Topic

risk management

Collection size
248 articles
Page 12 of 13
AntTech
AntTech
Nov 13, 2018 · Artificial Intelligence

Ant Group VP Highlights AI's Role in Risk Control, Cost Reduction, and User Experience at World Internet Conference

At the World Internet Conference, Ant Group Vice President and Chief Data Scientist Qi Yuan emphasized that artificial intelligence can dramatically improve risk management, lower operational costs, and enhance user experience, citing examples such as the micro‑loan risk‑control model, the visual‑inspection tool ‘Dingsunbao’, and AI‑powered smart customer service.

Artificial IntelligenceCost ReductionFinTech
0 likes · 8 min read
Ant Group VP Highlights AI's Role in Risk Control, Cost Reduction, and User Experience at World Internet Conference
AntTech
AntTech
Nov 2, 2018 · Information Security

Ant Group’s TRaaS: A Technological Risk‑Defense Platform for Financial Systems

Ant Group unveiled TRaaS (Technological Risk‑defense as a Service), a comprehensive platform that combines high‑availability, real‑time fund reconciliation and AI‑driven self‑healing capabilities to protect large‑scale financial systems against technical risks.

AIOpsTRaaSdistributed systems
0 likes · 10 min read
Ant Group’s TRaaS: A Technological Risk‑Defense Platform for Financial Systems
Data Thinking Notes
Data Thinking Notes
May 15, 2025 · Information Security

Understanding the PBOC’s New Data Security Management Measures (Effective 2025)

The People's Bank of China has issued a comprehensive Data Security Management Measures, effective June 30, 2025, outlining classification, protection, risk monitoring, incident response, and legal responsibilities for all data processors handling business‑domain data.

Data SecurityPBOCinformation security
0 likes · 35 min read
Understanding the PBOC’s New Data Security Management Measures (Effective 2025)
Taobao Frontend Technology
Taobao Frontend Technology
Jan 20, 2021 · R&D Management

Mastering Cross‑Team Project Management: From Initiation to Delivery

This guide walks through the full lifecycle of a cross‑team project—defining collaboration, outlining the five‑stage workflow, and detailing practical steps for kickoff, requirement review, task breakdown, technical review, communication, risk control, testing, acceptance, and common pitfalls—to help PMs deliver stable, high‑quality outcomes.

communicationcross-team collaborationproject management
0 likes · 14 min read
Mastering Cross‑Team Project Management: From Initiation to Delivery
Tencent Cloud Developer
Tencent Cloud Developer
Oct 30, 2023 · Fundamentals

Understanding and Managing Technical Debt in Software Development

Technical debt—ranging from low‑level design flaws and inadequate testing to strategic shortcuts and evolving third‑party dependencies—accumulates when urgent product demands bypass best practices, leading to higher costs, slower delivery, and poorer quality, so teams must make debt visible, enforce strong completion criteria, and allocate regular sprint capacity to prioritize, refactor, and repay high‑interest debt while recognizing when legacy code can be retired.

Software Engineeringcode qualityrefactoring
0 likes · 25 min read
Understanding and Managing Technical Debt in Software Development
vivo Internet Technology
vivo Internet Technology
Oct 20, 2020 · R&D Management

Experience of Front‑Back End Separation in the Vivo Mall Project

By incrementally routing module‑specific requests through Nginx to a new static front‑end while keeping backward‑compatible APIs, the Vivo Mall team transformed a monolithic 2015 platform into a fully separated architecture, achieving over tenfold front‑end release speed, doubled development efficiency, and a solid foundation for multi‑channel expansion.

Architecturebackenddeployment
0 likes · 11 min read
Experience of Front‑Back End Separation in the Vivo Mall Project
JD Retail Technology
JD Retail Technology
May 10, 2024 · Operations

High Availability and the Dispersal Principle: Concepts, Practices, and Benefits

This article explains the concept of high availability, introduces the dispersal principle, demonstrates its application in microservice architectures and distributed storage, and outlines the benefits such as improved reliability, scalability, fault tolerance, and reduced single‑point failures.

distributed systemsfault tolerancehigh-availability
0 likes · 10 min read
High Availability and the Dispersal Principle: Concepts, Practices, and Benefits
政采云技术
政采云技术
Aug 17, 2021 · R&D Management

Project Management Knowledge for Software Developers

This article introduces essential project management concepts, including the five process groups, demand review, risk identification, scheduling, and reporting, to help software developers improve coordination, communication, and overall efficiency in their development workflows.

R&Dprocess groupsproject management
0 likes · 12 min read
Project Management Knowledge for Software Developers
JD Tech Talk
JD Tech Talk
Mar 24, 2020 · R&D Management

Project Management Insights: Teamwork, Boundaries, Communication, and Risk

This article explains core project‑management concepts—team collaboration, clear boundaries, effective communication, and risk handling—using football analogies to illustrate how project managers can lead multi‑disciplinary teams toward successful outcomes.

R&Dcommunicationleadership
0 likes · 8 min read
Project Management Insights: Teamwork, Boundaries, Communication, and Risk
JD Tech Talk
JD Tech Talk
Jul 17, 2018 · Fundamentals

Design and Architecture of the Three‑Entity Account System in Financial Technology

The article explains the three‑entity (customer, user, account) account model, its architectural layout, and how it supports diverse fintech scenarios such as marketing, risk control, intra‑ and inter‑business line operations, and external service provisioning.

FinTechaccount architecturefinancial technology
0 likes · 7 min read
Design and Architecture of the Three‑Entity Account System in Financial Technology
Efficient Ops
Efficient Ops
Apr 8, 2023 · Information Security

How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices

The article details China Postal Savings Bank's successful DevSecOps assessment at the 2023 GOPS Global Operations Conference, sharing the bank's project background, interview insights on culture, processes, and tooling, and outlining the benefits and future plans of adopting standardized DevSecOps practices.

BankingDevSecOpsinformation security
0 likes · 17 min read
How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices
Efficient Ops
Efficient Ops
Dec 28, 2022 · Information Security

How China Agricultural Bank Achieved Advanced DevSecOps Maturity

In a detailed interview, senior engineers from China Agricultural Bank explain how their mobile banking payment and micro‑loan platforms passed the CAICT DevSecOps Level‑2 assessment, outlining the cultural, process, and technical measures—such as integrated security testing tools and cross‑department collaboration—that boosted security, efficiency, and digital transformation.

BankingDevSecOpsDigital Transformation
0 likes · 14 min read
How China Agricultural Bank Achieved Advanced DevSecOps Maturity
Efficient Ops
Efficient Ops
Mar 31, 2021 · Operations

Uncovering Digital Risks in DevOps: Safeguarding Your Digital Transformation

This article examines how result‑oriented DevOps drives digital transformation while exposing digital risks—from missing high‑level test scenarios and broken security data links to insufficient user‑experience foresight—and outlines strategies for data governance, risk mitigation, and effective decision‑support across the enterprise.

Data GovernanceDigital Transformationdevops
0 likes · 12 min read
Uncovering Digital Risks in DevOps: Safeguarding Your Digital Transformation
Efficient Ops
Efficient Ops
Dec 23, 2020 · Information Security

How Huatai Securities Achieved Advanced DevSecOps Maturity in Its Data Science Platform

Huatai Securities' data science development platform passed the DevSecOps security and risk management assessment at level 2, showcasing advanced domestic security practices, and the interview reveals the cultural, procedural, and technical steps that enabled this achievement and future improvement plans.

Data Science PlatformDevSecOpsHuatai Securities
0 likes · 13 min read
How Huatai Securities Achieved Advanced DevSecOps Maturity in Its Data Science Platform
Efficient Ops
Efficient Ops
Mar 10, 2020 · Operations

How to Build Anti‑Fragile Operations in the Cloud Era

This article explains the anti‑fragility concept, illustrates how cloud‑based systems become increasingly vulnerable to unexpected events, and offers practical strategies—including risk reduction, choice diversification, proactive experimentation, and biologically inspired resilience—to transform operations and turn shocks into opportunities.

Cloud ComputingResilienceanti-fragility
0 likes · 19 min read
How to Build Anti‑Fragile Operations in the Cloud Era
Data Thinking Notes
Data Thinking Notes
Oct 14, 2024 · Information Security

12 Critical Data Security Risks Every Enterprise Must Address

From data lifecycle vulnerabilities to inadequate audit coverage, API misconfigurations, weak privileged access, and insufficient encryption, this article outlines twelve common data security risks and their real‑world impacts, helping organizations identify and remediate gaps before breaches occur.

Data SecurityEncryptionaccess control
0 likes · 21 min read
12 Critical Data Security Risks Every Enterprise Must Address
Data Thinking Notes
Data Thinking Notes
Jul 25, 2024 · Information Security

How Large Language Models Transform Data Security Compliance Management

This article explains how a leading insurance technology group leverages large language models to streamline data security compliance, detailing the evolution of data management, key governance challenges, multimodal AI architecture, and practical workflows for policy enforcement, risk monitoring, and asset management.

AIData GovernanceData Security
0 likes · 10 min read
How Large Language Models Transform Data Security Compliance Management
Data Thinking Notes
Data Thinking Notes
Jul 16, 2024 · Information Security

How to Build an Effective Data Security Operations Metrics System

Data security, centered on the full data lifecycle, demands deep defense against dynamic, continuous risks; by adopting a new operational mindset and a comprehensive metrics system, organizations can achieve greater visibility, control, sustainability, and trustworthiness in protecting their data assets.

Data Securitydata lifecycleinformation security
0 likes · 3 min read
How to Build an Effective Data Security Operations Metrics System
Data Thinking Notes
Data Thinking Notes
Feb 27, 2024 · Information Security

How to Build an Effective Enterprise Data Security Governance System

This article explores enterprise data security governance, outlining practical methodologies, implementation pathways, and real-world case studies to guide organizations in planning and establishing robust data security governance frameworks while highlighting key challenges, compliance considerations, and measurable outcomes for sustained protection.

Data SecurityEnterprisecompliance
0 likes · 2 min read
How to Build an Effective Enterprise Data Security Governance System