Tag

policy

1 views collected around this technical thread.

AntTech
AntTech
Jan 3, 2025 · Artificial Intelligence

2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference

The 2024 Generative Large Model Security Assessment White Paper, jointly authored by the Chinese Academy of Sciences, the Ministry of Public Security's Third Research Institute, and Ant Group's Ant Security Lab, was unveiled at the inaugural CCF China Data Conference, offering a comprehensive review of model risks, ethical concerns, and evaluation methods to guide research, industry practice, and policy making.

AI ethicsRisk Assessmentant security
0 likes · 5 min read
2024 Generative Large Model Security Assessment White Paper Released at CCF China Data Conference
DataFunTalk
DataFunTalk
Dec 22, 2024 · Artificial Intelligence

Speech by Academician Sun Ninghui on the Development, Challenges, and Future of Artificial Intelligence and Intelligent Computing in China

The speech outlines the rapid rise of generative AI models, traces the historical evolution of computing technology, examines AI safety risks and regulatory responses, and proposes strategic pathways for China to advance intelligent computing through open, closed, or hybrid ecosystems while addressing talent, hardware, and cost challenges.

AI safetyArtificial IntelligenceComputing History
0 likes · 26 min read
Speech by Academician Sun Ninghui on the Development, Challenges, and Future of Artificial Intelligence and Intelligent Computing in China
Model Perspective
Model Perspective
Dec 6, 2024 · Fundamentals

12 Leverage Points to Transform Complex Systems—from Parameters to Paradigms

This article outlines twelve leverage points for system transformation, ranging from simple parameter adjustments to paradigm‑shifting rule changes, and illustrates each with real‑world Chinese policy examples, helping readers choose the most effective intervention for social, economic, or environmental challenges.

complexityleverage pointspolicy
0 likes · 12 min read
12 Leverage Points to Transform Complex Systems—from Parameters to Paradigms
php中文网 Courses
php中文网 Courses
Aug 27, 2024 · Backend Development

Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide

This article explains how Laravel's policy-based authorization works, covering policy creation, registration, usage in controllers and Blade, custom methods, response handling, guest user support, and testing, with full code examples for implementing secure and maintainable access control.

GateLaravelPHP
0 likes · 5 min read
Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide
IT Services Circle
IT Services Circle
Nov 25, 2023 · Operations

Enabling Microsoft Edge Uninstall on Windows 11 via System Policy

This article explains how the European Union's Digital Markets Act forces Microsoft to provide uninstall options for built‑in apps like Edge, shows where to edit the IntegratedServicesRegionPolicySet.json file to change the disabled flag, and offers a third‑party tool for additional Windows 11 tweaks.

DMAEdgeSystem Administration
0 likes · 4 min read
Enabling Microsoft Edge Uninstall on Windows 11 via System Policy
php中文网 Courses
php中文网 Courses
Oct 27, 2023 · Artificial Intelligence

UN Secretary-General Announces New AI Advisory Body to Strengthen Global AI Governance

On October 26, UN Secretary‑General António Guterres announced the creation of a new AI advisory body composed of 39 experts from government, industry, academia and civil society, aimed at fostering a multistakeholder, multidisciplinary global dialogue to maximize AI benefits, mitigate risks, and support sustainable development goals.

AIInternational CooperationSustainable Development
0 likes · 3 min read
UN Secretary-General Announces New AI Advisory Body to Strengthen Global AI Governance
Cloud Native Technology Community
Cloud Native Technology Community
Aug 22, 2023 · Cloud Native

Building a Robust Internal Developer Platform on Kubernetes: Components, Governance, and Policies

This article explains how to construct an Internal Developer Platform (IDP) on Kubernetes by outlining its essential components, adding default add‑on tools, establishing governance and policies, and implementing continuous integration/continuous delivery pipelines to provide developers with a safe, efficient, and cost‑effective experience.

Kubernetescloud nativegovernance
0 likes · 7 min read
Building a Robust Internal Developer Platform on Kubernetes: Components, Governance, and Policies
Cloud Native Technology Community
Cloud Native Technology Community
Jul 20, 2023 · Information Security

Implementing Zero‑Trust Security in Kubernetes with Service Meshes (Linkerd)

This article explains how to achieve zero‑trust security in Kubernetes by using a service mesh such as Linkerd, covering workload identity, mTLS, certificate management, policy definition with CRDs, and the practical limitations of mesh‑based protection.

KubernetesLinkerdService Mesh
0 likes · 11 min read
Implementing Zero‑Trust Security in Kubernetes with Service Meshes (Linkerd)
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 21, 2023 · R&D Management

China's IT Industry Overcapacity and the Shift from Production to Allocation

The article argues that China's IT sector suffers from severe overcapacity driven by policy and capital, leading to a situation where the core challenge is not production but the allocation of abundant resources, turning most industry activities into performance-oriented behaviors.

IT industryR&D managementovercapacity
0 likes · 8 min read
China's IT Industry Overcapacity and the Shift from Production to Allocation
DataFunSummit
DataFunSummit
Mar 8, 2023 · Information Security

Comprehensive Framework for Data Governance and Institutional Construction in China

The article outlines a coordinated approach to building eight fundamental data governance systems—including property rights, circulation, transaction, usage, revenue distribution, credit, governance, and security—while emphasizing the role of the National Data Bureau, government, enterprises, and individuals in shaping China’s data policy landscape.

Data Securitychinadata governance
0 likes · 12 min read
Comprehensive Framework for Data Governance and Institutional Construction in China
Model Perspective
Model Perspective
Dec 23, 2022 · Fundamentals

Why Every Government Leader Needs to Master Mean, Std Dev & Distributions

Understanding mean, standard deviation, and different data distributions equips policymakers with the quantitative insight needed to design fair, effective regulations and to interpret the massive data driving modern governance.

distributionmeanpolicy
0 likes · 9 min read
Why Every Government Leader Needs to Master Mean, Std Dev & Distributions
Cloud Native Technology Community
Cloud Native Technology Community
Aug 30, 2022 · Cloud Native

Governing the Rapid Adoption of Kubernetes in Enterprises

Enterprises face governance challenges as Kubernetes adoption surges, requiring centralized platforms, standardized blueprints, role‑based access control, policy enforcement, drift detection, and lifecycle management to maintain control, security, and agility across multiple clusters.

DevOpsKubernetesRBAC
0 likes · 8 min read
Governing the Rapid Adoption of Kubernetes in Enterprises
IT Architects Alliance
IT Architects Alliance
Feb 14, 2022 · Information Security

RBAC as It Was Meant to Be – A Comprehensive Guide to Access‑Control Models

This article traces the evolution from DAC through MAC to RBAC and ABAC, critiques common implementations, and presents a practical, tag‑based permission system that cleanly separates roles, policies, and objects for scalable, secure access control.

RBACRolesTags
0 likes · 25 min read
RBAC as It Was Meant to Be – A Comprehensive Guide to Access‑Control Models
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
Jan 13, 2022 · Big Data

State Council Notice on Issuing the 14th Five-Year Plan for Digital Economy Development

The State Council’s notice issues the 14th Five-Year Plan for Digital Economy Development, outlining China’s current digital economy status, strategic goals, infrastructure upgrades, data governance, industry digitalization, security measures, and international cooperation to drive high‑quality, inclusive growth through data and technology.

Big DataDigital EconomyDigital Transformation
0 likes · 32 min read
State Council Notice on Issuing the 14th Five-Year Plan for Digital Economy Development
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 4, 2021 · Information Security

Overview of SELinux and Its Use in Android

The article explains SELinux’s origins, core architecture, mandatory access control mechanisms such as type enforcement and MLS, and how Android incorporates SELinux as SEAndroid—detailing its evolution from permissive to enforcing mode, policy file structure, Android O’s split policies, and example domain and object transitions.

AndroidKernelMAC
0 likes · 17 min read
Overview of SELinux and Its Use in Android
Laravel Tech Community
Laravel Tech Community
Mar 16, 2021 · Fundamentals

2020 Chinese Software and Information Technology Services Enterprise Competitiveness Index Report

The report presents the methodology, grading system, 2019 performance data, and key characteristics of the top 100 Chinese software and IT service enterprises, followed by policy guidance from the Ministry of Industry and Information Technology outlining four strategic priorities for the sector's future development.

Digital Economychinacompetitiveness index
0 likes · 12 min read
2020 Chinese Software and Information Technology Services Enterprise Competitiveness Index Report
Practical DevOps Architecture
Practical DevOps Architecture
Mar 5, 2021 · Information Security

Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure

In his 2021 Two‑Session submission, Zhou Hongyi, founder of 360, urges the Chinese government to recognize and incentivize elite hackers, strengthen cybersecurity for connected cars, and build city‑level security infrastructure to protect smart‑city systems, outlining concrete policy recommendations for each area.

city infrastructurecybersecuritypolicy
0 likes · 8 min read
Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure
Efficient Ops
Efficient Ops
Aug 8, 2018 · Cloud Computing

Why China's Public Cloud Market Is Growing Over 50% and What It Means for the Future

China’s 2018 Cloud Computing Development White Paper reveals that the public cloud market grew over 50% in 2017, predicts continued rapid expansion, highlights fierce competition among industry clouds, the rise of hybrid and multi‑cloud strategies, growing security concerns, open‑source adoption, and evolving policy and technology trends.

Open-sourcecloud computinghybrid-cloud
0 likes · 10 min read
Why China's Public Cloud Market Is Growing Over 50% and What It Means for the Future
Architects Research Society
Architects Research Society
Mar 17, 2018 · Blockchain

Overview of Global Crypto and Blockchain Industry Associations

The article surveys major cryptocurrency and blockchain associations worldwide, including CryptoUK, Crypto Valley, Russian Crypto Union, Blockchain Research Institute, Digital Chamber of Commerce, Coin Center, and others, highlighting their formation, objectives, government lobbying efforts, research activities, and influence on policy and industry standards.

BlockchainCryptocurrencyindustry associations
0 likes · 8 min read
Overview of Global Crypto and Blockchain Industry Associations
Efficient Ops
Efficient Ops
Feb 12, 2018 · Cloud Computing

How Is China’s Government Cloud Being Evaluated? Inside the New Assessment Framework

This article examines the rapid growth of China’s government cloud market, the challenges revealed by low‑price bidding scandals, and the four‑dimensional assessment method introduced in 2017 to evaluate policy compliance, application impact, platform capability, and security safeguards.

chinacloud computingcloud evaluation
0 likes · 9 min read
How Is China’s Government Cloud Being Evaluated? Inside the New Assessment Framework