https://www.alibabacloud.com/blog/
The 2017 Hangzhou Computing Conference will be held once again in Hangzhou's Yunqi township.
From October 11 to 14, 2017, The Computing Conference will be held once again in Hangzhou's Yunqi township.
Heart disease is a major cause of death, affecting over one-third of the world's population. In China, hundreds of thousands of people die of heart disease every year.
As a new cloud service, Backend as a Service (BaaS), or Mobile Backend as a Service (MBaaS), seeks to provide mobile and web applications with backend.
Deep learning, machine learning, and pattern recognition are highly relevant topics commonly used in the field of robotics with artificial intelligence.
Smart home is one of the most prominent application of IoT, and many companies have invested heavily in this field.
The Internet is a powerful tool that connects us with users from across the globe. However, the might of the Internet has also made it vulnerable to abuse.
Docker has reformed the way of conducting continuous delivery. Docker allows you to package an application with all of its dependencies into a standar.
The internet industry has been constantly changing market demands and products, forcing organizations to adapt by making constant deliveries and updates to their production environment.
Caching is an efficient and easy way to capture interactions between your application and the data storage location.
SaaS service providers must always consider the large number of users when designing an appropriate business architecture.
Microservices architecture is a new concept that has become very popular and has become a hot topic of research recently.
In the past two years, the growth of artificial intelligence and machine learning has been immense. Machine learning, as a type of artificial intellig
Researchers from the security company Dr.Web reported a while back that the source code of a recent untitled Android bank Trojan was leaked to underground hacker forums.
Image recognition is a popular technology that can detect, understand, and distinguish images from one another.
Photo sharing has become a norm in social networking sites today. Even with so much happening in social media, self-portraits, or selfies, continue to dominate.
This article looks at some of the typical questionsthat arise when dealing with databases. In our discussion, we willnot stick to analyzing only a single type of database.
DevOps refers to a set of well-known practices for automating software deliveries. By design, DevOps allows for easier maintenance and updating throug
Message Queue Telemetry Transport (MQTT) is an instant communication protocol based on the publish-subscribe pattern.
The concept of dynamic tables is analogous to the materialized view in a database. Similar to static batch tables, dynamic tables enable Structured Qu
This article discusses the steps involved in performing data write operations with MongoDB, focusing on the roles of the Journal and Oplog applications.
Introduction and Background Although rapid iterative development has become a popular approach to software development, many development teams are u.
This blog recounts the author’s experience at the Beijing International Convention Center (BICC) from May 14-15, 2016.
With the ubiquity of digitally offered services, enterprises are seizing every opportunity to enhance their software capabilities.
A real-time system is a system that processes input data within milliseconds so that the processed data is available almost immediately for feedback.
Developers who have been involved in hybrid development are probably familiar with frameworks such as Ionic and PhoneGap.
A small internet startup James works with has been running its application on a domestic cloud A. The application adopts the common distributed Nginx
Let us start with this, have you ever received e-mails such as "notification for high-traffic customers," or "notification for high resource-consuming
The messaging team, devoted to RocketMQ performance optimization, has seen continuous optimization on performance in the recent times with the latest
The global enterprise market's determination to leverage big data has been synonymous with adopting cloud infrastructure.
Cloud computing's rapidly become the darling of the tech industry, thanks to the must-have services it provides to the enterprise market.
Artificial intelligence (AI) and robots have had the mainstream fired up since they made their silver screen debut in the 1920's film, Metropolis.
The concept of a cashless economy was a fantasy several years ago, but it has gradually become a reality, with technologies supporting the rise of m.
Move over,mobile-friendly site.A conversation-based interface is coming for your audience.Thesedays,it's not enough to shrink site content to fit a smaller screen.
DDoS attacks are not new, but 2016 marked a rise in their sophistication and magnitude. Last year witnessed a number of prominent distributed denial.
For computers, the Trusted Platform Module (TPM) is already in use and complies with the TPM specifications stipulated by the Trusted Computing Group (TCG).
The next-generation web intrusion detection technology based on machine learning technology is expected to make up for the deficiency in the tradition
Building customer loyalty is essential to any successful business. By understanding the needs of the consumer and tailoring your offerings towards t
A mobile workforce is increasingly becoming the norm around the world. According to Strategy Analytics, the global mobile workforce will expand to 1.
One of the more unsettling developments in recent months has been the phenomenon of 'fake news', where audiences consume and share news stories on social media which are not factually correct.
There's no doubt that in today's enterprise market, businesses with big data in their corner have a significant competitive advantage.
Beauty and big data Big data has made a lasting mark on the beauty industry in recent years, forever changing the way brands and retailers interact with their customers.
With the surge in popularity of distributed service architecture and the application of design architectures, especially the microservices architectur
The Content Provider component is one of the key Android app components. It manages data access and is mainly used to implement data sharing between apps.
According to Gartner, 6.4billion “things” will be in use worldwide in 2016 and the technology consulting firm expects this number to grow to 21 billion by 2020.
We are on a course of discovery and while we might be seeing new, fascinating applications geared towards leveraging Augmented (AR) or Virtual Reali
DevOps is a combination of development and operations and represents a culture, movement, or practice.
Blockchain is a distributed peer-to-peer network without any central control points. It uses distributed unified operation to achieve a set of tamper-
In an earlier article titled "Principles of searching for similar images- Part 1", we introduced a method explaining how tools search for similar images.
Google put the "Search by image" feature on its homepage, through which you can find similar images to any image on the internet.