Topic

risk management

Collection size
248 articles
Page 11 of 13
Efficient Ops
Efficient Ops
Dec 13, 2016 · Operations

Why Embracing Risk Is Essential for Effective IT Operations

The article explains how acknowledging and managing inevitable risks, avoiding the illusion of zero‑risk contracts, and preparing realistic compromise strategies are crucial for reliable IT operations and incident response.

CompromiseIT OperationsVendor Risk
0 likes · 8 min read
Why Embracing Risk Is Essential for Effective IT Operations
Efficient Ops
Efficient Ops
Nov 14, 2016 · Operations

What Ancient Medicine Teaches About Modern IT Risk Management

Using the classic tale of Bian Que, this article explains how proactive, mid‑stage, and reactive risk controls in IT operations prevent small issues from becoming catastrophic failures, illustrated with real‑world storage, cloud, and equipment‑selection case studies.

Case StudyIT Infrastructureoperations
0 likes · 7 min read
What Ancient Medicine Teaches About Modern IT Risk Management
Efficient Ops
Efficient Ops
Oct 16, 2016 · Operations

Balancing Reliability and Innovation: Google’s SRE Risk Management Explained

This article explores how Google Site Reliability Engineers manage service reliability by balancing risk, cost, and business goals, using metrics like unplanned downtime, availability formulas, and risk tolerance to set realistic SLOs for both consumer and infrastructure services.

AvailabilityGoogleSRE
0 likes · 21 min read
Balancing Reliability and Innovation: Google’s SRE Risk Management Explained
Efficient Ops
Efficient Ops
Sep 28, 2016 · Operations

Can Precise Operations Transform IT Service Delivery? A Deep Dive

This article explains the concept of precise operations, detailing how integrating business demand as a variable can make IT maintenance more proactive, value‑driven, and synchronized with business needs, and outlines a step‑by‑step framework with real‑world examples.

DevOpsIT-servicebusiness alignment
0 likes · 14 min read
Can Precise Operations Transform IT Service Delivery? A Deep Dive
Efficient Ops
Efficient Ops
Sep 13, 2016 · Operations

How Google SRE Principles Compare Across Industries

This article, excerpted from the upcoming Chinese edition of “SRE: Google Site Reliability Engineering”, examines how Google’s SRE guiding philosophies—disaster planning, post‑mortem culture, automation, and data‑driven decision‑making—are adopted, adapted, or contrasted in sectors such as manufacturing, aerospace, nuclear, telecommunications, healthcare, and finance, highlighting key similarities, differences, and lessons for Google and the broader tech industry.

AutomationReliabilitySRE
0 likes · 21 min read
How Google SRE Principles Compare Across Industries
Efficient Ops
Efficient Ops
Mar 8, 2016 · Information Security

How to Build an Effective Information Security Response Plan Before a Breach

This article outlines why proactive information‑security preparedness, cross‑department response teams, and clear incident‑response checklists are essential for minimizing damage and maintaining trust when a data breach occurs.

data breachincident responseinformation security
0 likes · 14 min read
How to Build an Effective Information Security Response Plan Before a Breach
Efficient Ops
Efficient Ops
Oct 7, 2015 · Information Security

Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

The article explores the essence of information security by comparing it to safeguarding personal money, detailing the four fundamental attributes—confidentiality, integrity, availability, and controllability—and illustrating how different conditions shape security needs, from personal to enterprise contexts.

Availabilityconfidentialitydata protection
0 likes · 13 min read
Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained
KooFE Frontend Team
KooFE Frontend Team
Aug 29, 2021 · R&D Management

Mastering Project Management: The Power of the “Main R” Role and RACI

This article explores core project‑management concepts—scope, time, cost, quality—and dives deep into the RACI model, the “Main R” role, risk sources, and practical strategies for balancing responsibility, communication, and risk control in software teams.

RACIproject managementrisk management
0 likes · 12 min read
Mastering Project Management: The Power of the “Main R” Role and RACI
Taobao Frontend Technology
Taobao Frontend Technology
Nov 27, 2020 · Product Management

How to Challenge Authority and Grow as a Project Manager at Alibaba

In this reflective article, a former front‑end expert at Alibaba shares half a year of personal growth, detailing how he learned to challenge authority, improve mature technical systems, manage project risks, communicate effectively with product designers, and build professional credibility as a project manager.

Career Growthcommunicationfrontend development
0 likes · 15 min read
How to Challenge Authority and Grow as a Project Manager at Alibaba
Ctrip Technology
Ctrip Technology
May 9, 2018 · Artificial Intelligence

Ctrip's Real-Time Anti-Fraud System: Architecture, Big Data, and AI Innovations

The article details Ctrip's mature real‑time anti‑fraud platform, describing its big‑data parallel processing, AI‑driven models, device‑fingerprinting, CDNA service, and evolving architecture that together achieve sub‑150 ms decision latency while handling billions of daily transactions.

Big DataCtripartificial intelligence
0 likes · 10 min read
Ctrip's Real-Time Anti-Fraud System: Architecture, Big Data, and AI Innovations
Ctrip Technology
Ctrip Technology
Jun 5, 2017 · Information Security

Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0

This article recounts the development of Ctrip's graphical captcha system, describing its early .NET‑based implementation, the challenges encountered such as uniform difficulty, limited data collection, and poor user experience, and how successive redesigns—including multilingual support, adaptive difficulty, and slider‑plus‑character selection—balanced security and usability.

AuthenticationUser ExperienceWeb Security
0 likes · 14 min read
Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0
58 Tech
58 Tech
Nov 27, 2019 · Information Security

Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com

The article details the design, multi‑stage evolution, and operational impact of a big‑data‑based security portrait platform built by 58.com, describing its data pipelines, real‑time risk tagging, strategy scheduling, configuration management, and overall architecture that enable large‑scale threat detection and mitigation.

Big DataPlatform Architecturereal-time analytics
0 likes · 15 min read
Evolution and Architecture of a Big Data‑Driven Security Portrait System at 58.com
Cognitive Technology Team
Cognitive Technology Team
Mar 5, 2022 · Backend Development

Ant Financial Wealth Coding Guidelines – Comprehensive Backend Development and Operations Best Practices

This document presents Ant Financial's comprehensive coding standards covering concurrency control, idempotency, state management, object handling, SQL practices, time handling, exception safety, code quality, architecture design, middleware usage, data quality, production change procedures, emergency response, and client‑frontend considerations to ensure robust, secure, and maintainable backend systems.

architecturebackend developmentcoding standards
0 likes · 19 min read
Ant Financial Wealth Coding Guidelines – Comprehensive Backend Development and Operations Best Practices
Baidu Intelligent Testing
Baidu Intelligent Testing
May 4, 2018 · Operations

Common Architectural Design Risks and Mitigation Strategies for System Stability

This article analyses fifteen typical architectural design risks—such as duplicate interactions, high‑frequency calls, redundant requests, non‑reentrant interfaces, unreasonable timeouts, retry misconfigurations, IP direct‑connect, cross‑datacenter calls, weak/strong dependencies, third‑party reliance, cache penetration, cache avalanche, and coupling issues—explaining their definitions, impacts, detection methods, and concrete mitigation measures with real‑world Baidu cases to help engineers improve system stability.

architecturebackendrisk management
0 likes · 27 min read
Common Architectural Design Risks and Mitigation Strategies for System Stability
AntTech
AntTech
Jan 18, 2024 · Information Security

The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation

The report released by the Chinese Academy of Social Sciences and Ant Group highlights how security technology, now a public good alongside AI, is essential for managing accelerating digital risks, outlines its four pillars, and proposes collaborative strategies to make security technology a universal, socially responsible foundation for the digital society.

AI riskdigital societyinformation security
0 likes · 14 min read
The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation
AntTech
AntTech
Aug 19, 2022 · Artificial Intelligence

Ant Group Wins IDC China Digital Finance Innovation Awards for AI‑Powered Anti‑Fraud System and Secure Medical Claim Solutions

At the 2022 IDC China Digital Finance Forum, Ant Group was honored with two awards for its AI‑driven Alipay Intelligent Anti‑Fraud System and the privacy‑computing‑based Good Health Insurance Fast‑Claim project, showcasing cutting‑edge security and data‑privacy technologies that are reshaping risk control and medical claim processing in the financial sector.

AIMedical Claimsfinancial technology
0 likes · 6 min read
Ant Group Wins IDC China Digital Finance Innovation Awards for AI‑Powered Anti‑Fraud System and Secure Medical Claim Solutions
AntTech
AntTech
Jul 12, 2022 · Artificial Intelligence

AI Visual Anti‑Fraud Model Battles QR Code Abuse in the Beverage Industry

The article describes how Ant Group's AI visual anti‑fraud system, built by vision engineers, combats large‑scale QR‑code fraud targeting beverage bottle caps, detailing the black‑gray industry's tactics, the model's rapid detection capabilities, continuous unsupervised learning upgrades, and its broader applications in remote‑sensing and risk management.

AIQR codeanti-fraud
0 likes · 13 min read
AI Visual Anti‑Fraud Model Battles QR Code Abuse in the Beverage Industry
AntTech
AntTech
Mar 12, 2022 · Operations

Evolution of Large‑Scale Distributed System Stability at Ant Group

The article outlines Ant Group's multi‑stage journey of building large‑scale distributed system stability, describing architectural evolutions, risk‑inspection mechanisms, high‑availability solutions such as LDC and fine‑grained traffic scheduling, and intelligent risk‑defense products that together enable resilient, cost‑effective operations.

Distributed SystemsHigh Availabilitycapacity scaling
0 likes · 15 min read
Evolution of Large‑Scale Distributed System Stability at Ant Group
AntTech
AntTech
Jun 12, 2019 · Operations

Alipay’s Technical Risk System: Building SRE, TRaaS, and AIOps for High Availability

The article details how Alipay’s technical risk team, led by researcher Chen Liang, evolved from early scalability work to a full‑stack SRE organization, created the TRaaS risk‑defense platform and integrated AIOps to achieve near‑five‑nine availability and automated self‑healing for its financial services.

AIOpsHigh AvailabilitySRE
0 likes · 12 min read
Alipay’s Technical Risk System: Building SRE, TRaaS, and AIOps for High Availability
AntTech
AntTech
Feb 22, 2019 · Operations

Technical Risk Prevention Platform: Building Fault Immunity for Financial Transaction Systems

The article outlines Ant Financial's technical risk prevention platform, describing the challenges of financial‑grade distributed architectures, the multi‑layer risk assurance system, the TRaaS platform's risk baseline, handling, and change‑control mechanisms, and how these practices empower partners to achieve high‑availability and secure financial services.

Distributed SystemsHigh AvailabilityPlatform Engineering
0 likes · 13 min read
Technical Risk Prevention Platform: Building Fault Immunity for Financial Transaction Systems