This article provides a detailed description of the work of Ant Financial's intelligent customer service technical team.
Learn how Alibaba engineers accommodated for face masks in their face recognition algorithms in response to coronavirus outbreak.
Learn what kind of algorithm Alibaba is using to help sellers on its second-hand buy-sell platform Xianyu close deals faster.
In this blog, we'll take a look at Alibaba DAMO Academy's algorithm innovation that helped improve the diagnostic efficiency in the fight against the coronavirus outbreak.
This article discusses what we can expect in the near future with the rise of 5G.
Read on to learn how Alibaba's Risk Control Brain works in big data applications.
This post takes a deep dive on how Taobao Mobile's recommendation system was developed from the ground up.
In this post, Alibaba engineers discuss what it will take to make the intelligent security systems of the future.
Alibaba Cloud has made Alink, a powerful machine learning algorithm platform based on Apache Flink, open source.
This article looks at the algorithm devised by Alibaba engineers, which turns unlabeled data into a valuable commodity.
This article describes the application of PostgreSQL along with algorithms to extract keywords from a document for text (keyword) analysis.
This article provides an overview of the smlar plug-in and describes how it supports multiple similarity algorithms.
This post outlines different methods to find the similarity between documents in various scenarios and focuses on how different algorithms can be used to improve efficiency in such scenarios.
This post discusses how to calculate the similarity between arrays using algorithms. It focuses on similarity calculation for strings, images, and other types of data in PostgreSQL.
Learn how Alibaba Cloud was able to support this year's Double 11 and withstand one of the greatest traffic peaks in Internet history.
This article explains the algorithm to insert marketing scenario cards into the "Picks For You" display for effectively distributing traffic and improving overall position exposure gain.
This article describes how users interact with the recommendation systems. It demonstrates the implementation of the interactive recommendation through the weather vane model.
In this article, we will take a look at how we used etcd at Alibaba and how we made it faster as well as more stable and efficient.
This article explains and analyzes the operating principles of authentication and scheduling algorithms of a Kubernetes cluster.
This article discusses the new network security challenges under IPv6 and recommends the best practices of IPv6 DDoS defense by Alibaba Cloud to tackle DDoS attacks on a global scale.