Topic

risk management

Collection size
232 articles
Page 2 of 12
Old Zhao – Management Systems Only
Old Zhao – Management Systems Only
Apr 23, 2025 · Operations

Why Robust EHS Management Is Critical: 8 Essential Modules for Safe Operations

A solid EHS (Environment, Health, Safety) program prevents costly shutdowns, fines, and accidents by defining clear responsibilities, standardizing processes, and leveraging data across eight key modules—from hazard management to performance tracking—ensuring continuous compliance and operational stability.

EHScomplianceenvironmental health safety
0 likes · 8 min read
Why Robust EHS Management Is Critical: 8 Essential Modules for Safe Operations
Old Zhao – Management Systems Only
Old Zhao – Management Systems Only
Apr 18, 2025 · Operations

Master the 3 Pillars of Project Management: Scope, Time, and Cost

This article explains why controlling scope, managing time, and compressing cost are the three essential elements of successful project management and shows how a project‑management system can help balance these factors to deliver projects on schedule, within budget, and with the intended quality.

budgetingcost controlproject management tools
0 likes · 12 min read
Master the 3 Pillars of Project Management: Scope, Time, and Cost
Efficient Ops
Efficient Ops
Apr 7, 2025 · Operations

10 Dangerous Yet Tempting Ops Tricks That Can Ruin Your Career

This article lists ten seemingly efficient but risky operations practices, explains why they feel attractive, details the potential data loss, security breaches, and downtime they can cause, and provides safer alternatives for reliable system administration.

System Administrationbest-practicesoperations
0 likes · 10 min read
10 Dangerous Yet Tempting Ops Tricks That Can Ruin Your Career
Tencent Cloud Developer
Tencent Cloud Developer
Jan 3, 2020 · Information Security

Analysis of China's First GPL Litigation and Risk Management for Open‑Source Software Use

The Beijing High People’s Court’s landmark 2019 ruling in Digital Heaven v. Yuzu, China’s first GPL‑related lawsuit, rejected Yuzu’s claim that three HBuilder plugins were GPL‑bound derivatives, ordered RMB 710,000 damages, and highlighted both growing judicial recognition of the GPL and the need for companies to isolate, analyze, and manage open‑source components to avoid copyleft liability.

China LawGPLIntellectual Property
0 likes · 22 min read
Analysis of China's First GPL Litigation and Risk Management for Open‑Source Software Use
JD Retail Technology
JD Retail Technology
Oct 8, 2023 · Mobile Development

Cross‑Platform Development of JD Mini‑Program for Fast Delivery: Background, Action, Research, Progress, and Planning

This report details JD's mini‑program cross‑platform initiative for the Fast Delivery service, covering background, actions taken, research findings, progress achieved, planning considerations, risk mitigation, and expected benefits such as reduced cost, improved stability, and higher development efficiency.

JDMini-ProgramPerformance
0 likes · 9 min read
Cross‑Platform Development of JD Mini‑Program for Fast Delivery: Background, Action, Research, Progress, and Planning
Test Development Learning Exchange
Test Development Learning Exchange
Dec 2, 2023 · R&D Management

Comprehensive Guide for Test Team Leaders on Culture, Performance, Staffing, and Remote Management

This article provides test team leaders with practical strategies for handling cultural resistance, setting KPI performance metrics, managing staff turnover, resolving conflicts with developers, creating effective weekly reports, determining hiring needs, overseeing new business lines, controlling project progress and risks, reporting results, and successfully managing remote teams.

Performance MetricsStaffingremote work
0 likes · 17 min read
Comprehensive Guide for Test Team Leaders on Culture, Performance, Staffing, and Remote Management
JD Tech Talk
JD Tech Talk
Aug 28, 2018 · Blockchain

Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)

The article analyses the shortcomings of traditional seller‑driven financial risk data queries and proposes a blockchain consortium that uses distributed ledger, consensus, smart contracts and token‑based pricing to enable fair, secure, and efficient data sharing and settlement among financial institutions.

Financial Data SharingHyperledger Fabricblockchain
0 likes · 14 min read
Design of a Blockchain‑Based Financial Risk Data Sharing Alliance (Version 1.0 & 2.0)
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Aug 11, 2023 · Game Development

Comprehensive Guide to Testing Short‑Term Game Activities

This article provides a detailed testing guide for short‑term game events, covering their unique challenges, requirement analysis, risk mitigation, test case preparation, execution strategies, communication practices, player experience considerations, log verification, post‑mortem analysis, and activity reuse recommendations.

QA processgame testingplayer experience
0 likes · 16 min read
Comprehensive Guide to Testing Short‑Term Game Activities
DevOps
DevOps
Nov 5, 2024 · R&D Management

Project Management Six Grabs and Six Releases: Balancing Control and Flexibility for Successful Projects

The article outlines a 'six grabs, six releases' framework for project management, detailing how to focus on clear goals, detailed planning, effective teams, communication, risk mitigation, and monitoring while also letting go of perfectionism, hero‑complex, micromanagement, ego, and outdated experience to foster project success.

communicationleadershipplanning
0 likes · 9 min read
Project Management Six Grabs and Six Releases: Balancing Control and Flexibility for Successful Projects
Model Perspective
Model Perspective
Feb 6, 2025 · R&D Management

Mastering Project Implementation: Overcoming Real‑World Challenges with the OODA Loop

This article explores the final stage of the thinking‑chain—implementation—detailing the dynamic obstacles teams face, three core challenges, practical principles for acceptance, flexibility, and goal maximization, and how the OODA loop can guide rapid, adaptive decision‑making in complex projects.

ImplementationOODA loopdecision making
0 likes · 9 min read
Mastering Project Implementation: Overcoming Real‑World Challenges with the OODA Loop
Xianyu Technology
Xianyu Technology
Jun 17, 2020 · Backend Development

Lottery System Risk Management and SDK Integration

Xianyu mitigated lottery‑related financial loss by centralizing rights management, decoupling UI from business logic, and providing a unified SDK with simple draw APIs, while adding real‑time log backflow, comprehensive accounting and monitoring, cutting configuration time by over 50 % and eliminating UI‑only risk.

SDKbackendfrontend
0 likes · 10 min read
Lottery System Risk Management and SDK Integration
DeWu Technology
DeWu Technology
Jul 29, 2024 · Artificial Intelligence

AI-Driven Loss Prevention: A Comprehensive Field-Level Risk Control System

The paper introduces an AI‑driven loss‑prevention platform that augments manual risk analysis with automated field recognition to map database and code models, generate loss‑related methods and interfaces, and deliver pre‑emptive avoidance, real‑time detection, and post‑incident response, achieving over 1,200% growth in identified loss methods and near‑full field coverage.

AIAutomated Testingbusiness intelligence
0 likes · 8 min read
AI-Driven Loss Prevention: A Comprehensive Field-Level Risk Control System
DeWu Technology
DeWu Technology
Jan 8, 2024 · Backend Development

Overview of Payment System Evolution, Architecture, and Practices

The article traces payment system evolution from early ticket‑house methods to modern real‑time settlement, explains core concepts, architecture, APIs, fund and information flows, security and two‑level clearing mechanisms, and how order‑payment interactions should be designed for reliable e‑commerce transactions.

architecturee-commercepayment systems
0 likes · 24 min read
Overview of Payment System Evolution, Architecture, and Practices
DeWu Technology
DeWu Technology
Aug 28, 2023 · Operations

Real-time Data Warehouse Business-Side Chaos Engineering Practice

The article describes how a real‑time data warehouse supporting ad‑delivery metrics adopts both technical and business‑side chaos‑engineering, using red‑blue team drills to inject faults, monitor indicator anomalies, and refine response procedures, thereby enhancing early risk detection, system resilience, and overall data stability for the advertising platform.

Backend developmentChaos EngineeringData Warehousing
0 likes · 16 min read
Real-time Data Warehouse Business-Side Chaos Engineering Practice
DeWu Technology
DeWu Technology
Aug 14, 2023 · Operations

Capital Loss Prevention Practices and Technical System

Dewu’s capital‑loss prevention framework embeds risk assessment and technical safeguards—such as idempotency, distributed consistency, and active‑active multi‑region design—into architecture, organizes three defensive lines (development, QA, SRE), and employs real‑time, near‑real‑time, and offline verification plus regular drills, while advancing automated analysis and intelligent scaling.

SREdata consistencyfinancial loss prevention
0 likes · 10 min read
Capital Loss Prevention Practices and Technical System
DaTaobao Tech
DaTaobao Tech
Jun 24, 2024 · R&D Management

Technical Project Management: Roles, Challenges, and Best Practices

Technical project managers drive complex initiatives by translating business needs into feasible solutions, planning milestones, allocating resources, managing risks, and coordinating cross‑functional teams through design, testing, deployment, and closure, while using tight schedules, daily checkpoints, and transparent reporting to balance quality, speed, and reusable outcomes.

Technical PMagile practicesproject-management
0 likes · 14 min read
Technical Project Management: Roles, Challenges, and Best Practices
DaTaobao Tech
DaTaobao Tech
Dec 12, 2022 · Fundamentals

Testing Process and Test Case Design for Activity Lottery Feature

The article outlines a complete testing workflow for an activity lottery feature—from requirement evaluation, design, and case creation using equivalence and scenario‑based methods, through execution, gray‑release verification, and post‑release monitoring—emphasizing risk analysis, stability governance, rate‑limit safeguards, and financial loss prevention to ensure reliable, high‑quality releases.

quality assurancerisk managementsoftware testing
0 likes · 18 min read
Testing Process and Test Case Design for Activity Lottery Feature
Alimama Tech
Alimama Tech
Nov 13, 2024 · Artificial Intelligence

DeepString: Alibaba's Anti‑Fraud Platform Using Large Models for Real‑Time Traffic Detection

Alibaba's anti-fraud platform DeepString uses large unsupervised models to detect abnormal traffic in real time across multiple advertising products, combining a foundation model for event mining, anomaly measurement, and an alignment model for online filtering, reducing reliance on manual labeling and domain expertise.

algorithm frameworkanti-fraudlarge models
0 likes · 19 min read
DeepString: Alibaba's Anti‑Fraud Platform Using Large Models for Real‑Time Traffic Detection
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Feb 8, 2023 · Information Security

Exploring and Practicing Community Anti-Cheat Strategies at Xiaohongshu

The presentation outlines Xiaohongshu’s comprehensive community anti‑cheat strategy, defining cheating risks across industries, mapping the black‑gray ecosystem, and detailing a five‑module framework—risk perception, capability building, identification, mitigation, and evaluation—implemented via layered data architecture and multi‑stage detection to protect platform integrity.

anti-cheatdata analysisfraud detection
0 likes · 17 min read
Exploring and Practicing Community Anti-Cheat Strategies at Xiaohongshu
iQIYI Technical Product Team
iQIYI Technical Product Team
Feb 2, 2024 · Information Security

iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT

iQIYI's proactive compliance risk disposal platform and full‑lifecycle privacy protection scheme were recognized by MIIT as outstanding cases, showcasing engineering‑driven privacy integration across product development, release, and operation, improving compliance rates, reducing risks, and enhancing user experience while setting industry standards.

Data SecurityMobile Internetcompliance
0 likes · 8 min read
iQIYI’s Proactive Compliance Risk Management Platform and Full‑Lifecycle Privacy Protection Solution Recognized as Outstanding Cases by MIIT