Price Anomaly Detectioncompliancecontent moderation
0 likes · 10 min read
How JD Retail Secures E‑Commerce with AI‑Driven Content Compliance
JavaEdge
JavaEdge
Aug 1, 2024 · R&D Management

How to Design a Scalable Risk Engine: Architecture, Rules, and Operations

This article outlines an architect's thinking model, a step‑by‑step requirement analysis, core design principles for a risk engine—including efficient rule composition, operational support, unified SDK integration, and an event ingestion center—and presents business, application, data, and technical architecture diagrams to illustrate the complete system.

R&DSoftware EngineeringSystem Architecture
0 likes · 6 min read
How to Design a Scalable Risk Engine: Architecture, Rules, and Operations
Efficient Ops
Efficient Ops
Jul 31, 2024 · Operations

How HuoLala Achieved Zero‑Fault Peaks: A Blueprint for High‑Load System Reliability

This article details HuoLala's three‑year journey of systematic business‑peak assurance, covering goal definition, project‑management practices, technical risk mitigation, cloud‑provider coordination, and post‑event reviews that together delivered zero‑fault high‑traffic periods and continuously improving system stability.

capacity planningpeak load managementrisk management
0 likes · 20 min read
How HuoLala Achieved Zero‑Fault Peaks: A Blueprint for High‑Load System Reliability
JD Tech
JD Tech
Jul 29, 2024 · Frontend Development

From C‑end to B‑end: Technical Transformation and Front‑end Engineering Practices

The article shares a front‑end engineer's journey from consumer‑facing (C‑end) projects to complex B‑end systems, detailing technical stack choices, architecture patterns, risk‑control measures, consolidated management, and user‑experience focus while offering practical insights for developers facing similar transitions.

B‑endCareer DevelopmentTechnical transformation
0 likes · 19 min read
From C‑end to B‑end: Technical Transformation and Front‑end Engineering Practices
JD Retail Technology
JD Retail Technology
Jul 26, 2024 · Frontend Development

From C‑End to B‑End: A Front‑End Engineer’s Technical Transformation and Lessons Learned

The article shares a front‑end engineer’s journey from consumer‑facing (C‑end) projects to complex B‑end systems, detailing technical transitions, risk‑control practices, a layered reuse model, user‑experience focus, and future outlook on continuous learning and AI‑driven development.

B2BTechnical transformationmicrofrontend
0 likes · 17 min read
From C‑End to B‑End: A Front‑End Engineer’s Technical Transformation and Lessons Learned
Data Thinking Notes
Data Thinking Notes
Jul 25, 2024 · Information Security

How Large Language Models Transform Data Security Compliance Management

This article explains how a leading insurance technology group leverages large language models to streamline data security compliance, detailing the evolution of data management, key governance challenges, multimodal AI architecture, and practical workflows for policy enforcement, risk monitoring, and asset management.

AIData Governancecompliance
0 likes · 10 min read
How Large Language Models Transform Data Security Compliance Management
21CTO
21CTO
Jul 23, 2024 · Information Security

What the Microsoft Blue‑Screen Crisis Teaches About IT Risk Management

The massive Microsoft blue‑screen outage caused by a faulty CrowdStrike update highlights the dangers of single‑system reliance, poor code quality, insufficient QA, and the need for staged rollouts, robust backup, real‑time monitoring, and proactive incident‑response strategies for modern IT organizations.

IT Operationsdisaster recoveryincident response
0 likes · 10 min read
What the Microsoft Blue‑Screen Crisis Teaches About IT Risk Management
Data Thinking Notes
Data Thinking Notes
Jul 16, 2024 · Information Security

How to Build an Effective Data Security Operations Metrics System

Data security, centered on the full data lifecycle, demands deep defense against dynamic, continuous risks; by adopting a new operational mindset and a comprehensive metrics system, organizations can achieve greater visibility, control, sustainability, and trustworthiness in protecting their data assets.

Data Lifecycledata securityinformation security
0 likes · 3 min read
How to Build an Effective Data Security Operations Metrics System
DataFunTalk
DataFunTalk
Jul 16, 2024 · Information Security

Application of Graph Technology in Financial Anti‑Fraud

This article explains how graph‑based techniques are used in financial anti‑fraud, covering background, the role of graphs in perception, judgment, decision and disposal, the evolution of graph solutions, a concrete case study, and future outlooks for AI‑enhanced risk detection.

artificial intelligencefinancial fraud detectiongraph technology
0 likes · 15 min read
Application of Graph Technology in Financial Anti‑Fraud
DaTaobao Tech
DaTaobao Tech
Jun 24, 2024 · R&D Management

Technical Project Management: Roles, Challenges, and Best Practices

Technical project managers drive complex initiatives by translating business needs into feasible solutions, planning milestones, allocating resources, managing risks, and coordinating cross‑functional teams through design, testing, deployment, and closure, while using tight schedules, daily checkpoints, and transparent reporting to balance quality, speed, and reusable outcomes.

Project Managementagile-practicesrisk management
0 likes · 14 min read
Technical Project Management: Roles, Challenges, and Best Practices
Huolala Tech
Huolala Tech
Jun 13, 2024 · Operations

How Huolala Achieved Zero Failures During Business Peaks for 3 Years

Huolala’s engineering team built a systematic, multi‑layered business‑peak assurance process—covering goal definition, project management, technical risk mitigation, cloud‑provider coordination, capacity planning, and post‑mortem analysis—that has kept its platform fault‑free for over three years of high‑traffic events.

peak reliabilityrisk managementsystem stability
0 likes · 19 min read
How Huolala Achieved Zero Failures During Business Peaks for 3 Years
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Jun 13, 2024 · Information Security

How HuoLala Built an Effective Human‑Centric InfoSec Training Program

This article examines the challenges of cultivating a security‑aware workforce and details HuoLala's multi‑layered "human defense" training framework, covering employee onboarding, annual all‑staff sessions, department‑specific courses, technical staff workshops, daily awareness campaigns, and engaging delivery channels to strengthen the company's overall information security culture.

culture buildingemployee traininghuman factor
0 likes · 15 min read
How HuoLala Built an Effective Human‑Centric InfoSec Training Program
AntTech
AntTech
May 17, 2024 · Information Security

Exploring and Practicing Cybersecurity Insurance for Small and Medium Enterprises

Amid rapid digital transformation, this article examines the growing importance of cybersecurity insurance for Chinese SMEs, presenting market data, challenges, a three‑layer protection model, and details of a recent industry salon that discussed practical solutions and future pilots.

InsuranceSMEscybersecurity
0 likes · 7 min read
Exploring and Practicing Cybersecurity Insurance for Small and Medium Enterprises
Alibaba Cloud Developer
Alibaba Cloud Developer
May 17, 2024 · Backend Development

How Quantitative Code Simplification Boosted Our Backend System Efficiency

This article explains how a data‑driven approach to code reduction—measuring function usage, weighting functions, and prioritizing deletions—enabled a large‑scale backend coupon system to cut code‑review effort by up to 40%, improve readability, and manage the high risks of refactoring.

Backend RefactoringCode SimplificationPerformance Optimization
0 likes · 11 min read
How Quantitative Code Simplification Boosted Our Backend System Efficiency
ITPUB
ITPUB
May 10, 2024 · Databases

Choosing Low‑Risk Strategies for Critical DBA Outages

When a major operations incident strikes, the safest approach is to prioritize simple, low‑risk actions and accept limited responsibility, as illustrated by real DBA lessons from Oracle RAC failures and a data‑center power‑loss disaster.

DBAOperationsOracle RAC
0 likes · 7 min read
Choosing Low‑Risk Strategies for Critical DBA Outages
DataFunTalk
DataFunTalk
May 8, 2024 · Big Data

Risk Control and Data Application in the Bulk Commodity Industry: Challenges, Solutions, and Core Capabilities

The article presents Ant Group's exploration of applying its data‑driven risk control and credit assessment capabilities to the traditional bulk commodity sector, detailing industry background, data pain points, core technical solutions, and the construction of a secure, explainable data‑model platform for digital transformation.

AIBig DataBulk Industry
0 likes · 13 min read
Risk Control and Data Application in the Bulk Commodity Industry: Challenges, Solutions, and Core Capabilities
Software Development Quality
Software Development Quality
Apr 30, 2024 · R&D Management

How to Build an Effective R&D Management Framework for Innovation Success

This guide outlines a comprehensive R&D management framework covering objectives, scope, team structure, process stages, requirement management, planning, monitoring, technology evaluation, quality assurance, knowledge sharing, risk and change management, reviews, acceptance, and documentation to boost efficiency and product quality.

Team Rolesprocess frameworkrisk management
0 likes · 7 min read
How to Build an Effective R&D Management Framework for Innovation Success
Architecture and Beyond
Architecture and Beyond
Apr 20, 2024 · Information Security

How to Secure User Assets in SaaS: Strategies, Policies, and Pitfalls

The article defines user assets, explains why protecting them is vital for SaaS companies, and outlines organizational, procedural, technical, and emergency-response measures—plus common challenges—to help enterprises build comprehensive user asset security programs.

Data ProtectionSaaSinformation security
0 likes · 17 min read
How to Secure User Assets in SaaS: Strategies, Policies, and Pitfalls
DataFunTalk
DataFunTalk
Apr 19, 2024 · Artificial Intelligence

Technology Maturity Curve – Financial Risk Control Overview

This article provides a comprehensive overview of the evolution, current state, and future trends of financial risk control technologies, covering data, feature engineering, modeling, decision-making, product development, challenges, and the impact of large AI models on the industry.

Big DataTechnology Maturityfinancial risk
0 likes · 29 min read
Technology Maturity Curve – Financial Risk Control Overview
21CTO
21CTO
Apr 14, 2024 · Fundamentals

8 Hard‑Won Lessons on Software Architecture Every Engineer Should Know

This reflective essay shares eight practical insights on software architecture—from the challenge of asking the right questions and deciding what not to build, to the pivotal role of non‑functional requirements, risk‑first design, and the paradox of simplicity—offering engineers actionable guidance for better architectural decisions.

Non-functional RequirementsSoftware Architecturecontinuous coding
0 likes · 13 min read
8 Hard‑Won Lessons on Software Architecture Every Engineer Should Know
JD Tech
JD Tech
Apr 9, 2024 · Backend Development

Reflections on a Year of Growth, Technology, and Communication at JD Jinli Platform

This article shares a developer's year‑long journey at JD Jinli, covering personal growth, technical innovations such as points‑asset protection, risk mitigation, traffic governance, and communication best practices, while emphasizing how disciplined engineering and collaborative mindset drive business value.

Product DevelopmentSoftware Engineeringrisk management
0 likes · 25 min read
Reflections on a Year of Growth, Technology, and Communication at JD Jinli Platform
Chen Tian Universe
Chen Tian Universe
Apr 4, 2024 · Fundamentals

Essential Credit Glossary: 65 Key Loan and Financing Terms Explained

This comprehensive glossary explains 65 essential credit and financing terms—from borrower and lender roles to loan products, risk controls, contract clauses, and post‑loan processes—providing a clear reference for anyone working with loan products or financial platforms.

Bankingcreditfinancial terms
0 likes · 27 min read
Essential Credit Glossary: 65 Key Loan and Financing Terms Explained
Efficient Ops
Efficient Ops
Apr 2, 2024 · Operations

What Do Leading Tech Giants Expect from SREs? Job Posting Insights

Amid economic growth and frequent continuity incidents, major internet firms are redefining SRE roles, emphasizing cost reduction, system resilience, risk management, AI‑driven operations, and close collaboration with development teams, as revealed by a detailed analysis of recent job postings from Ant Group, Alibaba, ByteDance and others.

AI-nativeCost OptimizationSRE
0 likes · 9 min read
What Do Leading Tech Giants Expect from SREs? Job Posting Insights
Model Perspective
Model Perspective
Mar 21, 2024 · Fundamentals

How the “Maximum Regret Principle” Guides Decision‑Making: A Mathematical Model Explained

The article introduces Zhang Ruimin’s “maximum regret principle,” explains its mathematical formulation using regret matrices and utility functions, and demonstrates its application through a concrete investment decision example that shows how minimizing the worst‑case regret leads to robust choices.

Business strategydecision theorymathematical modeling
0 likes · 5 min read
How the “Maximum Regret Principle” Guides Decision‑Making: A Mathematical Model Explained
Huolala Tech
Huolala Tech
Mar 19, 2024 · Information Security

How AI and Big Data Transform Information Security Risk Management

This article examines the evolution of information security risk management—from classic standards like GB/T20984 and ISO27001 to modern AI‑driven, big‑data approaches—detailing risk definitions, quantitative models, international guidelines, and future research directions.

BayesianStandardsinformation security
0 likes · 14 min read
How AI and Big Data Transform Information Security Risk Management
Chen Tian Universe
Chen Tian Universe
Mar 18, 2024 · Operations

How to Build a Cross‑Border Card Acquiring System for Third‑Party Payment Platforms

The article examines the rapid growth of China's foreign‑card acquiring market, outlines its distinctive features such as expanding transaction volume, diversified payment methods, heightened risk‑control requirements, and explains the technical architecture, modules, and operational processes needed for third‑party payment providers to launch cross‑border card acquiring services.

card acquiringcross-border paymentsfinancial technology
0 likes · 26 min read
How to Build a Cross‑Border Card Acquiring System for Third‑Party Payment Platforms
Data Thinking Notes
Data Thinking Notes
Feb 27, 2024 · Information Security

How to Build an Effective Enterprise Data Security Governance System

This article explores enterprise data security governance, outlining practical methodologies, implementation pathways, and real-world case studies to guide organizations in planning and establishing robust data security governance frameworks while highlighting key challenges, compliance considerations, and measurable outcomes for sustained protection.

Enterprisecompliancedata security
0 likes · 2 min read
How to Build an Effective Enterprise Data Security Governance System
Chen Tian Universe
Chen Tian Universe
Feb 18, 2024 · Operations

How Integrated Business‑Finance Systems Boost Decision‑Making and Risk Management

The article explains how integrating business, finance, and management data—known as business‑finance integration—provides real‑time insight, improves compliance and risk control, enhances productivity, and creates actionable financial metrics, while outlining the necessary system architecture and implementation steps.

Data‑Driven Decision MakingSystem Architecturebusiness finance integration
0 likes · 12 min read
How Integrated Business‑Finance Systems Boost Decision‑Making and Risk Management
Test Development Learning Exchange
Test Development Learning Exchange
Feb 2, 2024 · Product Management

Understanding AB Testing: Risks, Benefits, and Best Practices

AB testing is a statistical method for comparing multiple strategies or versions to determine the most effective one, and this article explains its risks, mitigation measures, advantages, key dimensions, step‑by‑step workflow, fairness considerations, data‑cleaning techniques, target goals, design guidelines, and alternative experimental approaches.

AB testingconversion rateexperiment design
0 likes · 9 min read
Understanding AB Testing: Risks, Benefits, and Best Practices
Advanced AI Application Practice
Advanced AI Application Practice
Feb 1, 2024 · R&D Management

A Core Roadmap for Effective Quality Assurance

The article outlines a practical roadmap for quality assurance across the software lifecycle, highlighting the pivotal roles of clear requirements, sound technical implementation, risk and project management, and measurable cost metrics, while stressing the need for solid processes and infrastructure.

InfrastructureProject Managementprocess improvement
0 likes · 8 min read
A Core Roadmap for Effective Quality Assurance
AntTech
AntTech
Jan 18, 2024 · Information Security

The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation

The report released by the Chinese Academy of Social Sciences and Ant Group highlights how security technology, now a public good alongside AI, is essential for managing accelerating digital risks, outlines its four pillars, and proposes collaborative strategies to make security technology a universal, socially responsible foundation for the digital society.

AI riskdigital societyinformation security
0 likes · 14 min read
The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation
DataFunSummit
DataFunSummit
Jan 15, 2024 · Artificial Intelligence

Financial Large Language Model: Characteristics, Construction, Architecture, and Practical Applications

This article presents a comprehensive overview of financial large language models, covering their unique characteristics, construction methods, layered technical architecture, evaluation strategies, and real‑world use cases such as quality inspection, AIGC‑driven material generation, sales‑lead mining, and knowledge‑graph‑enhanced intelligent Q&A.

Financial AIModel architecturedata engineering
0 likes · 14 min read
Financial Large Language Model: Characteristics, Construction, Architecture, and Practical Applications
DeWu Technology
DeWu Technology
Jan 8, 2024 · Backend Development

Overview of Payment System Evolution, Architecture, and Practices

The article traces payment system evolution from early ticket‑house methods to modern real‑time settlement, explains core concepts, architecture, APIs, fund and information flows, security and two‑level clearing mechanisms, and how order‑payment interactions should be designed for reliable e‑commerce transactions.

architecturee‑commercepayment systems
0 likes · 24 min read
Overview of Payment System Evolution, Architecture, and Practices
dbaplus Community
dbaplus Community
Jan 7, 2024 · Databases

How to Cut MySQL Storage Costs by Over 50%: A Practical Framework

This article presents a systematic, nine‑grid method for reducing MySQL storage expenses—including table compression, JSON field serialization, and hot‑cold data separation—while quantifying benefits, ensuring data safety, and validating system stability through staged testing and SRE metrics.

Database Cost ReductionPerformance TestingStorage Optimization
0 likes · 13 min read
How to Cut MySQL Storage Costs by Over 50%: A Practical Framework
ITPUB
ITPUB
Dec 27, 2023 · Operations

When a Snapshot Share Became a Data Leak: Lessons from a Cloud Ops Failure

A developer mistakenly set a cloud disk snapshot to public, exposing a major client’s data, and recounts the frantic rollback, the ensuing panic among teammates, and the hard‑won operational lessons about high‑risk manual tasks, proper safeguards, and the need for visualized tooling.

Operationsdata securityincident response
0 likes · 10 min read
When a Snapshot Share Became a Data Leak: Lessons from a Cloud Ops Failure
DevOps
DevOps
Dec 13, 2023 · Product Management

Agile Estimation Techniques, Risk Management, and Best Practices

This article explores the nature of agile estimation, details popular techniques such as Planning Poker, T‑Shirt Sizing, Story Points, Affinity and Wideband Delphi, and provides comprehensive risk‑management strategies and best‑practice recommendations to improve forecasting accuracy and project success.

Planning Pokerbest practicesestimation
0 likes · 9 min read
Agile Estimation Techniques, Risk Management, and Best Practices
Test Development Learning Exchange
Test Development Learning Exchange
Dec 2, 2023 · R&D Management

Comprehensive Guide for Test Team Leaders on Culture, Performance, Staffing, and Remote Management

This article provides test team leaders with practical strategies for handling cultural resistance, setting KPI performance metrics, managing staff turnover, resolving conflicts with developers, creating effective weekly reports, determining hiring needs, overseeing new business lines, controlling project progress and risks, reporting results, and successfully managing remote teams.

Staffingperformance metricsremote work
0 likes · 17 min read
Comprehensive Guide for Test Team Leaders on Culture, Performance, Staffing, and Remote Management
JD Tech
JD Tech
Nov 23, 2023 · R&D Management

Applying Sun Tzu’s Art of War Principles to Project Management

The article explores how Sun Tzu’s strategic concepts—such as aligning with goals, timing, resources, leadership qualities, and governance—can guide project selection, preparation, execution, and risk management, offering a blend of scientific and artistic approaches to improve project success rates.

LeadershipProject ManagementSun Tzu
0 likes · 10 min read
Applying Sun Tzu’s Art of War Principles to Project Management
Amap Tech
Amap Tech
Nov 21, 2023 · Fundamentals

The Essence of Quality Assurance and the Value of Testing Roles

Quality assurance is fundamentally about exhaustive falsification to lower online risk, while the testing process seeks optimal ROI by balancing defect discovery against resource investment; a tester’s value hinges on business risk, system maturity, and the ability to become increasingly irreplaceable through deep domain knowledge, proactive risk mitigation, and innovative, end‑to‑end quality solutions.

ROISoftware TestingSoftware quality
0 likes · 11 min read
The Essence of Quality Assurance and the Value of Testing Roles
Architect
Architect
Nov 12, 2023 · R&D Management

Project Management for Developers: Why It Matters and How to Excel

This article explains why project management is essential for developers, outlines common pain points such as inaccurate workload estimation and dependency issues, and provides detailed guidance on progress, quality, and risk management, including practical techniques, checklists, and tools to improve efficiency and deliver successful projects.

Project Managementdeveloper productivityprogress tracking
0 likes · 38 min read
Project Management for Developers: Why It Matters and How to Excel
Selected Java Interview Questions
Selected Java Interview Questions
Nov 12, 2023 · Backend Development

Implementing the Chain of Responsibility Pattern for Login Risk Management in Java

This article explains the Chain of Responsibility design pattern and demonstrates how to apply it in a Java backend to evaluate login risk factors such as password errors, unusual login times, IP whitelist violations, and abnormal login locations, providing full code examples and execution flow.

BackendChain of ResponsibilityJava
0 likes · 16 min read
Implementing the Chain of Responsibility Pattern for Login Risk Management in Java
Efficient Ops
Efficient Ops
Nov 1, 2023 · Information Security

How CICC Reached Advanced DevSecOps Standards: Inside Their Security Success

The article details CICC's successful completion of multiple DevSecOps assessments, shares interview insights from senior IT leaders on cultural, process, and technical implementations, and provides an overview of the DevOps capability maturity model and industry participation statistics, illustrating how standardized DevOps practices boost security and efficiency.

Case StudyContinuous DeliveryDevOps
0 likes · 16 min read
How CICC Reached Advanced DevSecOps Standards: Inside Their Security Success
Architects Research Society
Architects Research Society
Nov 1, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition and responsibilities of a security architecture team, detailing the roles of Security Architect, Information Security Architect, CISO, and Security Analyst, their required business and technical skills, risk management, threat modeling, and how they integrate with enterprise architecture.

CISOSecurity ArchitectureSecurity Roles
0 likes · 11 min read
Roles and Responsibilities of a Security Architecture Team
FunTester
FunTester
Nov 1, 2023 · Fundamentals

Understanding and Managing Technical Debt in Software Development

This article explains what technical debt is, its harmful effects, common scenarios that generate it, common misconceptions, and practical strategies for managing and repaying technical debt to keep software projects maintainable and cost‑effective.

Software EngineeringTechnical Debtcode quality
0 likes · 25 min read
Understanding and Managing Technical Debt in Software Development
Tencent Cloud Developer
Tencent Cloud Developer
Oct 30, 2023 · Fundamentals

Understanding and Managing Technical Debt in Software Development

Technical debt—ranging from low‑level design flaws and inadequate testing to strategic shortcuts and evolving third‑party dependencies—accumulates when urgent product demands bypass best practices, leading to higher costs, slower delivery, and poorer quality, so teams must make debt visible, enforce strong completion criteria, and allocate regular sprint capacity to prioritize, refactor, and repay high‑interest debt while recognizing when legacy code can be retired.

Technical Debtrefactoringrisk management
0 likes · 25 min read
Understanding and Managing Technical Debt in Software Development
DataFunSummit
DataFunSummit
Oct 29, 2023 · Artificial Intelligence

Construction and Application of a Financial Event Knowledge Graph

This article describes the design, construction pipeline, and practical applications of a financial event knowledge graph, covering background challenges, multi‑layer modeling, information‑extraction techniques, and use cases such as institutional risk monitoring, wealth‑management recommendation, and industry‑chain analysis.

Event ExtractionInformation Extractionfinancial knowledge graph
0 likes · 14 min read
Construction and Application of a Financial Event Knowledge Graph
Architecture and Beyond
Architecture and Beyond
Oct 28, 2023 · Operations

Project Initiation: Importance, Process, and Common Issues

The article explains why proper project initiation is essential, defines its meaning, outlines its six key benefits, describes the three‑phase initiation workflow (preparation, decision, alignment), and highlights typical problems that can arise at each stage.

Project Managementdecision makingproject initiation
0 likes · 18 min read
Project Initiation: Importance, Process, and Common Issues
Efficient Ops
Efficient Ops
Oct 27, 2023 · Information Security

How CICC’s iBanker Project Achieved Advanced DevSecOps Certification

At the 2023 GOPS Global Operations Conference, China International Capital Corporation (CICC) showcased its successful DevSecOps Level‑2 assessments for two major projects, revealing detailed cultural, process, and technical practices that elevated its security posture and set a benchmark for the industry.

CICCDevOpsDevSecOps
0 likes · 15 min read
How CICC’s iBanker Project Achieved Advanced DevSecOps Certification
JD Retail Technology
JD Retail Technology
Oct 8, 2023 · Mobile Development

Cross‑Platform Development of JD Mini‑Program for Fast Delivery: Background, Action, Research, Progress, and Planning

This report details JD's mini‑program cross‑platform initiative for the Fast Delivery service, covering background, actions taken, research findings, progress achieved, planning considerations, risk mitigation, and expected benefits such as reduced cost, improved stability, and higher development efficiency.

DeploymentJDmini-program
0 likes · 9 min read
Cross‑Platform Development of JD Mini‑Program for Fast Delivery: Background, Action, Research, Progress, and Planning
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 7, 2023 · Frontend Development

Why Adopt TypeScript in Frontend Development: Business Motivation, Error Analysis, Cost‑Benefit, and Implementation Plan

This article explains the business reasons for introducing TypeScript in a B‑end frontend product, analyzes common runtime type errors, compares TypeScript with plain JavaScript, evaluates costs, risks and benefits, and outlines a practical implementation roadmap.

TypeScriptcode qualitycost-benefit
0 likes · 8 min read
Why Adopt TypeScript in Frontend Development: Business Motivation, Error Analysis, Cost‑Benefit, and Implementation Plan
Data Thinking Notes
Data Thinking Notes
Sep 24, 2023 · Information Security

How to Build a Robust Data Security Governance Framework: Steps & Best Practices

Data security governance, essential for modern enterprises, involves classifying and authorizing data, implementing scenario-based protections, and establishing comprehensive frameworks that address compliance, asset management, process control, and continuous improvement, guiding organizations through strategic planning, organizational structuring, policy creation, and ongoing operational monitoring.

Frameworkcompliancedata security
0 likes · 15 min read
How to Build a Robust Data Security Governance Framework: Steps & Best Practices
JD Retail Technology
JD Retail Technology
Sep 20, 2023 · R&D Management

Applying Sun Tzu’s Art of War Principles to Project Management

This article interprets key concepts from Sun Tzu’s *Art of War*—such as strategic assessment, rapid execution, risk awareness, and adaptive tactics—and demonstrates how project managers can use them to select, plan, and lead projects successfully in volatile, uncertain, complex, and ambiguous environments.

LeadershipProject ManagementSun Tzu
0 likes · 9 min read
Applying Sun Tzu’s Art of War Principles to Project Management
DevOps
DevOps
Sep 11, 2023 · Artificial Intelligence

How Generative AI Is Transforming the Workplace: Adoption, Risks, and Governance

This article explores how generative AI is reshaping workplace productivity, outlines the opportunities and risks of its adoption, and provides a strategic framework for governance, responsible use, and organizational alignment to maximize benefits while mitigating intellectual‑property, ethical, and security concerns.

AI Governanceenterprise adoptionproductivity
0 likes · 14 min read
How Generative AI Is Transforming the Workplace: Adoption, Risks, and Governance
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Sep 8, 2023 · Game Development

Essential Skills and Practices for Game Functional Testing

This article outlines the hard and soft competencies required for game functional testing, including test case creation, bug tracking, risk awareness, communication, proactive work habits, learning ability, and innovation, while offering practical strategies to improve testing efficiency and product quality.

bug trackingfunctional testinggame testing
0 likes · 33 min read
Essential Skills and Practices for Game Functional Testing
DataFunTalk
DataFunTalk
Sep 2, 2023 · Artificial Intelligence

Artificial Intelligence in the Financial Sector: Applications, Challenges, and Future Trends – Interview with Li Jinlong

This interview explores how artificial intelligence, especially large language models, is transforming banking through digitalization, personalized services, risk management, and operational automation, while also highlighting data, model, and compute challenges that financial institutions must address to sustain AI-driven innovation.

BankingDigital Transformationartificial intelligence
0 likes · 10 min read
Artificial Intelligence in the Financial Sector: Applications, Challenges, and Future Trends – Interview with Li Jinlong
DeWu Technology
DeWu Technology
Aug 28, 2023 · Operations

Real-time Data Warehouse Business-Side Chaos Engineering Practice

The article describes how a real‑time data warehouse supporting ad‑delivery metrics adopts both technical and business‑side chaos‑engineering, using red‑blue team drills to inject faults, monitor indicator anomalies, and refine response procedures, thereby enhancing early risk detection, system resilience, and overall data stability for the advertising platform.

Backend DevelopmentData QualityData Warehousing
0 likes · 16 min read
Real-time Data Warehouse Business-Side Chaos Engineering Practice
DeWu Technology
DeWu Technology
Aug 14, 2023 · Operations

Capital Loss Prevention Practices and Technical System

Dewu’s capital‑loss prevention framework embeds risk assessment and technical safeguards—such as idempotency, distributed consistency, and active‑active multi‑region design—into architecture, organizes three defensive lines (development, QA, SRE), and employs real‑time, near‑real‑time, and offline verification plus regular drills, while advancing automated analysis and intelligent scaling.

Data ConsistencySREfinancial loss prevention
0 likes · 10 min read
Capital Loss Prevention Practices and Technical System
DataFunSummit
DataFunSummit
Aug 12, 2023 · Information Security

Design and Exploration of Mobile Game Anti‑Fraud Systems

This article examines the mobile game black‑market ecosystem, outlines common fraud patterns such as script cheats, account trading, and illegal recharge, and presents a comprehensive anti‑fraud architecture that combines real‑time risk assessment, offline analysis, and adaptive mitigation strategies for game developers and operators.

Game SecurityMobile Gamingalgorithm
0 likes · 21 min read
Design and Exploration of Mobile Game Anti‑Fraud Systems
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Aug 11, 2023 · Game Development

Comprehensive Guide to Testing Short‑Term Game Activities

This article provides a detailed testing guide for short‑term game events, covering their unique challenges, requirement analysis, risk mitigation, test case preparation, execution strategies, communication practices, player experience considerations, log verification, post‑mortem analysis, and activity reuse recommendations.

Player ExperienceQA processgame testing
0 likes · 16 min read
Comprehensive Guide to Testing Short‑Term Game Activities
Sohu Tech Products
Sohu Tech Products
Aug 9, 2023 · Information Security

Software Supply Chain Security: Risks, Attacks, and Mitigation

The article explains software supply chain security across development, delivery, and usage phases, outlines ten common vulnerabilities and four attack categories, describes attack characteristics, examines risk factors in design, code, release, and operation stages, and presents comprehensive mitigation measures including SDL phases, DevSecOps practices, and detailed lifecycle controls.

DevSecOpsSDLSecurity
0 likes · 12 min read
Software Supply Chain Security: Risks, Attacks, and Mitigation
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 8, 2023 · R&D Management

Mastering Elegant Project Management for Technical PMs: Strategies and Models

This comprehensive guide explains why technical project managers must adopt an elegant mindset, master core project‑management concepts, choose appropriate software‑development models, apply agile practices, manage stakeholders, communication, and risks, and leverage essential tools to deliver successful projects in fast‑changing environments.

Project Managementagilerisk management
0 likes · 33 min read
Mastering Elegant Project Management for Technical PMs: Strategies and Models
Continuous Delivery 2.0
Continuous Delivery 2.0
Jul 31, 2023 · Information Security

15 Key Cybersecurity Metrics for Measuring and Improving Security Performance

The article outlines fifteen essential cybersecurity metrics—thirteen process indicators such as mean detection and response times, and two result indicators like data loss incidents and security ROI—to help organizations evaluate, monitor, and improve their security posture and inform investment decisions.

cybersecurityincident responserisk management
0 likes · 4 min read
15 Key Cybersecurity Metrics for Measuring and Improving Security Performance
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 21, 2023 · Information Security

Mastering Systematic Problem Solving for Complex Security Challenges

This article explores how to systematically tackle complex security problems by defining system thinking, distinguishing simple from complex issues, and applying a comprehensive, deep, and dynamic approach illustrated with a data‑leakage case study and practical recommendations for future security strategy.

Case Studycomplex problemsinformation security
0 likes · 16 min read
Mastering Systematic Problem Solving for Complex Security Challenges
Tencent Cloud Developer
Tencent Cloud Developer
Jul 10, 2023 · Fundamentals

Understanding Technical Debt: Causes, Impacts, and Mitigation Strategies

Technical debt, the hidden cost of shortcuts across code, business, and team practices, grows from evolving technology, rapid business changes, and weak standards, but can be managed through disciplined analysis, standardized design, iterative planning, metric‑driven reviews, dedicated resources, and a professional, top‑down mindset.

Team CultureTechnical Debtdevelopment process
0 likes · 15 min read
Understanding Technical Debt: Causes, Impacts, and Mitigation Strategies
vivo Internet Technology
vivo Internet Technology
Jun 14, 2023 · Information Security

Vivo Game Anti-Cheat Analysis: Identifying and Combating Black Market Fraud

The article examines Vivo’s gaming platform’s fight against black‑market fraud, outlining profit motives, types of illicit activities, brushing techniques, and the company’s three‑stage anti‑fraud framework—pre‑risk perception, in‑process detection, and post‑strike closure—illustrated with two real‑world case studies.

Game SecurityVivo platformanti-fraud
0 likes · 13 min read
Vivo Game Anti-Cheat Analysis: Identifying and Combating Black Market Fraud
Architects Research Society
Architects Research Society
Jun 10, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition of a security architecture team, detailing the roles of security architect, information security architect, chief information security officer, and security analyst, along with their business and technical skills, organizational relationships, and key responsibilities in managing enterprise security.

CISOSecurity AnalystSecurity Architecture
0 likes · 13 min read
Roles and Responsibilities of a Security Architecture Team
Zhaori User Experience
Zhaori User Experience
May 19, 2023 · Frontend Development

How to Tackle Unexpected UI Risks with Five‑Question Method and Rapid Prototyping

This article walks through a real‑world banking UI case, showing how an interaction designer uses risk classification, the five‑question method, rapid sketching, iterative feedback, and structured reporting to uncover hidden requirements, resolve design conflicts, and ensure robust frontend delivery.

Interaction DesignProject ManagementUX
0 likes · 12 min read
How to Tackle Unexpected UI Risks with Five‑Question Method and Rapid Prototyping
DataFunTalk
DataFunTalk
May 5, 2023 · Operations

Project Management Overview: Ten Key Areas and Practical Tips

This article outlines ten essential components of project management—including overall management, scope, schedule, cost, quality, resources, communication, risk, procurement, and integration—while providing practical tips, stakeholder analysis methods, and visual guides to help teams execute projects efficiently.

PlanningProject Managementrisk management
0 likes · 5 min read
Project Management Overview: Ten Key Areas and Practical Tips