Topic

risk management

Collection size
250 articles
Page 7 of 13
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 7, 2023 · Frontend Development

Why Adopt TypeScript in Frontend Development: Business Motivation, Error Analysis, Cost‑Benefit, and Implementation Plan

This article explains the business reasons for introducing TypeScript in a B‑end frontend product, analyzes common runtime type errors, compares TypeScript with plain JavaScript, evaluates costs, risks and benefits, and outlines a practical implementation roadmap.

TypeScriptcode qualitycost-benefit
0 likes · 8 min read
Why Adopt TypeScript in Frontend Development: Business Motivation, Error Analysis, Cost‑Benefit, and Implementation Plan
Architecture and Beyond
Architecture and Beyond
Jan 2, 2022 · Information Security

Building an Application Security System: SDL and DevSecOps Approaches

The article examines application security challenges for startups, presents statistical attack data, defines what application security entails, outlines common security issues, and compares two main frameworks—Microsoft's Security Development Lifecycle (SDL) and DevSecOps—offering guidance on selecting and implementing a suitable security system.

Application SecurityDevSecOpsSDL
0 likes · 16 min read
Building an Application Security System: SDL and DevSecOps Approaches
IT Architects Alliance
IT Architects Alliance
Jul 27, 2021 · Fundamentals

Software Architecture Evaluation: Concepts, Workflow, Methods, and Risks

This article explains the importance of software architecture, defines its evaluation process, outlines a step‑by‑step workflow, introduces common evaluation methods such as ATAM, ARID, and ADR, and discusses typical risks and mitigation strategies for successful architectural assessments.

ADRARIDATAM
0 likes · 7 min read
Software Architecture Evaluation: Concepts, Workflow, Methods, and Risks
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jun 24, 2015 · Fundamentals

Integrating Agile Practices with Architecture: Five Practical Recommendations

The article explains how architects can adopt a risk‑ and cost‑driven, lightweight approach to keep architecture agile, offering five actionable recommendations—decision‑focused delivery, a backlog of architectural concerns, economic impact prioritization, minimal architecture, and delivering just enough expectations—applicable across agile and plan‑driven projects.

AgileBacklogCost-driven
0 likes · 12 min read
Integrating Agile Practices with Architecture: Five Practical Recommendations
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Sep 28, 2018 · Operations

8 Practical Tips for Operations Teams to Manage the Golden Week Holiday

This article offers eight practical operations‑team strategies—inspection, monitoring alerts, capacity planning, network restrictions, risk pre‑plans, data backup, on‑call mechanisms, and staying connected—to ensure system stability and enjoy the Golden Week holiday without incidents.

BackupCapacity Planningholiday
0 likes · 4 min read
8 Practical Tips for Operations Teams to Manage the Golden Week Holiday
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 20, 2016 · Big Data

Alibaba’s Big Data Applications in Urban Governance and Social Risk Prevention

The article describes how Alibaba leverages big data, cloud computing and AI through its “City Brain” project and security platforms to improve urban traffic management, public safety, anti‑fraud measures and e‑commerce risk control, illustrating the transformative impact of data‑driven technologies on modern social governance.

AIbig datacloud computing
0 likes · 11 min read
Alibaba’s Big Data Applications in Urban Governance and Social Risk Prevention
Continuous Delivery 2.0
Continuous Delivery 2.0
Jul 31, 2023 · Information Security

15 Key Cybersecurity Metrics for Measuring and Improving Security Performance

The article outlines fifteen essential cybersecurity metrics—thirteen process indicators such as mean detection and response times, and two result indicators like data loss incidents and security ROI—to help organizations evaluate, monitor, and improve their security posture and inform investment decisions.

Incident Responsecybersecuritymetrics
0 likes · 4 min read
15 Key Cybersecurity Metrics for Measuring and Improving Security Performance
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 7, 2023 · Operations

When to Release to Production: Distinguishing Continuous Delivery and Continuous Deployment

The article explains how continuous delivery keeps software always releasable while continuous deployment automates the actual release, discusses the trade‑offs of release frequency, risk, feedback types, and business considerations that guide the decision of when and how to push changes to production.

Continuous DeliveryContinuous DeploymentDevOps
0 likes · 9 min read
When to Release to Production: Distinguishing Continuous Delivery and Continuous Deployment
Continuous Delivery 2.0
Continuous Delivery 2.0
Mar 18, 2022 · Fundamentals

Guidelines for Creating Effective Test Plans: Balancing Cost, Risk, and Benefits

This guide explains how to craft a test plan or strategy by weighing implementation, maintenance, and monetary costs against benefits and risks, offering practical questions, coverage considerations, tool choices, and process recommendations to help teams achieve optimal testing outcomes.

cost analysisrisk managementsoftware quality
0 likes · 19 min read
Guidelines for Creating Effective Test Plans: Balancing Cost, Risk, and Benefits
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 1, 2017 · R&D Management

Creating an Initial Project Plan: Estimation, Assumptions, and Scheduling

The article walks through building an initial software project plan by translating effort estimates into a timeline, discussing ideal versus realistic weekly capacity, handling urgent issues, allocating testing time, identifying risks and assumptions, and adding buffer to produce a roughly nine‑week schedule.

agile developmentproject planningrisk management
0 likes · 10 min read
Creating an Initial Project Plan: Estimation, Assumptions, and Scheduling
Architecture Digest
Architecture Digest
Jan 23, 2020 · Operations

TSB Bank's Failed Data Migration: Lessons on Testing, System Complexity, and Operational Risk

The 2018 TSB bank migration disaster, which corrupted data for 13 million customers and cost billions, illustrates how inadequate testing, overly complex system integration, and poor change‑management practices can cripple banking IT operations and highlight the need for rigorous operational risk controls.

BankingIT Operationsdata migration
0 likes · 16 min read
TSB Bank's Failed Data Migration: Lessons on Testing, System Complexity, and Operational Risk
Architecture Digest
Architecture Digest
Jul 31, 2019 · Backend Development

Design and Optimization of MaFengWo Membership System Architecture

This article details the evolution, architectural redesign, and performance optimizations of MaFengWo's membership system, covering identity strategy transformation, four‑layer service architecture, rights pool construction, third‑party integration, points integration, concurrency control, traffic shaping, and risk management to support scalable, high‑quality user experiences.

Backend DevelopmentPerformance Optimizationconcurrency control
0 likes · 17 min read
Design and Optimization of MaFengWo Membership System Architecture
Architecture Digest
Architecture Digest
Jun 1, 2018 · Fundamentals

Software Testing Engineer Responsibilities and Best Practices

This article outlines the comprehensive responsibilities of a software testing engineer, covering requirement review, documentation, system architecture awareness, process management, risk and time management, and provides practical guidelines to improve software quality and delivery speed.

quality assurancerequirementsrisk management
0 likes · 9 min read
Software Testing Engineer Responsibilities and Best Practices
FunTester
FunTester
Nov 1, 2023 · Fundamentals

Understanding and Managing Technical Debt in Software Development

This article explains what technical debt is, its harmful effects, common scenarios that generate it, common misconceptions, and practical strategies for managing and repaying technical debt to keep software projects maintainable and cost‑effective.

code qualityrefactoringrisk management
0 likes · 25 min read
Understanding and Managing Technical Debt in Software Development
Tencent Technical Engineering
Tencent Technical Engineering
May 15, 2025 · R&D Management

Choosing Open‑Source Licenses: Balancing Technical Freedom and Commercial Safety – Engineers’ Insights

This article gathers engineers’ experiences and advice on selecting open‑source licenses, explaining GPL’s contagion risk, comparing permissive (MIT/Apache) and copyleft (GPL/LGPL) options, and offering practical guidelines for balancing technical freedom with commercial security across different project scenarios.

GPLMITR&D
0 likes · 10 min read
Choosing Open‑Source Licenses: Balancing Technical Freedom and Commercial Safety – Engineers’ Insights
Architects Research Society
Architects Research Society
Nov 1, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition and responsibilities of a security architecture team, detailing the roles of Security Architect, Information Security Architect, CISO, and Security Analyst, their required business and technical skills, risk management, threat modeling, and how they integrate with enterprise architecture.

CISOSecurity RolesThreat Modeling
0 likes · 11 min read
Roles and Responsibilities of a Security Architecture Team
Architects Research Society
Architects Research Society
Oct 5, 2023 · Operations

8 Biggest IT Management Mistakes and How to Avoid or Recover from Them

The article outlines eight common IT management errors—including vendor lock‑in, treating the cloud as a data‑center extension, over‑designing business cases, poor hiring and promotion decisions, misapplying agile to core systems, saying “yes” too often, and hiding problems—while offering practical strategies to prevent or quickly recover from each mistake.

AgileCloud StrategyIT Management
0 likes · 15 min read
8 Biggest IT Management Mistakes and How to Avoid or Recover from Them
Architects Research Society
Architects Research Society
Jun 12, 2023 · Fundamentals

Understanding Business Capability Modeling and Its Benefits

The article explains business capability modeling as a universal language for aligning IT with strategy, detailing its definition, benefits for mergers, risk and innovation management, and a four‑step method to create a capability model that drives cost savings, risk reduction, and growth.

Enterprise ArchitectureIT alignmentbusiness capability
0 likes · 13 min read
Understanding Business Capability Modeling and Its Benefits
Architects Research Society
Architects Research Society
Jun 10, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition of a security architecture team, detailing the roles of security architect, information security architect, chief information security officer, and security analyst, along with their business and technical skills, organizational relationships, and key responsibilities in managing enterprise security.

CISOSecurity Analystinformation security
0 likes · 13 min read
Roles and Responsibilities of a Security Architecture Team
Architects Research Society
Architects Research Society
Oct 13, 2022 · Artificial Intelligence

Six Business Risks of Ignoring AI Ethics and Governance

Neglecting AI ethics and governance can expose companies to severe public‑relations crises, biased outcomes, regulatory penalties, unexplainable systems, and employee disengagement, ultimately threatening both societal trust and business sustainability.

AI ethicsbiasexplainability
0 likes · 13 min read
Six Business Risks of Ignoring AI Ethics and Governance