https://www.alibabacloud.com/blog/
In the years to come, AI and IoT are going to transform the way we live our lives. This blog shares the top eight trends of AI for 2018.
HTTP/2 is an optimized transfer protocol over the previous version and offers various advantages, such as increased security, simplified development p.
Participants from renowned research institutes, universities, and companies have shared their newest technologies and products during Interspeech 2017.
This report aims to shed light on the software developer community and research trends in China.
Performance benchmarking of ECS Instances with Phoronix Test Suite
We will build a photo sharing Android app with real-time image uploading and downloading functionality using Alibaba Cloud OSS.
We will build a photo sharing Android app with real-time image uploading and downloading functionality using Alibaba Cloud OSS.
We will build a photo sharing Android app with real-time image uploading and downloading functionality using Alibaba Cloud OSS.
Various voice interaction products such as sound boxes and robots are emerging in the market now. The purpose of this technology is to respond to user demand in an efficient and accurate manner.
NextCloud is a free and open source self-hosted service that lets you host your files onto your own private server, providing you full control over your data.
Self-adaptive speech recognition improves the performance of ordinary speech recognition systems. In this article, let’s learn about the most recent d...
Alibaba’s Institute of Data Science and Technologies (iDST) said Monday its deep neural network model scored 82.
This article captures excerpts from Interspeech 2017, held in August 2017 in Stockholm, Sweden, with participants from various research institutes and renowned companies including Alibaba group.
Neural networks and TensorFlow solve many complicated real world problems in a simplified manner. This article explains the same with Python coding, which is very popular because of deep learning.
HTTPS greatly reduces security risks that HTTP being a plain text protocol cannot combat. That's why it has gradually replaced HTTP, providing greater security for web and applications alike.
The SQL Server AlwaysOn group features a high-availability and disaster recovery solution. However, users must take note of the differences in copies as well as the replication relationships.
From the minute you chose one of the world’s most popular cloud computing companies as your strategic cloud services provider, your world moved on to multi-cloud.
MaxCompute, Alibaba Cloud's big data computing service, is officially launched in India on January 18, 2018.
The value of computing is not just to calculate, but to discover hidden trends in data.
Apple's Face ID claims to be immune to spoofing from masks, but a Vietnamese cybersecurity firm defies this claim.
SHA-1 was a widely used cryptographic hash algorithm that is now proven to be insecure.
Virtualization revolutionized business IT. Now containerization is doing it again.
The Capsule Network proposed by Dr. Geoffrey Hinton brings a new perspective to Deep Learning as compared to Convolutional Neural Networks.
By taking advantage of two PostgreSQL functions, we can solve one of the biggest problems plaguing the industry – building an accurate recommendation system.
Resource Orchestration Service (ROS) can be used to deploy a Hadoop cluster on Alibaba Cloud with a single click.
Person Re-Identification (ReID) has been a research focus in computer vision in recent years. It is the process of retrieving images of a person across devices based on a given image of that person.
Containerd is not oriented to the end user directly but exists for integration into upper systems such as Swarm, Kubernetes, Mesos, and other container orchestration systems.
MySQL databases behave quite differently from Oracle databases. Databases need to be optimized after migrating from one to the other.
HBase client helps users to access HBase conveniently. It supports reading, writing, scanning, batch operation, table management as well as other features.
What are the different indexes of PostgreSQL for? How can we optimize our database with these indexes?
Data is everywhere. Phenomena such as the Internet of Things (IoT) and widespread digitization have unleashed a tsunami of information on the world and enterprises are struggling to keep up.
Currently, program developers are leveraging Swoole to implement network server programs in place of C++, Java and other complex programming languages.
When should you partition a table in your database? Learn how to split tables with partial index.
Sharding is a method of data distribution across multiple machines. MongoDB uses sharding to support deployments with very large data sets and high throughput operations.
Will indexes be used in full-text searches that do not contain a certain keyword? Learn more about GIN, Generalized Inverted Index.
Are you suffering from slow website access? Are you worried about overloading your servers by having too many visitors?
Execution plan cache is a significant part of SQL Server memory management. It can reveal to you how the execution of a query will occur, or how query execution took place.
With the costs of building a website falling dramatically, this whitepaper from Alibaba Cloud explores the opportunities for businesses.
A cloud computing “Starter Package” offers IT departments an incredibly simple way to select, provision and deploy worldleading IT resources.
This Whitepaper from Alibaba Cloud explores how we have arrived at the concept of ‘free trials’ for cloud computing services.
A lot of questions have been raised by our users concerning why ApsaraDB for RDS sometimes performs worse than self-built databases on RDS.
Congratulations to our first eight Global MVP winners! Alibaba Cloud MVP winners were chosen from a field of oustanding applications.
Evaluating the performance of a database usually involves either industry standard testing or modeling testing based on the business model.
Ecommerce will account for 42% of total consumption growth by 2020, with 90% of that emanating from mobile e-commerce.
Looking for steps to protect your data center infrastructure with a multilayered, automated approach to security?
To protect sensitive information and offer access to only those who have the right credentials, businesses need to monitor users carefully.
This whitepaper looks at how businesses can improve their scores on the tests of three fundamental data governance areas.
Post Object uses an HTML form to upload a file to a specified bucket, making it possible to upload files to the bucket through a browser.
Should you use Alibaba Cloud ApsaraDB for RDS or build your own database?
In this whitepaper, we will explore current trends in cybercrime, China’s data protection landscape and measures data center operators can take to secure businesses‘ cloud-based data storage.