Tagged articles
370 articles
Page 3 of 4
Efficient Ops
Efficient Ops
Apr 26, 2023 · Operations

Building a Chaos Engineering Platform for Financial Services: Key Lessons

This talk outlines the challenges of maintaining system stability in fast‑moving, cloud‑native financial services, describes a risk‑identification model, high‑fidelity fault simulation, and a comprehensive stability engineering platform, and shares future plans for automated, data‑driven risk mitigation.

Financial ServicesOperationsSRE
0 likes · 15 min read
Building a Chaos Engineering Platform for Financial Services: Key Lessons
Efficient Ops
Efficient Ops
Apr 8, 2023 · Information Security

How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices

The article details China Postal Savings Bank's successful DevSecOps assessment at the 2023 GOPS Global Operations Conference, sharing the bank's project background, interview insights on culture, processes, and tooling, and outlining the benefits and future plans of adopting standardized DevSecOps practices.

BankingDevSecOpsMaturity Model
0 likes · 17 min read
How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 7, 2023 · Operations

When to Release to Production: Distinguishing Continuous Delivery and Continuous Deployment

The article explains how continuous delivery keeps software always releasable while continuous deployment automates the actual release, discusses the trade‑offs of release frequency, risk, feedback types, and business considerations that guide the decision of when and how to push changes to production.

Continuous DeliveryContinuous Deploymentfeedback loops
0 likes · 9 min read
When to Release to Production: Distinguishing Continuous Delivery and Continuous Deployment
MoonWebTeam
MoonWebTeam
Mar 26, 2023 · R&D Management

Why Developers Must Master Project Management to Boost Efficiency and Career Growth

This article explains why software developers need solid project management skills, outlines common pain points such as inaccurate effort estimation, dependency delays, and quality‑efficiency trade‑offs, and provides practical guidance on progress, quality, and risk management—including work breakdown, dependency handling, code review, testing, logging, and risk mitigation—to help engineers deliver projects on time, with high quality, and with minimal surprises.

Project Managementprogress managementquality assurance
0 likes · 38 min read
Why Developers Must Master Project Management to Boost Efficiency and Career Growth
DataFunSummit
DataFunSummit
Mar 23, 2023 · Artificial Intelligence

ChatGPT Technical Analysis, Engineering Applications, and Towards Engineered AGI

This article provides a comprehensive technical analysis of ChatGPT, covering its cognitive model, model‑as‑a‑service architecture, front‑end integration, internal structure, API design, engineering challenges, risk‑aware AGI development, and future outlook for AI‑driven software engineering.

AGIChatGPTEngineering
0 likes · 12 min read
ChatGPT Technical Analysis, Engineering Applications, and Towards Engineered AGI
Tencent Cloud Developer
Tencent Cloud Developer
Mar 20, 2023 · R&D Management

A Developer's Guide to Project Management: Schedule, Quality, and Risk

The article teaches developers essential project‑management skills—schedule, quality, and risk management—by explaining why coordination matters, outlining common pain points, and detailing practical techniques such as two‑day task decomposition, code‑review standards, and systematic risk identification and mitigation to become reliable, results‑driven partners.

Project Managementdeveloper skillsquality assurance
0 likes · 37 min read
A Developer's Guide to Project Management: Schedule, Quality, and Risk
JD Tech
JD Tech
Mar 14, 2023 · Operations

Introduction to Chaos Engineering and Its Practical Exercise Workflow

This article offers a comprehensive overview of chaos engineering, explaining its definition, why it is needed, the value it brings, a detailed step‑by‑step practice workflow—including preparation, execution, recovery and review phases—typical drill scenarios, key assessment metrics, and risk‑control measures to improve system reliability and high‑availability.

Fault Injectionchaos engineeringrisk management
0 likes · 11 min read
Introduction to Chaos Engineering and Its Practical Exercise Workflow
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Feb 8, 2023 · Information Security

Exploring and Practicing Community Anti-Cheat Strategies at Xiaohongshu

The presentation outlines Xiaohongshu’s comprehensive community anti‑cheat strategy, defining cheating risks across industries, mapping the black‑gray ecosystem, and detailing a five‑module framework—risk perception, capability building, identification, mitigation, and evaluation—implemented via layered data architecture and multi‑stage detection to protect platform integrity.

anti-cheatdata analysisfraud detection
0 likes · 17 min read
Exploring and Practicing Community Anti-Cheat Strategies at Xiaohongshu
Continuous Delivery 2.0
Continuous Delivery 2.0
Jan 10, 2023 · Information Security

Understanding Software Supply Chain Security and the SLSA Framework

The article explains why software supply chain security is increasingly critical, introduces the SLSA (Supply‑Chain Levels for Software Artifacts) framework and its three trust boundaries, outlines common risk points from code commit to package distribution, and discusses mitigation strategies such as mandatory code review, robot‑account controls, and automation.

SLSASecurityci/cd
0 likes · 11 min read
Understanding Software Supply Chain Security and the SLSA Framework
AntTech
AntTech
Jan 9, 2023 · Artificial Intelligence

Overview of the Financial Big Data Anti‑Fraud Technology Whitepaper

This article introduces the Ant Group and Tsinghua University’s Financial Big Data Anti‑Fraud Technology Whitepaper, outlining the new legal context, fraud characteristics, and a three‑stage detection framework that leverages multi‑dimensional graphs, trustworthy AI, and data security to improve pre‑, during‑, and post‑transaction risk management.

AIanti-fraudfinancial data
0 likes · 9 min read
Overview of the Financial Big Data Anti‑Fraud Technology Whitepaper
Efficient Ops
Efficient Ops
Dec 28, 2022 · Information Security

How China Agricultural Bank Achieved Advanced DevSecOps Maturity

In a detailed interview, senior engineers from China Agricultural Bank explain how their mobile banking payment and micro‑loan platforms passed the CAICT DevSecOps Level‑2 assessment, outlining the cultural, process, and technical measures—such as integrated security testing tools and cross‑department collaboration—that boosted security, efficiency, and digital transformation.

BankingDevOpsDevSecOps
0 likes · 14 min read
How China Agricultural Bank Achieved Advanced DevSecOps Maturity
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Dec 16, 2022 · Game Development

Risk Management and Mitigation Strategies for QA in Game Development

This article compiles real-world examples and practical guidance for identifying, assessing, and mitigating risks throughout the game development lifecycle, offering QA teams concrete strategies for risk definition, early estimation, and handling of demand, quality, process, testing, and operational challenges to improve overall risk management.

Game DevelopmentQAprocess
0 likes · 38 min read
Risk Management and Mitigation Strategies for QA in Game Development
DaTaobao Tech
DaTaobao Tech
Dec 12, 2022 · Fundamentals

Testing Process and Test Case Design for Activity Lottery Feature

The article outlines a complete testing workflow for an activity lottery feature—from requirement evaluation, design, and case creation using equivalence and scenario‑based methods, through execution, gray‑release verification, and post‑release monitoring—emphasizing risk analysis, stability governance, rate‑limit safeguards, and financial loss prevention to ensure reliable, high‑quality releases.

Software Testingquality assurancerisk management
0 likes · 18 min read
Testing Process and Test Case Design for Activity Lottery Feature
Zhongtong Tech
Zhongtong Tech
Nov 18, 2022 · Information Security

Data Security Insights from CIS 2022: Balancing Compliance and Business Growth

At the CIS 2022 Cybersecurity Innovation Conference in Shanghai, ZTO Express’s security chief shared practical strategies for data security governance, highlighting legal compliance, management vs. technical controls, and the emerging role of privacy computing in sustaining business operations.

Privacy Computingcompliancedata security
0 likes · 5 min read
Data Security Insights from CIS 2022: Balancing Compliance and Business Growth
Baidu Tech Salon
Baidu Tech Salon
Nov 14, 2022 · Artificial Intelligence

How Risk‑Driven Delivery Boosts Test Efficiency with AI‑Powered Quality Models

This article analyzes Baidu's risk‑driven delivery approach, detailing how machine‑learning models identify, control, and decide on testing risks, replace manual judgments, improve test efficiency and quality, and deliver measurable savings and bug interceptions across large‑scale software projects.

Software Testingautomated deliverylogistic regression
0 likes · 13 min read
How Risk‑Driven Delivery Boosts Test Efficiency with AI‑Powered Quality Models
Baidu Geek Talk
Baidu Geek Talk
Nov 14, 2022 · Artificial Intelligence

Risk‑Driven Delivery and Quality Assessment Model for Intelligent Testing

Baidu’s risk‑driven delivery system applies a machine‑learning quality‑assessment model that automatically identifies, controls, and decides testing risks across over 50 features, enabling precise test selection, intercepting hundreds of bugs, cutting test waiting time from 50 to 2 hours, and paving the way toward fully automated intelligent testing.

AISoftware Testingquality assessment
0 likes · 15 min read
Risk‑Driven Delivery and Quality Assessment Model for Intelligent Testing
Architects Research Society
Architects Research Society
Nov 11, 2022 · Fundamentals

Digital Transformation Framework (DTF): A Comprehensive Reference Model for Modeling, Pricing, and Planning Digital Strategies

This article introduces the Digital Transformation Framework (DTF), a reference model that helps organizations define, model, price, and plan digital strategies by integrating business, financial, and technical dimensions, while addressing risk, cultural change, and implementation pathways.

pricingrisk managementstrategy
0 likes · 23 min read
Digital Transformation Framework (DTF): A Comprehensive Reference Model for Modeling, Pricing, and Planning Digital Strategies
DevOps Cloud Academy
DevOps Cloud Academy
Oct 17, 2022 · Information Security

Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation

In a CIS2021 conference talk, Tencent Cloud’s product security lead outlines the company’s DevSecOps journey, detailing challenges of heterogeneous infrastructure, a risk‑introduction workflow, multi‑stage security evolution, tool integration, metrics, and open‑source governance practices.

DevSecOpsTencent Cloudcloud security
0 likes · 15 min read
Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation
Architects Research Society
Architects Research Society
Oct 13, 2022 · Artificial Intelligence

Six Business Risks of Ignoring AI Ethics and Governance

Neglecting AI ethics and governance can expose companies to severe public‑relations crises, biased outcomes, regulatory penalties, unexplainable systems, and employee disengagement, ultimately threatening both societal trust and business sustainability.

AI ethicsBiasexplainability
0 likes · 13 min read
Six Business Risks of Ignoring AI Ethics and Governance
Software Development Quality
Software Development Quality
Aug 19, 2022 · Operations

Comprehensive Quality Management SLA Framework for IT Services

This document outlines a detailed Service Level Agreement (SLA) framework covering quality service standards, management processes, testing capabilities, tool support, resource management, measurement systems, risk handling, and continuous improvement to ensure consistent delivery and customer satisfaction across IT operations.

OperationsSLATraining
0 likes · 17 min read
Comprehensive Quality Management SLA Framework for IT Services
DevOps
DevOps
Aug 15, 2022 · R&D Management

Case Study: Unintended Data Upload Incident and Process Improvement Lessons

This article recounts a real-world incident where a junior engineer mistakenly uploaded production data to a pre‑release environment, analyzes the root causes, outlines concrete process improvements, and highlights broader lessons on risk‑aware development and the importance of holistic business‑logic security.

R&D managementincident managementprocess improvement
0 likes · 8 min read
Case Study: Unintended Data Upload Incident and Process Improvement Lessons
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Endpoint Protectioncloud-edge collaborationprivacy compliance
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
Ziru Technology
Ziru Technology
Aug 5, 2022 · Information Security

Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases

This article outlines the current state of network security in China, the government's strong emphasis on it, the legal framework, the necessity of incident response, detailed emergency‑response procedures, Ziru's own security program, and three illustrative case studies including Log4j2, a 2021 drill, and a FastJson vulnerability.

Case Studycybersecurityemergency planning
0 likes · 11 min read
Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases
DevOps
DevOps
Jul 19, 2022 · R&D Management

Quality Assurance Strategies for Technical Improvement Projects

The article outlines comprehensive quality‑assurance approaches for technical improvement projects—such as large‑scale refactoring, architecture upgrades, and migrations—by emphasizing risk‑driven planning, automated testing, business‑centric reviews, non‑functional requirement validation, and continuous knowledge sharing.

Automated TestingNon-functional RequirementsR&D management
0 likes · 11 min read
Quality Assurance Strategies for Technical Improvement Projects
AntTech
AntTech
Jul 12, 2022 · Artificial Intelligence

AI Visual Anti‑Fraud Model Battles QR Code Abuse in the Beverage Industry

The article describes how Ant Group's AI visual anti‑fraud system, built by vision engineers, combats large‑scale QR‑code fraud targeting beverage bottle caps, detailing the black‑gray industry's tactics, the model's rapid detection capabilities, continuous unsupervised learning upgrades, and its broader applications in remote‑sensing and risk management.

AIImage ProcessingQR code
0 likes · 13 min read
AI Visual Anti‑Fraud Model Battles QR Code Abuse in the Beverage Industry
dbaplus Community
dbaplus Community
Jul 2, 2022 · Information Security

How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit

The article summarizes Wei Yadong’s 2022 GDevOps Global Agile Operations Summit talk, covering the escalating threat landscape, financial industry security requirements, practical DevSecOps strategies, ICBC’s security transformation, and future trends such as security mesh, privacy‑enhancing computation, and decision intelligence.

DevSecOpsFinancial ServicesSecurity Operations
0 likes · 23 min read
How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit
AntTech
AntTech
Jun 29, 2022 · Big Data

YoDA: Reducing Entropy in Ant Financial Risk Data Systems through White‑Box, Logical, and Integrated Approaches

The YoDA project tackles the growing entropy of Ant Financial's risk data platform by introducing white‑box visibility, logical abstraction, and integrated heterogeneous fusion, enabling systematic governance, cost reduction, and consistent decision‑making across online, offline, and near‑line environments.

AIEntropy ReductionSystem Architecture
0 likes · 21 min read
YoDA: Reducing Entropy in Ant Financial Risk Data Systems through White‑Box, Logical, and Integrated Approaches
Programmer DD
Programmer DD
Jun 23, 2022 · Information Security

How to Build an Effective Security Awareness Training Program: A Six‑Step Guide

This article examines the Capital One breach case and outlines a comprehensive six‑step framework for enterprises to develop, implement, and continuously improve security awareness training, covering legal foundations, project planning, material preparation, execution scheduling, performance tracking, and post‑training optimization.

complianceinformation securityrisk management
0 likes · 7 min read
How to Build an Effective Security Awareness Training Program: A Six‑Step Guide
DataFunTalk
DataFunTalk
Jun 21, 2022 · Information Security

Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha

This talk explains how to use semantic-driven captcha mechanisms to classify and manage trusted versus untrusted traffic, detailing anti‑fraud strategies, flow identification, countermeasures against simulator and protocol cracking, and proactive updates to stay ahead of black‑market attacks.

CaptchaTraffic Classificationadversarial attacks
0 likes · 15 min read
Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha
Efficient Ops
Efficient Ops
Jun 12, 2022 · Operations

Why Ops Must Respect Data: Essential Backup and Release Practices

The article emphasizes that operations teams must treat data with reverence, outlining comprehensive backup strategies, routine file‑system maintenance, database and big‑data safeguards, disciplined release processes, and meticulous change‑management practices to mitigate risks and ensure system stability.

data backuprelease-managementrisk management
0 likes · 9 min read
Why Ops Must Respect Data: Essential Backup and Release Practices
Meituan Technology Team
Meituan Technology Team
May 26, 2022 · Information Security

Building and Deploying Software Composition Analysis (SCA) for Enterprise Security

The article analyzes the rising threat of open‑source components, explains Software Composition Analysis (SCA) and SBOM generation, outlines the three‑stage process for building an in‑house SCA capability, discusses practical challenges such as data quality and integration, and looks ahead to future standards and open‑source tools.

DevSecOpsNLPSBOM
0 likes · 37 min read
Building and Deploying Software Composition Analysis (SCA) for Enterprise Security
Baidu Geek Talk
Baidu Geek Talk
May 23, 2022 · Industry Insights

How Baidu Scales Real-Time Content Safety for Millions of Mini‑Programs

This article explains Baidu's evolving inspection scheduling system for its smart mini‑programs, detailing the challenges of massive page volumes, the V1.0 offline architecture, the V2.0 real‑time enhancements, resource constraints, deduplication logic, and the measurable improvements in risk detection and ecosystem health.

Big DataContent SafetyReal-time Streaming
0 likes · 17 min read
How Baidu Scales Real-Time Content Safety for Millions of Mini‑Programs
DataFunSummit
DataFunSummit
May 17, 2022 · Information Security

Data Security Governance Practices and Frameworks: A Comprehensive Overview

This article presents a detailed overview of data security governance in China, covering policy milestones, major security incidents, current challenges, a three‑layer governance model, practical workflow steps, classification methods, emerging zero‑trust concepts, and real‑world case studies, offering actionable insights for organizations seeking robust data protection.

Big DataZero Trustdata security
0 likes · 11 min read
Data Security Governance Practices and Frameworks: A Comprehensive Overview
Programmer DD
Programmer DD
May 17, 2022 · Operations

Why Full‑Link Load Testing in Production Is the Key to Business Continuity

This article explains the importance of conducting full‑link load testing in production environments, outlines the evolution and solution architecture, describes key technologies such as traffic coloring, data isolation and risk control, and shares practical implementation steps and customer case studies from Alibaba.

Performance Testingcapacity planningfull-link load testing
0 likes · 19 min read
Why Full‑Link Load Testing in Production Is the Key to Business Continuity
DevOps
DevOps
Apr 29, 2022 · R&D Management

Quality Assurance Strategies for Technical Improvement Projects

The article outlines comprehensive quality assurance approaches for technical improvement projects, highlighting risk-driven processes, automated testing, business perspective integration, and the importance of addressing non‑functional requirements to ensure stable, reliable system upgrades.

Non-functional RequirementsR&D managementSoftware Testing
0 likes · 12 min read
Quality Assurance Strategies for Technical Improvement Projects
Architects Research Society
Architects Research Society
Mar 15, 2022 · Fundamentals

Business Capability Modeling: Bridging Strategy and IT Execution

The article explains how business capability modeling provides a technology‑agnostic framework that aligns IT strategy with business goals, helps identify redundancies, manage risks, support mergers and innovation, and offers a four‑step method to build effective capability models.

IT StrategyM&Abusiness capability
0 likes · 10 min read
Business Capability Modeling: Bridging Strategy and IT Execution
AntTech
AntTech
Mar 12, 2022 · Operations

Evolution of Large‑Scale Distributed System Stability at Ant Group

The article outlines Ant Group's multi‑stage journey of building large‑scale distributed system stability, describing architectural evolutions, risk‑inspection mechanisms, high‑availability solutions such as LDC and fine‑grained traffic scheduling, and intelligent risk‑defense products that together enable resilient, cost‑effective operations.

Cloud NativeDistributed SystemsOperations
0 likes · 15 min read
Evolution of Large‑Scale Distributed System Stability at Ant Group
DevOps
DevOps
Mar 8, 2022 · Fundamentals

Understanding Technical Debt: Classification, Impact, and Mitigation Strategies

The article explains the origins and four quadrants of technical debt, outlines its detrimental effects on software quality and maintainability, and offers practical approaches—including daily debt management, clear technical standards, continuous technology monitoring, visualization, and sustained investment—to identify, prioritize, and reduce technical debt in development teams.

Software ArchitectureTechnical Debtcode quality
0 likes · 10 min read
Understanding Technical Debt: Classification, Impact, and Mitigation Strategies
Cognitive Technology Team
Cognitive Technology Team
Mar 5, 2022 · Backend Development

Ant Financial Wealth Coding Guidelines – Comprehensive Backend Development and Operations Best Practices

This document presents Ant Financial's comprehensive coding standards covering concurrency control, idempotency, state management, object handling, SQL practices, time handling, exception safety, code quality, architecture design, middleware usage, data quality, production change procedures, emergency response, and client‑frontend considerations to ensure robust, secure, and maintainable backend systems.

Idempotencyarchitecturecoding standards
0 likes · 19 min read
Ant Financial Wealth Coding Guidelines – Comprehensive Backend Development and Operations Best Practices
ITPUB
ITPUB
Mar 2, 2022 · Artificial Intelligence

Leveraging Giant AI Models for Startup Success: Opportunities and Pitfalls

This article examines how startups can harness massive pre‑trained AI models such as GPT‑3, outlining the historical context, benefits of transfer learning, the steep costs and data‑alignment challenges, and strategic considerations when using cloud APIs versus self‑hosting.

AICloud APIsmachine learning
0 likes · 14 min read
Leveraging Giant AI Models for Startup Success: Opportunities and Pitfalls
Efficient Ops
Efficient Ops
Dec 29, 2021 · Artificial Intelligence

How AI Model Risk Governance Maturity Is Shaping Financial Fraud Prevention

The article details China's new AI model risk governance regulations, the CAICT 2021 GOLF+ IT Governance Forum, Tongdun Technology's successful maturity assessment for financial gambling‑fraud risk models, and insights from executives on implementation challenges, benefits, and future plans.

AI Governancefinancial fraudmachine learning
0 likes · 13 min read
How AI Model Risk Governance Maturity Is Shaping Financial Fraud Prevention
Efficient Ops
Efficient Ops
Dec 28, 2021 · Artificial Intelligence

How AI Model Risk Governance Maturity Is Shaping China’s FinTech Landscape

China’s new AI model risk‑governance maturity assessment, unveiled at the 2021 GOLF+ IT New Governance Forum, showcases regulatory‑driven standards, highlights Du Xiaoman Financial’s successful evaluation, and outlines a comprehensive framework that enterprises can adopt to ensure safe, fair, and compliant AI deployments.

AI GovernanceFinTechassessment
0 likes · 13 min read
How AI Model Risk Governance Maturity Is Shaping China’s FinTech Landscape
AntTech
AntTech
Dec 27, 2021 · Information Security

Overview of the Data Security Composite Governance and Practice Whitepaper

The jointly authored whitepaper by China Software Testing Center, National Information Center, and Ant Group introduces a data security composite governance model, detailing strategic, managerial, and technical dimensions, multi‑view security measurement, and practical implementation guidance for enterprises under the new data security law.

composite modeldata securitygovernance
0 likes · 8 min read
Overview of the Data Security Composite Governance and Practice Whitepaper
DevOps
DevOps
Nov 24, 2021 · Fundamentals

How to Lead Your Team’s Technical Debt Management

This article explains what technical debt is, why it matters, and provides practical guidance on avoiding blame, discussing risks, prioritizing work with techniques like delay cost and ICE/RICE, and implementing concrete strategies to allocate effort and reduce debt in software projects.

Software EngineeringTechnical Debtprioritization
0 likes · 12 min read
How to Lead Your Team’s Technical Debt Management
DevOps
DevOps
Oct 19, 2021 · Fundamentals

Why Production Issues Still Appear After Testing and How to Prevent Them

The article analyzes common reasons why defects escape testing and appear in production—ranging from missed test cases and environment differences to incomplete releases—and offers a step‑by‑step checklist of practices to improve testing, release processes, and risk mitigation.

Software Testingproduction issuesquality assurance
0 likes · 8 min read
Why Production Issues Still Appear After Testing and How to Prevent Them
Programmer DD
Programmer DD
Sep 18, 2021 · Fundamentals

When Bugs Cost Billions: Real-World Software Failures and Their Lessons

This article surveys notorious software bugs—from payroll overpayments and Excel gene‑paper errors to the Ariane 5 launch failure and the 1983 Soviet nuclear alert—showing how coding mistakes can cause massive financial loss, endanger lives, and even threaten global security.

Case Studiesrisk managementsoftware bugs
0 likes · 6 min read
When Bugs Cost Billions: Real-World Software Failures and Their Lessons
Alibaba Cloud Developer
Alibaba Cloud Developer
Sep 15, 2021 · R&D Management

What Makes a Successful CTO? Lessons from Alibaba’s Tech Evolution

This article shares a senior CTO’s journey through Alibaba and Ant Group, detailing how commercial goals and technology co‑evolve, the pivotal architectural decisions, risk‑management practices, organizational design, and leadership principles that shape effective technology leadership.

AlibabaCTOSoftware Architecture
0 likes · 30 min read
What Makes a Successful CTO? Lessons from Alibaba’s Tech Evolution
DevOps
DevOps
Aug 18, 2021 · Operations

Applying the Business Model Canvas to Agile Project Management: The Project Management Canvas

This article explains how the Business Model Canvas can be adapted into a Project Management Canvas for agile inception, detailing its nine modules, when to create it, how to interpret each module, and step‑by‑step guidance for building and continuously updating the canvas throughout a project's lifecycle.

Business Model CanvasInceptionProject Management
0 likes · 14 min read
Applying the Business Model Canvas to Agile Project Management: The Project Management Canvas
政采云技术
政采云技术
Aug 17, 2021 · R&D Management

Project Management Knowledge for Software Developers

This article introduces essential project management concepts, including the five process groups, demand review, risk identification, scheduling, and reporting, to help software developers improve coordination, communication, and overall efficiency in their development workflows.

Project ManagementR&Dprocess groups
0 likes · 12 min read
Project Management Knowledge for Software Developers
Architects Research Society
Architects Research Society
Aug 3, 2021 · Operations

Digital Transformation Framework: Definition, Pricing, and Planning (Part 1)

This article presents a comprehensive Digital Transformation Framework (DTF) that defines digital concepts, outlines a reference model for modeling and pricing digital strategies, explains its building blocks, risk and economic evaluation, and demonstrates its integration with enterprise architecture and SAFe for effective business transformation.

Digital TransformationFrameworkpricing
0 likes · 23 min read
Digital Transformation Framework: Definition, Pricing, and Planning (Part 1)
Youzan Coder
Youzan Coder
Aug 2, 2021 · Backend Development

Design and Architecture of the Return Shipping Fee Insurance Service in Youzan E‑commerce Platform

The article details Youzan’s Return Shipping Fee insurance service, explaining its consumer and merchant benefits, end‑to‑end workflow, integrated risk‑control mechanisms, insurance‑product specifications, and a layered technical architecture—business, domain, component, and dependency services built with domain‑driven design—to enable scalable, reusable e‑commerce insurance solutions.

Backend ArchitectureInsurancee‑commerce
0 likes · 9 min read
Design and Architecture of the Return Shipping Fee Insurance Service in Youzan E‑commerce Platform
Java Interview Crash Guide
Java Interview Crash Guide
Jul 30, 2021 · R&D Management

Boost Your Coding Efficiency with a 5‑Step Thinking Framework

This article introduces a practical three‑question thinking framework and five guiding principles that help developers and product teams clarify goals, assess current status, and design effective implementation paths, ultimately improving productivity and reducing wasted effort.

10x programmerAutomationSoftware Engineering
0 likes · 9 min read
Boost Your Coding Efficiency with a 5‑Step Thinking Framework
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Security Governanceenterprise securityinformation security
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
DataFunTalk
DataFunTalk
Jul 15, 2021 · Artificial Intelligence

Graph Neural Network‑Based Payment Fraud Detection at eBay

The article explains how eBay protects its global payment system using a graph‑neural‑network driven risk management framework called xFraud, which combines heterogeneous graph sampling, node‑type encoding, attention mechanisms and dynamic‑graph extensions to detect and explain both individual and organized fraud patterns in real‑time.

eBaygraph neural networksmachine learning
0 likes · 13 min read
Graph Neural Network‑Based Payment Fraud Detection at eBay
Open Source Linux
Open Source Linux
Jul 11, 2021 · Operations

Mastering Shell Script Best Practices for Reliable Automation

This article outlines practical shell‑script guidelines for automating system and application operations, covering script header conventions, formatting, error handling, safe use of commands, variable handling, file packaging, pipeline restrictions, concurrency locks, logging, and risk‑mitigation strategies to make automation both efficient and secure.

AutomationDevOpsLinux
0 likes · 10 min read
Mastering Shell Script Best Practices for Reliable Automation
Alibaba Cloud Native
Alibaba Cloud Native
Jun 24, 2021 · Operations

Why Full‑Link Production Stress Testing Is Critical for Business Continuity

The article explains the importance of conducting full‑link performance testing in production environments, outlines the evolution of testing stages, details key technologies such as traffic shading and data isolation, offers practical process recommendations, and shares real‑world case studies demonstrating cost savings and risk mitigation.

Data IsolationPerformance Testingbusiness continuity
0 likes · 20 min read
Why Full‑Link Production Stress Testing Is Critical for Business Continuity
Architects Research Society
Architects Research Society
May 3, 2021 · Fundamentals

Digital Transformation Framework (DTF): A Comprehensive Guide to Modeling, Pricing, and Implementing Digital Strategies

This article introduces the Digital Transformation Framework (DTF), detailing its definition, structure, digital stages, and how it can be used to model, price, and implement digital strategies across enterprises, integrating risk, financial metrics, and architectural considerations.

Digital TransformationFrameworkenterprise architecture
0 likes · 23 min read
Digital Transformation Framework (DTF): A Comprehensive Guide to Modeling, Pricing, and Implementing Digital Strategies
Kuaishou Tech
Kuaishou Tech
Apr 29, 2021 · Frontend Development

How Kuaishou Engineered a High‑Traffic Web New Year Event: Risks, Offline Packages & CDN Strategies

This case study details the massive traffic and rich interactive challenges faced by Kuaishou's 2021 New Year web event, analyzes resource download, host performance, and CDN dependencies, and presents tiered preloading, offline‑package splitting, dynamic animation degradation, and domain‑sharding solutions to ensure stability.

CDNWebfrontend
0 likes · 18 min read
How Kuaishou Engineered a High‑Traffic Web New Year Event: Risks, Offline Packages & CDN Strategies
FunTester
FunTester
Apr 15, 2021 · Fundamentals

What Ancient Chinese Idioms Reveal About Modern Software Testing

This article connects classic Chinese idioms to software testing concepts, explaining test purpose, policies, strategies, tool usage, risk management, and improvement practices through vivid examples and practical guidance for building more reliable testing processes.

Software TestingTest Strategyidioms
0 likes · 11 min read
What Ancient Chinese Idioms Reveal About Modern Software Testing
Efficient Ops
Efficient Ops
Apr 6, 2021 · Information Security

What Truly Defines Cybersecurity? Vulnerabilities, Trust, Risk & More

Cybersecurity’s essence is examined from multiple angles—vulnerabilities, adversarial confrontation, trust assumptions, risk management, human awareness, cost considerations, and governance—highlighting that security is not a single concept but a composite of technical, managerial, and strategic layers embodied in the CIA triad.

CIATrustVulnerability
0 likes · 21 min read
What Truly Defines Cybersecurity? Vulnerabilities, Trust, Risk & More
Aotu Lab
Aotu Lab
Mar 16, 2021 · Frontend Development

How We Delivered a High‑Risk Digital RMB Front‑End Project Fast and Safely

This article details the front‑end team's approach to rapidly delivering a government‑backed digital RMB activity, covering project characteristics, pre‑delivery preparations, data flow aggregation, UI decoupling, risk‑control tactics, module loading, deployment layering, and lessons learned for maintaining high availability.

digital RMBfrontendmodule loader
0 likes · 18 min read
How We Delivered a High‑Risk Digital RMB Front‑End Project Fast and Safely
FunTester
FunTester
Mar 12, 2021 · Industry Insights

Why Agile Boosts Quality, Collaboration, and Speed: Key Benefits Unpacked

The article outlines how agile development improves software quality, enhances team collaboration, increases project transparency, reduces risk, accelerates growth, and enables more accurate project assessment, making it a comprehensive methodology for modern, user‑centric software projects.

CollaborationProject Managementagile
0 likes · 6 min read
Why Agile Boosts Quality, Collaboration, and Speed: Key Benefits Unpacked
21CTO
21CTO
Mar 3, 2021 · Information Security

9 Real-World Data Breaches Every Developer Should Learn From

This article reviews nine major data breach incidents—from Clearview AI to Yahoo—detailing their scope, compromised data types, and impact, and emphasizes the importance of robust security practices for developers to prevent such losses.

Case Studydata breachinformation security
0 likes · 10 min read
9 Real-World Data Breaches Every Developer Should Learn From
Taobao Frontend Technology
Taobao Frontend Technology
Jan 20, 2021 · R&D Management

Mastering Cross‑Team Project Management: From Initiation to Delivery

This guide walks through the full lifecycle of a cross‑team project—defining collaboration, outlining the five‑stage workflow, and detailing practical steps for kickoff, requirement review, task breakdown, technical review, communication, risk control, testing, acceptance, and common pitfalls—to help PMs deliver stable, high‑quality outcomes.

Cross-Team CollaborationProject Managementcommunication
0 likes · 14 min read
Mastering Cross‑Team Project Management: From Initiation to Delivery
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Taobao Frontend Technology
Taobao Frontend Technology
Nov 27, 2020 · Product Management

How to Challenge Authority and Grow as a Project Manager at Alibaba

In this reflective article, a former front‑end expert at Alibaba shares half a year of personal growth, detailing how he learned to challenge authority, improve mature technical systems, manage project risks, communicate effectively with product designers, and build professional credibility as a project manager.

Career GrowthLeadershipProject Management
0 likes · 15 min read
How to Challenge Authority and Grow as a Project Manager at Alibaba
JD Cloud Developers
JD Cloud Developers
Nov 13, 2020 · Information Security

How JD Cloud Secures Massive E‑Commerce Events: A Multi‑Layered Defense Blueprint

This article explains how JD Cloud builds a multi‑layered, end‑to‑end security architecture—including five defense layers, four implementation stages, three guiding principles, and two key focuses—to protect high‑traffic e‑commerce events such as 618 and 11.11 from attacks and ensure stable, safe operations.

cloud securitye‑commerceincident response
0 likes · 15 min read
How JD Cloud Secures Massive E‑Commerce Events: A Multi‑Layered Defense Blueprint
Java Captain
Java Captain
Oct 25, 2020 · R&D Management

Lessons Learned from a Failed Project: A Project Manager’s Reflection

A project manager recounts how poor quality focus, insufficient team oversight, lack of design, uncontrolled requirement changes, and missing code reviews led to a disastrous rollout, and shares the corrective actions and key lessons to avoid similar failures in future software projects.

Code reviewLessons LearnedProject Management
0 likes · 10 min read
Lessons Learned from a Failed Project: A Project Manager’s Reflection
vivo Internet Technology
vivo Internet Technology
Oct 20, 2020 · R&D Management

Experience of Front‑Back End Separation in the Vivo Mall Project

By incrementally routing module‑specific requests through Nginx to a new static front‑end while keeping backward‑compatible APIs, the Vivo Mall team transformed a monolithic 2015 platform into a fully separated architecture, achieving over tenfold front‑end release speed, doubled development efficiency, and a solid foundation for multi‑channel expansion.

Deploymentarchitecturefrontend
0 likes · 11 min read
Experience of Front‑Back End Separation in the Vivo Mall Project
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 13, 2020 · Product Management

How to Build a Minimal Viable Medical Aesthetic Credit System

This article walks through the complete design of a medical‑aesthetic consumer‑credit platform, covering market analysis, strategic positioning, business object definition, core process modeling, functional architecture, front‑end/back‑end interaction, prototype sketches, and key fintech terminology, offering a practical roadmap from concept to MVP.

Consumer CreditFinTechMedical Aesthetics
0 likes · 26 min read
How to Build a Minimal Viable Medical Aesthetic Credit System
Fulu Network R&D Team
Fulu Network R&D Team
Aug 26, 2020 · Information Security

Establishing a Comprehensive Security Testing Process

This article explains the importance of security testing, outlines where to start, and details a step‑by‑step security testing workflow covering requirement analysis, static code scanning, third‑party component checks, data masking, permission checks, XSS, SQL injection, privilege escalation, file upload/download, server port scanning, and business‑specific test cases.

risk managementsecurity testingsoftware development
0 likes · 9 min read
Establishing a Comprehensive Security Testing Process
DevOps
DevOps
Aug 19, 2020 · Operations

DevOps Lessons from the Knight Capital Group Collapse: A Case Study

The article analyzes the 2012 Knight Capital Group disaster, showing how a manual deployment error, lingering legacy code, missing kill‑switch, and inadequate monitoring caused a $4.6 billion loss within 45 minutes, and extracts key DevOps best‑practice lessons to prevent similar failures.

DeploymentDevOpsTechnical Debt
0 likes · 13 min read
DevOps Lessons from the Knight Capital Group Collapse: A Case Study
Programmer DD
Programmer DD
Jul 20, 2020 · R&D Management

10 Surprising Reasons Projects Fail (And How to Avoid Them)

Drawing from years of project experience, the author outlines ten common factors—ranging from unattainable goals to inexperienced managers—that consistently lead to project failure, and suggests that even a single misstep can doom a project.

PlanningR&DTeam Building
0 likes · 3 min read
10 Surprising Reasons Projects Fail (And How to Avoid Them)
JD Retail Technology
JD Retail Technology
Jun 30, 2020 · R&D Management

Effective Risk Identification and Long-Term Monitoring Mechanisms in Project Management

This article expands on risk management by detailing practical methods for risk identification—such as silent brainstorming and risk breakdown structures—and presenting a combined "1‑2" approach, while also outlining sustainable risk monitoring mechanisms like daily briefs and a case‑library for agile teams.

R&D managementproject risk identificationrisk management
0 likes · 18 min read
Effective Risk Identification and Long-Term Monitoring Mechanisms in Project Management
Architects Research Society
Architects Research Society
Jun 20, 2020 · Information Security

Security Requirements Vision and Strategic Security Architecture Principles

The article outlines the importance of defining security requirements within business context, presents the Security Requirements Vision (SRV) components, describes strategic security architecture principles, differentiates security governance, management and operations, and details formalizing security processes with ownership, documentation, integration, roles, and automation opportunities.

Process FormalizationSecurity Architecturegovernance
0 likes · 8 min read
Security Requirements Vision and Strategic Security Architecture Principles
Xianyu Technology
Xianyu Technology
Jun 17, 2020 · Backend Development

Lottery System Risk Management and SDK Integration

Xianyu mitigated lottery‑related financial loss by centralizing rights management, decoupling UI from business logic, and providing a unified SDK with simple draw APIs, while adding real‑time log backflow, comprehensive accounting and monitoring, cutting configuration time by over 50 % and eliminating UI‑only risk.

BackendLottery SystemSDK
0 likes · 10 min read
Lottery System Risk Management and SDK Integration
JD Retail Technology
JD Retail Technology
Jun 11, 2020 · Operations

How JD Health Engineered System Stability for the 618 Mega‑Sale

Facing unprecedented traffic during the 2020 618 shopping festival, JD Health’s product R&D team implemented comprehensive rehearsals, stress testing, architecture reviews, dual‑channel risk controls, and 24‑hour monitoring to ensure system stability and rapid response for its health‑care e‑commerce platforms.

618 promotionJD HealthOperations
0 likes · 5 min read
How JD Health Engineered System Stability for the 618 Mega‑Sale
FunTester
FunTester
May 31, 2020 · Industry Insights

How to Evaluate and Choose a Software Testing Outsourcing Partner

This guide explains why companies outsource software testing, outlines key factors such as outsourcing models, geographic location, service agreements, flexibility, and quality improvement, and provides a step‑by‑step process for investigating, interacting with, and selecting the right testing service provider.

Software Testingoutsourcingquality assurance
0 likes · 8 min read
How to Evaluate and Choose a Software Testing Outsourcing Partner
Meituan Technology Team
Meituan Technology Team
May 14, 2020 · Information Security

How Meituan Built Zeus: Inside a Scalable Security Rule Engine

This article examines Meituan's custom rule engine Zeus, detailing the security challenges of a massive multi‑service platform, the architectural decisions made to decouple risk logic, the implementation of reusable factors and rule groups, and the ongoing push toward automated, intelligent risk mitigation.

MeituanZeusinformation security
0 likes · 21 min read
How Meituan Built Zeus: Inside a Scalable Security Rule Engine
JD Retail Technology
JD Retail Technology
Mar 23, 2020 · R&D Management

Applying Project Management and Agile Principles to China’s COVID‑19 Response: A Case Study

The article examines how project management and agile methodologies were applied to China’s nationwide COVID‑19 response, illustrating initiation, planning, execution, risk and stakeholder management, iterative delivery, transparency, and continuous improvement through concrete examples and a structured framework.

COVID-19Case StudyProject Management
0 likes · 23 min read
Applying Project Management and Agile Principles to China’s COVID‑19 Response: A Case Study
Efficient Ops
Efficient Ops
Mar 10, 2020 · Operations

How to Build Anti‑Fragile Operations in the Cloud Era

This article explains the anti‑fragility concept, illustrates how cloud‑based systems become increasingly vulnerable to unexpected events, and offers practical strategies—including risk reduction, choice diversification, proactive experimentation, and biologically inspired resilience—to transform operations and turn shocks into opportunities.

DevOpsOperationsResilience
0 likes · 19 min read
How to Build Anti‑Fragile Operations in the Cloud Era
Youzan Coder
Youzan Coder
Feb 27, 2020 · Information Security

System Stability and Security Measures in SaaS: Yazan's Approach

Yazan’s SaaS platform maintains 99.99% uptime through robust IaaS infrastructure, dedicated DBA and network teams, while defending against DDoS attacks and data breaches with ISO‑27001 and CSA C*STAR‑aligned security controls, employing multi‑cloud real‑time and cold backups and offering compensation for outage‑related business impacts.

DDoS protectionSaaSbusiness continuity
0 likes · 17 min read
System Stability and Security Measures in SaaS: Yazan's Approach
AntTech
AntTech
Feb 15, 2020 · Product Management

Reflections on Product Manager Remote Work at Ant Financial

After the Chinese New Year, Ant Financial’s senior product expert Zhang Wen shares a detailed account of his daily remote‑working routine, the communication and planning challenges posed by the pandemic, and the tools and processes his team adopted to maintain product delivery and collaboration.

COVID-19collaboration toolscommunication
0 likes · 9 min read
Reflections on Product Manager Remote Work at Ant Financial
Architecture Digest
Architecture Digest
Jan 23, 2020 · Operations

TSB Bank's Failed Data Migration: Lessons on Testing, System Complexity, and Operational Risk

The 2018 TSB bank migration disaster, which corrupted data for 13 million customers and cost billions, illustrates how inadequate testing, overly complex system integration, and poor change‑management practices can cripple banking IT operations and highlight the need for rigorous operational risk controls.

BankingData MigrationIT Operations
0 likes · 16 min read
TSB Bank's Failed Data Migration: Lessons on Testing, System Complexity, and Operational Risk
Tencent Cloud Developer
Tencent Cloud Developer
Jan 3, 2020 · Information Security

Analysis of China's First GPL Litigation and Risk Management for Open‑Source Software Use

The Beijing High People’s Court’s landmark 2019 ruling in Digital Heaven v. Yuzu, China’s first GPL‑related lawsuit, rejected Yuzu’s claim that three HBuilder plugins were GPL‑bound derivatives, ordered RMB 710,000 damages, and highlighted both growing judicial recognition of the GPL and the need for companies to isolate, analyze, and manage open‑source components to avoid copyleft liability.

China LawGPLintellectual property
0 likes · 22 min read
Analysis of China's First GPL Litigation and Risk Management for Open‑Source Software Use
JD Retail Technology
JD Retail Technology
Jan 2, 2020 · R&D Management

Understanding Risk and Risk Management in Project Management

This article explains the concept of risk, outlines the five key elements of risk management, provides practical templates and examples for identifying and responding to common project risks, and shares a case study with actionable lessons for improving risk handling in agile development teams.

Project ManagementRisk analysisagile
0 likes · 20 min read
Understanding Risk and Risk Management in Project Management