Large-scale graph searches and real-time computing applications in the Alibaba anti-fraud system
processing capabilities and large-scale graph search technology to
fraud behavior anywhere in the system. 1. Taobao anti ...
Beating Counterfeits with Alibaba Cloud Optical Character Recognition (OCR
these image into machine-readable text. The main challenge for OCR is to
letters, characters, and symbols in various ...
Visualizing a Microservices Architecture with AHAS
This blog explores how architectural visualization can help us
problems that exist in our architecture, and ensure our ...
TopN statement - Realtime Compute
must contain primary keys. Constraints of the WHERE condition To enable Flink SQL to
a TopN query ...
Data types - ApsaraVideo for Media Processing
stream number, used to
the position of the video stream in the whole media streams CodecName ...
The Computing Conference 2018 Workshop: Log Based Security Analysis
massive logs from the ground up, and how to filter and
suspicious operations and analyze them in real time to further enable ...
Apsara Stack: Full-Stack Private Cloud Solution for Size Enterprises - Alibaba Cloud
. Applying these measures, we have vastly improved the opportunities to
and suppress contraband shipments. General ...
Introduction to Stress Testing
second (TPS), response delay, etc. This data allows us to understand the server's performance and to
existing problems ...
Harden Kubernetes - Security Advisories
used for the user authorization process: UserName: String type, used to
the user who initiates the request. If no ...
Access logging - Object Storage Service
.) UniqueString: the string (UUID) generated by OSS, which is used to uniquely
the object. The following example ...
remotely log in
remotely log in