Tagged articles
370 articles
Page 4 of 4
Beike Product & Technology
Beike Product & Technology
Dec 31, 2019 · Artificial Intelligence

Knowledge Graph and Distributed Graph Database Practices at Beike Zhaofang

The article reports on Beike Zhaofang's knowledge‑graph technology conference, detailing how relationship graphs are applied to risk control, the four‑layer graph architecture, the use of Spark GraphX, JanusGraph and DGraph, and broader industry‑graph applications in real‑estate AI solutions.

Knowledge GraphReal Estateartificial intelligence
0 likes · 12 min read
Knowledge Graph and Distributed Graph Database Practices at Beike Zhaofang
58 Tech
58 Tech
Nov 27, 2019 · Information Security

Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com

The article details the design, multi‑stage evolution, and operational impact of a big‑data‑based security portrait platform built by 58.com, describing its data pipelines, real‑time risk tagging, strategy scheduling, configuration management, and overall architecture that enable large‑scale threat detection and mitigation.

Big DataSecurityrisk management
0 likes · 15 min read
Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com
Efficient Ops
Efficient Ops
Nov 17, 2019 · Operations

Mastering Shell Script Best Practices for Reliable Automation

This article outlines how to transform manual and scripted operations into automated and intelligent processes by applying comprehensive shell scripting standards, avoiding common pitfalls, and implementing risk‑mitigation techniques such as proper headers, quoting, logging, concurrency locks, and safe file handling.

LinuxShell scriptingbest practices
0 likes · 9 min read
Mastering Shell Script Best Practices for Reliable Automation
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

Data Protectioncloud securitycompliance
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
21CTO
21CTO
Oct 15, 2019 · R&D Management

Mastering Technical Project Management: A Step‑by‑Step Guide for Internet Companies

This comprehensive guide explains how technical professionals can excel as project managers in internet companies by defining clear goals, aligning people and processes, and navigating each phase—from project initiation and requirement review to scheduling, testing, release, and post‑mortem—ensuring timely, high‑quality delivery.

Project Managementrelease planningrisk management
0 likes · 14 min read
Mastering Technical Project Management: A Step‑by‑Step Guide for Internet Companies
Programmer DD
Programmer DD
Oct 13, 2019 · Backend Development

How to Balance ‘Good Enough’ Design in Microservice Architecture

The article examines the challenges of adopting microservice architecture, especially when refactoring monolithic applications, by discussing design rationale, risk assessment, mitigation plans, and how to manage conflicts between speed and quality to achieve a "good enough" solution.

DesignSoftware Engineeringarchitecture
0 likes · 8 min read
How to Balance ‘Good Enough’ Design in Microservice Architecture
Didi Tech
Didi Tech
Aug 17, 2019 · Industry Insights

How Didi’s Ride‑Sharing Data Transforms Automotive Finance Risk Management

This article analyzes how Didi’s unique ride‑hailing scenario big data is applied to automotive finance, detailing the business model, asset‑side and full‑process risk challenges, data‑driven solutions, and future prospects for intelligent credit risk control in both enterprise and retail lending.

Big DataCredit ScoringDidi
0 likes · 14 min read
How Didi’s Ride‑Sharing Data Transforms Automotive Finance Risk Management
dbaplus Community
dbaplus Community
Aug 12, 2019 · Operations

Why DevOps Matters and How to Implement It: Practical Lessons from Vipshop

This article explains the need for DevOps, contrasts it with ITIL, outlines practical steps for implementation, and shares Vipshop’s component‑centric DevOps practice, including configuration platforms, risk‑matrix control, and continuous improvement metrics, offering engineers actionable insights for real‑world deployment.

Case StudyConfiguration ManagementDevOps
0 likes · 12 min read
Why DevOps Matters and How to Implement It: Practical Lessons from Vipshop
Architecture Digest
Architecture Digest
Jul 31, 2019 · Backend Development

Design and Optimization of MaFengWo Membership System Architecture

This article details the evolution, architectural redesign, and performance optimizations of MaFengWo's membership system, covering identity strategy transformation, four‑layer service architecture, rights pool construction, third‑party integration, points integration, concurrency control, traffic shaping, and risk management to support scalable, high‑quality user experiences.

Concurrency ControlSystem Architecturemembership
0 likes · 17 min read
Design and Optimization of MaFengWo Membership System Architecture
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 24, 2019 · R&D Management

How to Excel as a Technical Project Manager in Internet Companies

This guide outlines how engineers can succeed as technical project managers by setting clear goals, aligning people and processes, and mastering each phase of the project lifecycle—from initiation and requirement review to scheduling, design, testing, release, and retrospective analysis—while mitigating common risks.

Project Managementagilerisk management
0 likes · 15 min read
How to Excel as a Technical Project Manager in Internet Companies
Suning Technology
Suning Technology
Jul 3, 2019 · Artificial Intelligence

Debunking Common AI Myths: What Every Business Should Know

This article dispels five widespread AI misconceptions—from believing AI works like the human brain to thinking it is bias‑free—while offering practical guidance on recognizing AI limits, improving data quality, managing risks, and applying AI responsibly across industries.

AIBusiness strategyData Quality
0 likes · 13 min read
Debunking Common AI Myths: What Every Business Should Know
DevOps
DevOps
Jun 10, 2019 · Product Management

Why Agile Still Needs Planning: Insights from a Large‑Scale Scrum Project

The article debunks the myth that agile eliminates planning by showing that even in complex, time‑boxed Scrum projects a flexible, continuously‑refined plan covering scope, cost, schedule, and quality is essential for managing risk and delivering business value.

Iterative Developmentagilerisk management
0 likes · 5 min read
Why Agile Still Needs Planning: Insights from a Large‑Scale Scrum Project
DataFunTalk
DataFunTalk
May 13, 2019 · Artificial Intelligence

Financial Risk Management: Business Requirements and Technical Solutions

This article presents a comprehensive overview of financial risk management, detailing business challenges such as identity verification and fraud, and describing technical solutions including feature engineering, sample handling, model optimization, and online validation, emphasizing the integration of data-driven AI techniques throughout the process.

Big Datafinancial modelingmachine learning
0 likes · 13 min read
Financial Risk Management: Business Requirements and Technical Solutions
转转QA
转转QA
Apr 25, 2019 · R&D Management

How Testing Drives Project Success: Requirement Analysis, Planning, Risk Communication, and Team Culture

The article explains how thorough requirement analysis, disciplined daily planning, proactive risk communication, and a strong team project culture enable testers to actively contribute to project success, improve delivery quality, and align product outcomes with business value in fast‑changing mobile‑internet environments.

Project ManagementR&DTeam Culture
0 likes · 8 min read
How Testing Drives Project Success: Requirement Analysis, Planning, Risk Communication, and Team Culture
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Mar 14, 2019 · Backend Development

Understanding Java Thread Pools: Origins, Benefits, Risks, Principles, Configuration, and Implementations

This article explains the origin of Java thread pools, outlines their advantages and potential risks such as deadlocks and resource exhaustion, describes their internal states and processing flow, provides guidance on sizing for CPU‑ or I/O‑bound tasks, and reviews the four common thread‑pool implementations.

Backend DevelopmentJavaconcurrency
0 likes · 8 min read
Understanding Java Thread Pools: Origins, Benefits, Risks, Principles, Configuration, and Implementations
21CTO
21CTO
Mar 11, 2019 · R&D Management

Master the Essential Project Management Vocabulary: 40 Key Terms Explained

This comprehensive guide outlines 40 essential project management terms—from basic concepts like project plans and WBS to advanced topics such as risk mitigation, Kanban flow limits, and quality assurance—helping professionals enhance their terminology and improve project communication.

GlossaryKanbanProject Management
0 likes · 15 min read
Master the Essential Project Management Vocabulary: 40 Key Terms Explained
AntTech
AntTech
Feb 22, 2019 · Operations

Technical Risk Prevention Platform: Building Fault Immunity for Financial Transaction Systems

The article outlines Ant Financial's technical risk prevention platform, describing the challenges of financial‑grade distributed architectures, the multi‑layer risk assurance system, the TRaaS platform's risk baseline, handling, and change‑control mechanisms, and how these practices empower partners to achieve high‑availability and secure financial services.

Operationsfinancial technologyplatform engineering
0 likes · 13 min read
Technical Risk Prevention Platform: Building Fault Immunity for Financial Transaction Systems
AntTech
AntTech
Dec 19, 2018 · Information Security

Red‑Blue Technical Attack‑Defense Exercises and SRE Practices at Ant Financial

Ant Financial’s internal red‑blue technical attack‑defense program, driven by a dedicated blue team and SRE‑based red team, continuously probes system weaknesses, refines fault‑injection tools like Awatch, and evolves high‑availability and self‑healing mechanisms to strengthen risk control and operational reliability.

Fault InjectionOperationsSRE
0 likes · 10 min read
Red‑Blue Technical Attack‑Defense Exercises and SRE Practices at Ant Financial
Efficient Ops
Efficient Ops
Dec 12, 2018 · Operations

Essential Project Management Practices Every Manager Should Master

This article shares practical insights on project management, covering how to understand project goals, assess resources, communicate with stakeholders, handle risks and changes, create effective plans, and ensure successful delivery through disciplined documentation and verification.

PlanningProject Managementchange control
0 likes · 23 min read
Essential Project Management Practices Every Manager Should Master
37 Interactive Technology Team
37 Interactive Technology Team
Dec 7, 2018 · Product Management

My Perspective on Project Management: Common Pitfalls and Practical Tips

Project managers often face shifting requirements, poorly organized meetings, delayed progress, and post‑launch knowledge gaps, but by clearly defining scope, using focused agendas, daily stand‑ups, critical‑path monitoring, and documenting assets for hand‑off, teams can apply agile‑inspired practices to deliver value faster.

meeting organizationprogress trackingrequirements
0 likes · 7 min read
My Perspective on Project Management: Common Pitfalls and Practical Tips
AntTech
AntTech
Nov 28, 2018 · Operations

Ant Financial’s Continuous Delivery Practices for Financial‑Grade Internet Products

This article outlines Ant Financial’s engineering practices for achieving fast yet stable continuous delivery of financial‑grade internet products, covering industry challenges, agile delivery methods, risk‑controlled innovation, and the AntLinkE platform that integrates DevOps, data analytics, and service support.

AutomationContinuous DeliveryDevOps
0 likes · 11 min read
Ant Financial’s Continuous Delivery Practices for Financial‑Grade Internet Products
Meituan Technology Team
Meituan Technology Team
Nov 8, 2018 · Mobile Development

iOS Component Communication: Category Techniques, Dependency Inversion, and Risk Management

The article explains how Objective‑C Categories can implement a low‑overhead, type‑safe communication layer between iOS components, compares alternative patterns like DI, SPI and NotificationCenter, presents performance data, and proposes two Category‑based schemes with tooling to detect method‑name conflicts and ensure maintainable modular architecture.

CategoryDependency InversionLinkMap
0 likes · 31 min read
iOS Component Communication: Category Techniques, Dependency Inversion, and Risk Management
Efficient Ops
Efficient Ops
Oct 16, 2018 · Fundamentals

Navigating Open Source Licenses: Common Pitfalls and How to Avoid Them

This article explains the rapid rise of open‑source technologies, outlines common questions and risks associated with open‑source license usage, summarizes a guide covering eleven major licenses, and announces the OSCAR Open Source Pioneer Day where experts will discuss compliance and best practices.

cloud computinglicense complianceopen source
0 likes · 7 min read
Navigating Open Source Licenses: Common Pitfalls and How to Avoid Them
Big Data and Microservices
Big Data and Microservices
Sep 2, 2018 · Industry Insights

How Big Data and AI Are Transforming Financial Services: 5 Key Applications

The article explores how big data and artificial intelligence are reshaping finance through automated risk management, advanced customer data handling, personalized services, predictive analytics, and real‑time analysis, highlighting practical methods, benefits, and future trends for financial institutions.

Real-time analyticsartificial intelligencefinance
0 likes · 9 min read
How Big Data and AI Are Transforming Financial Services: 5 Key Applications
JD Tech Talk
JD Tech Talk
Aug 28, 2018 · Blockchain

Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)

The article analyses the shortcomings of traditional seller‑driven financial risk data queries and proposes a blockchain consortium that uses distributed ledger, consensus, smart contracts and token‑based pricing to enable fair, secure, and efficient data sharing and settlement among financial institutions.

BlockchainFinancial Data Sharingconsortium
0 likes · 14 min read
Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)
Big Data and Microservices
Big Data and Microservices
Aug 23, 2018 · Industry Insights

How to Build Effective User Profiles for Precise Marketing and Risk Control

This article explains what user profiling is, why it matters for large‑scale enterprises, and how to design a data‑driven profiling system—including data sources, business modeling, tag taxonomy, and practical applications such as targeted marketing, risk assessment, user research, personalized services, and strategic decision‑making.

data taggingmarketing analyticsrisk management
0 likes · 12 min read
How to Build Effective User Profiles for Precise Marketing and Risk Control
JD Retail Technology
JD Retail Technology
Aug 13, 2018 · R&D Management

Senior JD.com Project Manager Tian Yanyun Shares Practical Project Management Insights

In this interview, senior JD.com project manager Tian Yanyun discusses his most memorable projects, coordination techniques without formal authority, demand decomposition, feasibility assessment, risk control, portfolio benefits, and how to thrive in a volatile, uncertain, complex, and ambiguous environment.

JD.comLeadershipPortfolio Management
0 likes · 8 min read
Senior JD.com Project Manager Tian Yanyun Shares Practical Project Management Insights
Big Data and Microservices
Big Data and Microservices
Jul 26, 2018 · Industry Insights

How Big Data is Transforming the Financial Industry: Applications and Challenges

This article examines how big data technologies are reshaping banking, insurance, and securities by enabling customer profiling, precision marketing, risk management, and operational optimization, while also outlining the key challenges such as data quality, integration complexity, standards, and governance that the sector must overcome.

BankingBig DataData Analytics
0 likes · 19 min read
How Big Data is Transforming the Financial Industry: Applications and Challenges
High Availability Architecture
High Availability Architecture
Jul 12, 2018 · Information Security

Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned

This article chronicles the three‑generation evolution of Zhihu’s anti‑cheat platform Wukong, detailing its business context, spam taxonomy, multi‑layered control methods, architectural redesigns, strategy language improvements, graph‑based risk analysis, and the continuous integration of big‑data and machine‑learning techniques to combat content and behavior spam.

Big Dataanti-cheatgraph-analysis
0 likes · 23 min read
Evolution of Zhihu’s Anti‑Cheat System “Wukong”: Architecture, Strategies, and Lessons Learned
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 2, 2018 · R&D Management

What Makes a Truly Professional Project Manager? Insights from an Alibaba Expert

This article explores the core competencies that distinguish a truly professional project manager, emphasizing the importance of goal‑oriented thinking, effective communication, risk identification, and strong negotiation skills while highlighting common pitfalls and the need for clear appointment and exit criteria.

LeadershipProject Managementcommunication
0 likes · 7 min read
What Makes a Truly Professional Project Manager? Insights from an Alibaba Expert
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 9, 2018 · Operations

Master the 10 PMP Knowledge Areas: A Quick Guide for Architects

This article explains why architects need both specialized and general management skills and summarizes the ten PMP knowledge areas—Integration, Scope, Schedule, Cost, Quality, Resource, Communication, Risk, Procurement, and Stakeholder—providing visual references for each.

IntegrationKnowledge AreasPMP
0 likes · 3 min read
Master the 10 PMP Knowledge Areas: A Quick Guide for Architects
Architecture Digest
Architecture Digest
Jun 1, 2018 · Fundamentals

Software Testing Engineer Responsibilities and Best Practices

This article outlines the comprehensive responsibilities of a software testing engineer, covering requirement review, documentation, system architecture awareness, process management, risk and time management, and provides practical guidelines to improve software quality and delivery speed.

Software Testingquality assurancerequirements
0 likes · 9 min read
Software Testing Engineer Responsibilities and Best Practices
Ctrip Technology
Ctrip Technology
May 9, 2018 · Artificial Intelligence

Ctrip's Real-Time Anti-Fraud System: Architecture, Big Data, and AI Innovations

The article details Ctrip's mature real‑time anti‑fraud platform, describing its big‑data parallel processing, AI‑driven models, device‑fingerprinting, CDNA service, and evolving architecture that together achieve sub‑150 ms decision latency while handling billions of daily transactions.

CtripReal-time analyticsartificial intelligence
0 likes · 10 min read
Ctrip's Real-Time Anti-Fraud System: Architecture, Big Data, and AI Innovations
Baidu Intelligent Testing
Baidu Intelligent Testing
May 4, 2018 · Operations

Common Architectural Design Risks and Mitigation Strategies for System Stability

This article analyses fifteen typical architectural design risks—such as duplicate interactions, high‑frequency calls, redundant requests, non‑reentrant interfaces, unreasonable timeouts, retry misconfigurations, IP direct‑connect, cross‑datacenter calls, weak/strong dependencies, third‑party reliance, cache penetration, cache avalanche, and coupling issues—explaining their definitions, impacts, detection methods, and concrete mitigation measures with real‑world Baidu cases to help engineers improve system stability.

Backendarchitecturerisk management
0 likes · 27 min read
Common Architectural Design Risks and Mitigation Strategies for System Stability
AntTech
AntTech
Apr 16, 2018 · Artificial Intelligence

Active PU Learning for Cash‑Out Fraud Detection in Alipay’s AlphaRisk Engine

This article presents an Active PU Learning framework that combines active learning with two‑step positive‑unlabeled learning to improve cash‑out fraud detection in Alipay’s fifth‑generation risk engine, AlphaRisk, achieving three‑fold identification gains over unsupervised methods while reducing labeling costs.

Semi-supervised Learningactive learningfraud detection
0 likes · 14 min read
Active PU Learning for Cash‑Out Fraud Detection in Alipay’s AlphaRisk Engine
JD Retail Technology
JD Retail Technology
Mar 1, 2018 · R&D Management

Insights on Project Management for E‑Commerce Development

The article shares practical reflections on project management in e‑commerce development, emphasizing the importance of clear requirements, effective communication, realistic scheduling, resource allocation, and proactive risk management to help practitioners improve their project outcomes.

Project Managementcommunicationrequirements
0 likes · 9 min read
Insights on Project Management for E‑Commerce Development
Suning Technology
Suning Technology
Jan 17, 2018 · Information Security

How Suning Built a Robust Security Architecture for E‑Commerce

This article examines Suning's evolution from a basic network‑operations unit to a comprehensive security ecosystem, detailing its organizational structure, protection platforms, integrated risk‑control mechanisms, big‑data threat perception system, and management processes that together safeguard its e‑commerce operations.

Security ArchitectureThreat Detectione‑commerce
0 likes · 12 min read
How Suning Built a Robust Security Architecture for E‑Commerce
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 12, 2018 · R&D Management

Mastering Cross‑Company Multi‑Team Project Management: A Practical Guide

This article shares a detailed, experience‑based framework for project managers to successfully lead cross‑company, multi‑team software collaborations by dividing work into planning, implementation, and delivery phases, emphasizing risk identification, schedule coordination, change handling, and continuous external communication.

Project Managementagilecross-company collaboration
0 likes · 13 min read
Mastering Cross‑Company Multi‑Team Project Management: A Practical Guide
DevOps Engineer
DevOps Engineer
Oct 31, 2017 · Fundamentals

16 Essential Traits of an Excellent Software Tester

The article outlines sixteen key characteristics—including a skeptical attitude, uncompromising quality, user‑centric thinking, early testing, risk management, strong analysis, negative testing, effective negotiation, and teamwork—that together define what makes a software tester truly outstanding.

Software Testingquality assurancerisk management
0 likes · 7 min read
16 Essential Traits of an Excellent Software Tester
21CTO
21CTO
Sep 29, 2017 · R&D Management

Why Not Taking Risks Is the Biggest Risk: Facebook’s Early Lessons

This article reflects on Mark Zuckerberg’s early Facebook experience, emphasizing the importance of creating value, building learning‑focused organizations, rapid experimentation, hiring talent without experience, and embracing risk as essential for successful entrepreneurship.

Talent Acquisitionlearning organizationproduct experimentation
0 likes · 8 min read
Why Not Taking Risks Is the Biggest Risk: Facebook’s Early Lessons
JD Retail Technology
JD Retail Technology
Sep 25, 2017 · Fundamentals

Virtual Business Quality Assurance: Best Practices and Team Building

This article discusses quality assurance strategies for virtual businesses, covering layered testing approaches, external decoupling techniques, process simulation, risk prevention, and team building methods to ensure efficient and reliable platform operations.

Software TestingTeam Buildingautomation tools
0 likes · 7 min read
Virtual Business Quality Assurance: Best Practices and Team Building
Ctrip Technology
Ctrip Technology
Jun 5, 2017 · Information Security

Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0

This article recounts the development of Ctrip's graphical captcha system, describing its early .NET‑based implementation, the challenges encountered such as uniform difficulty, limited data collection, and poor user experience, and how successive redesigns—including multilingual support, adaptive difficulty, and slider‑plus‑character selection—balanced security and usability.

AuthenticationCaptchaUser experience
0 likes · 14 min read
Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 1, 2017 · R&D Management

Creating an Initial Project Plan: Estimation, Assumptions, and Scheduling

The article walks through building an initial software project plan by translating effort estimates into a timeline, discussing ideal versus realistic weekly capacity, handling urgent issues, allocating testing time, identifying risks and assumptions, and adding buffer to produce a roughly nine‑week schedule.

Agile DevelopmentProject Planningrisk management
0 likes · 10 min read
Creating an Initial Project Plan: Estimation, Assumptions, and Scheduling
21CTO
21CTO
Apr 24, 2017 · Backend Development

Designing Scalable Payment Systems: Architecture, Modules, and Business Flow

This article explains how to design a payment system by covering product classification, module functions, business processes, and reference architectures, illustrating the role of microservice proxies, risk assessment, and integration with popular platforms like Alipay, WeChat Pay, and PayPal.

Backend DevelopmentMicroservicesarchitecture
0 likes · 20 min read
Designing Scalable Payment Systems: Architecture, Modules, and Business Flow
Efficient Ops
Efficient Ops
Apr 19, 2017 · Information Security

From Zero to Secure: How Zhaogang Built Its Information Security Operations

This article details Zhaogang's journey from a chaotic startup environment to a mature, multi‑stage security operation, covering its background, the four‑phase security framework, traditional security domains, and practical strategies for driving security initiatives across the organization.

B2BSecurity Operationsinformation security
0 likes · 17 min read
From Zero to Secure: How Zhaogang Built Its Information Security Operations
Qunar Tech Salon
Qunar Tech Salon
Feb 20, 2017 · Backend Development

Design and Implementation of Payment Routing Mechanisms

This article explains the concept, structure, and practical strategies of payment routing—including guide routing and transaction routing—using a retail store analogy to illustrate how routing decisions optimize user experience, success rates, and profitability while managing costs and risk.

Cost OptimizationFinTechpayment routing
0 likes · 8 min read
Design and Implementation of Payment Routing Mechanisms
Meituan Technology Team
Meituan Technology Team
Jan 13, 2017 · Information Security

Risk Control System Architecture and Practices at Meituan

Meituan’s risk‑control architecture transforms diverse, high‑volume e‑commerce services into a middleware‑based platform that unifies data collection, combines expert rules with machine‑learning models, and employs a three‑stage defense—pre‑risk, real‑time detection, and post‑incident response—to continuously adapt to evolving fraud threats.

System Architecturefraud detectiononline commerce
0 likes · 17 min read
Risk Control System Architecture and Practices at Meituan
Ctrip Technology
Ctrip Technology
Jan 13, 2017 · Information Security

Ctrip Business Security: From Business‑Driven to Technology‑Driven Defense

This article outlines Ctrip's comprehensive business security strategy, detailing four major risk types, three core protection systems—including a unified captcha, a real‑time risk control engine, and a risk data platform—followed by a technology‑driven architecture, new captcha services, and future security directions.

System Architecturebusiness securityfraud detection
0 likes · 11 min read
Ctrip Business Security: From Business‑Driven to Technology‑Driven Defense
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 20, 2016 · Big Data

Alibaba’s Big Data Applications in Urban Governance and Social Risk Prevention

The article describes how Alibaba leverages big data, cloud computing and AI through its “City Brain” project and security platforms to improve urban traffic management, public safety, anti‑fraud measures and e‑commerce risk control, illustrating the transformative impact of data‑driven technologies on modern social governance.

AIBig DataSmart City
0 likes · 11 min read
Alibaba’s Big Data Applications in Urban Governance and Social Risk Prevention
Efficient Ops
Efficient Ops
Nov 14, 2016 · Operations

What Ancient Medicine Teaches About Modern IT Risk Management

Using the classic tale of Bian Que, this article explains how proactive, mid‑stage, and reactive risk controls in IT operations prevent small issues from becoming catastrophic failures, illustrated with real‑world storage, cloud, and equipment‑selection case studies.

IT infrastructureOperationspreventive control
0 likes · 7 min read
What Ancient Medicine Teaches About Modern IT Risk Management
Qunar Tech Salon
Qunar Tech Salon
Oct 10, 2016 · Information Security

Evolution of Ctrip's Risk Defense Systems: From .NET Era to the Ares Platform

This article reviews the rapid growth of China’s OTA market, the rise of black‑market threats, and how Ctrip’s security team has iteratively redesigned its risk‑defense architecture—from a .NET‑based real‑time system, through an offline risk‑library, to the integrated Ares platform—highlighting each stage’s strengths, shortcomings, and lessons learned.

Ares platformCtripfraud detection
0 likes · 11 min read
Evolution of Ctrip's Risk Defense Systems: From .NET Era to the Ares Platform
Efficient Ops
Efficient Ops
Sep 13, 2016 · Operations

How Google SRE Principles Compare Across Industries

This article, excerpted from the upcoming Chinese edition of “SRE: Google Site Reliability Engineering”, examines how Google’s SRE guiding philosophies—disaster planning, post‑mortem culture, automation, and data‑driven decision‑making—are adopted, adapted, or contrasted in sectors such as manufacturing, aerospace, nuclear, telecommunications, healthcare, and finance, highlighting key similarities, differences, and lessons for Google and the broader tech industry.

AutomationOperationsSRE
0 likes · 21 min read
How Google SRE Principles Compare Across Industries
21CTO
21CTO
Jun 26, 2016 · R&D Management

What Sailing Teaches About Building High‑Performing Software Teams

Drawing from a weekend sailing race, the author reflects on team motivation, member selection, structure, agile roles, risk management, and incentive systems, offering practical analogies to improve the effectiveness of software development teams.

LeadershipMotivationTeam Building
0 likes · 12 min read
What Sailing Teaches About Building High‑Performing Software Teams
21CTO
21CTO
Jun 11, 2016 · Fundamentals

Why Technical Debt Accumulates and How to Tackle It Effectively

The article shares a veteran IT professional’s insights on how technical debt forms, the risks it brings, various repayment strategies, and practical ways to prevent debt crises, emphasizing continuous management and disciplined engineering practices.

Software EngineeringTechnical Debtrefactoring
0 likes · 12 min read
Why Technical Debt Accumulates and How to Tackle It Effectively
dbaplus Community
dbaplus Community
Dec 4, 2015 · Databases

Why Storage Choices Make or Break Your Database Performance

In this technical presentation, HP's storage director shares market trends, flash storage evolution, performance metrics, planning considerations, and risk mitigation strategies, highlighting how storage architecture directly impacts database efficiency, reliability, and cost in modern enterprise environments.

FLASHdatabaserisk management
0 likes · 13 min read
Why Storage Choices Make or Break Your Database Performance
Efficient Ops
Efficient Ops
Oct 7, 2015 · Information Security

Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

The article explores the essence of information security by comparing it to safeguarding personal money, detailing the four fundamental attributes—confidentiality, integrity, availability, and controllability—and illustrating how different conditions shape security needs, from personal to enterprise contexts.

AvailabilityData Protectionconfidentiality
0 likes · 13 min read
Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

Integrating Agile Practices with Architecture: Five Practical Recommendations

The article explains how architects can adopt a risk‑ and cost‑driven, lightweight approach to keep architecture agile, offering five actionable recommendations—decision‑focused delivery, a backlog of architectural concerns, economic impact prioritization, minimal architecture, and delivering just enough expectations—applicable across agile and plan‑driven projects.

BacklogCost-drivenSoftware Architecture
0 likes · 12 min read
Integrating Agile Practices with Architecture: Five Practical Recommendations