November 19-21, 2015, by CSDN heavy build "2015 Chinese Software Developer Conference (hereinafter referred to as Sdcc 2015) in Beijing Langlizi Western Hills Garden Hotel is held ceremoniously. In addition to a strong lineup of all the general assembly, the organizers also carefully prepared a nine technical special forum and five special events. [detailed]
In this era of technology, technology, people must learn to look at the trend, look, can avoid the risk of punctuality. What is the general trend? Technology should assign high data, artificial intelligence, networking, 3D printing and robot field; market to focus on consumption upgrade service (o2o), crowd thinning (urbanization), globalization (Indian / Southeast Asia), business service industry (mobile SaaS). [detailed]
Today's headlines, vice president of technology Yang Zhenyuan Mr. media group visit, in referring to the headlines today push mechanism, he pointed out that the robot push mechanism. According to the users are interested in the content of a push, its business model is still in advertising based. 70% content from the headlines on the platform, which is a media person's creative platform, there are about the author and media settled.
Software developers face the pain is to do what kind of software can be accepted by the market. Only more analysis, understand the market trend, in the market to under expected direction of software development in the future, developers need to think much, much to see outside the world to understand the trend of international software, products will be quantified.
Big data services in the machine priority services to people, people can only macro things, the scene of the part of the decision, the machine can be on the individual, the whole amount of the scene to make decisions. For 360, the use of data and processing, is to improve the effectiveness of advertising, advertisers can accurately find customers. 360 is now in the direction of their advertising business, the use of data to the extreme, the entire volume of large-scale data analysis.
When it comes to Taobao double 11 system operation, he pointed out that the whole system is very stable, in the aspects of system architecture made full preparation, the service framework using message ons, in order to ensure the free expansion of online system. In addition to the database, but also the use of enterprise class application services framework to do support.
17:15[CSDN interview] Ali senior technical experts, DRDS project responsible for Wang Jingyu interview, when it comes to Taobao double 11 system operation, he pointed out that the whole system is very stable, in the aspects of system architecture made full preparation, the service framework using message ons, in order to ensure the free expansion of Online system. In addition to the database, but also the use of enterprise class application services framework to do support.
16:55Car drops technical director Li Tianyi theme for the secret of the world's largest station type travel platform of truth "of the speech. In began his first shared the car drops the obtained achievements, and then he began to introduce online business system and data structure of the platform, and their service architecture are analyzed. He also dynamic price adjustment, single system, coordinate data processing functions such as data processing or module to carry out, from its architecture, design considerations and other aspects of the detailed explanation. [details]
16:152015 China Software Developers Conference on the first day of the general assembly, from the only product will be the chief architect Cai Xueyong made the title from the perspective of three-dimensional software system architecture, the theme of sharing. Cai Xueyong comprehensive interpretation of the 3D architecture and the essence of the summary, and message driven framework design experience sharing. He believes that the software system architecture can be divided into: the external system, architecture is not standardized system, system architecture specifications, and analysis its development method: interface design layer, design and application of interface layer, design the overall structure, design service sub-systems interface, design resource STRATON system interface, design data model. [details]
15:35Clouds founder square small meals in the SDCC2015 shared the enterprise security trapped "topic, he introduced in the face of our Internet Environment: short time outbreak growth of enterprises and applications, enterprise first consider the survival and security considerations. Fang Xiao Dayton pointed out that there is now a situation - the data is our most important asset, but it can not be locked up, because the data boundary has disappeared. How to crack the plight of enterprise security it? First of all, enough to understand your opponent, and secondly to the core of the data to assess security; but also to fail to design security, dynamic point of view to consider security. [details]
14:552015 China Software Developer Conference on the first day of a plenary session, DJI without man-machine intelligent navigation technology director, flight control architecture designer Paul Yang for the theme of the aerial robot system architecture, platform and application "share. Paul Yang first introduced the Xinjiang company's product line, the flight controller, cicada, thought airborne platform, wizard series, warp and weft Matrice100 etc.; successively from consumer electronics to industry application of the product development platform; in addition, he also talked about the intelligent navigation technology has several challenges: combination of intelligent navigation technology, multi sensor data fusion, path planning, planning and control. In the final. He also shared the industry application case, and concluded: multi rotor aircraft is the future of robots in the future; application industry has just begun, basic technology and new technology need further development. DJI provide open platform to help developers together to develop. [details]
14:35[CSDN] Avangate Asia Pacific Sales Vice President Dong Jiachang interview with CSDN, in his view, the pain of software developers facing the point is to do what kind of software can be accepted by the market. Only more analysis, understand the market trend, in the market to under expected direction of software development in the future, developers need to think much, much to see outside the world to understand the trend of international software, products will be quantified.
14:10360 commercial product chief architect, "computational advertising" author Liu Peng published the "nine big data" speech. He humorously dished out such a topic "why Hadoop logo is an elephant", his understanding, Hadoop actually is the blind men and the elephant, for large data each have their own understanding. Liu Peng followed by the data source characteristics, the use of data, data processing technology and so on to share in detail, and finally he also some of the industry's prospects for the industry. [details]
13:302015 China Software Developers Conference on the first day of the plenary session, Dong Jiachang, vice president of the Asia Pacific region keynote speech, let business in the digital world should be required to change. He first shared the digital world of business revenue sources have five aspects: social networking, activity, cross sales & Sales & sales, firmware update, update. [details]
11:50Yang Zhenyuan, vice president of today's headlines in the theme of the challenges of big data, developers how to deal with the introduction of the developer in the era of big data, how to embrace change, change ideas. Through a series of examples and methodology, the interpretation of them and how everyone is based on a variety of data received to adjust the product. He also in the data is more and more, slow down the progress of hardware, the application of more and more of how to deal with, given his views - so that more developers should become a full stack of R & D. [details]
11:202015 China Software Developer Conference on the first day of a plenary session, from elixir designers, the rails core team members Jos valim brought called share the theme of "building distributed fault-tolerant applications with elixir". During valim share the elixir and Erlang language compared to traditional C + + in the distributed system advantage, and Erlang handling exceptions in special mechanism. This mechanism makes the distributed system more robust, finally shared the Elixier language is designed. [details]
11:00[media group visit] Qihoo 360, senior director, commercial product chief architect Liu accepted the media group's visit, a big data era, he thinks big data service on machine priority service to people, people only on macro things, on the parts of the scene make decisions, the machine can make decision on a body, for the full amount of the scene. For 360, the use of data and processing, is to improve the effectiveness of advertising, advertisers can accurately find customers. 360 is now in the direction of their advertising business, the use of data to the extreme, the entire volume of large-scale data analysis. For large companies, the risk is greater than the opportunity.
10:30Java generic author, JVM standard core maker, Dart language standard author Bracha Gilad for the theme of the "Essence of Objects The" to share. In his speech on the Dart programming language in all aspects of the introduction, including the main idea of Dart, advantages, to solve the problem, and with a lot of examples of simple and easy to understand. [details]
10:24[CSDN media group visit] today's headlines, vice president of technology Yang Zhenyuan Mr. accept media group visit, in referring to the headlines today push mechanism, he pointed out that the robot push mechanism. According to the users are interested in the content of a push, its business model is still in advertising based. 70% content from the headlines on the platform, which is a media person's creative platform, there are about the author and media settled. Today's headlines make full use of user behavior data, the user's behavior is recorded in a more comprehensive way. Compared with the traditional news client, the advantage of today's headlines is that the product experience is very good, the next step is to plan: to cover more content, there is a better interactive experience, there will be more to try.
9:30CSDN data platform director of the Department of research and development director Zuo Jianping released the 2015 China software developers white paper.
9:10CSDN founder Jiang Tao in the theme is "technology entrepreneurship those things" speech starts with a review of these years of experience: programmers for 12 years and 16 years Internet entrepreneurs, 5 years of high-tech angel investment career, and introduces the development history of Sdcc. Speech, he believes that in the era of the technology, technical people must learn to look at the trend, find punctuality, to avoid the risk. What is the general trend? Technology should assign high data, artificial intelligence, networking, 3D printing and robot field; market to focus on consumption upgrade service (o2o), crowd thinning (urbanization), globalization (Indian / Southeast Asia), business service industry (mobile SaaS). Jiangtao finally also shared some experience, such as venture avoiding risk must not do community of programmers, don't do online education, not bigger and the platform architecture, don't just stare at the function (Technology) beyond. [details]
CSDN deputy editor in chief Dong Shixiao served as moderator of the general assembly.
9:00The seventh session of the China Software Developers Conference SDCC2015 officially began.
17:18November 19, 2015 -21, by the CSDN heavy build SDCC2015 (China Software Developers Conference) will be held in Beijing. As the annual technology event, the organizers will be invited to nearly 100 domestic and foreign industry leaders and well-known technical experts on hot technologies and best practices, reveal the next generation of software development technology trends and the profound influence. This year, in addition to the speech of the keynote speakers, the organizers also carefully prepared nine technical special forum, five special events and exhibition. Nine technical session of the forum include: architecture practice, front-end development, database combat, research and development management, security technology, algorithms, programming languages, products and design, micro channel development. Five special events: friends, life, entrepreneurs, Nocturne, honyaradoh lecturer.
17:00[Architecture Practice Forum] SNG Tencent value-added products division, senior engineer, QQ members AMS operating platform technology for Xu Han Bin explain the evolution of QQ member activities operating platform architecture design. Xu Hanbin said that the activities of operation on-line short cycle, personalized strong, complex functional requirements and many backend interface features, according to the different operation mode of the analysis and abstraction of the vast majority of activities can be one one sets of conditions and mode of action of abstraction and encapsulation, and the formation conditions and actions and activities of general assembly, the other more important it is through the platform framework and driver development, provides a highly reliable and high performance for the activities of the general assembly, the framework has overload protection and fromscaling supporting environment, active components only need to package their own business logic, the core function of automatic support frame, in order to achieve a complete automation high reliability and high availability of development activities the. [details]
17:00[database] combat forum Redwood database co-founder Wang Tao "SequoiaDB and Spark in the financial industry application". SequoiaDB is a NoSQL database. In the traditional system, the data first enters the metadata layer, and then through the data integration layer of data collection, extraction, clarity, conversion, the final data will be classified processing. Under the traditional environment, the online business and offline business data are isolated, and in the present data can be real-time query, batch analysis. SequoiaDB (set partitioning master set) mechanism can easily deal with time sequence data. It can avoid the single data set volume expansion tree index is too large to write performance avalanche, according to time sequence can intuitively reflect the hot data access, guarantee the performance of hot data set, and can be directly allocated resources to different collections, intuitive backup, archiving rules. SequoiaDB can not only use Spark to do the interactive function, but also can be integrated into the existing Hadoop environment. He briefly explained the integration of SequoiaDB and Spark. [details]
16:50[R & D Management Forum] Baidu experienced agile coaches, lean consulting, delivery manager Hui LAN Wang to find user talk about love "," allows users to fall in love with you "," let the user can not get away from you "three stories share users touch up Trilogy" the users touch up, baidu rights products lean startup Story Sharing "speech. Proposed hypothesis, identify the target user, wish scene and model construction, harvested fan users extract from the "will" to "custom", with surprises stimulation habits, the unconscious mind of user training three elements, to customers for the exploration, customer inspection probe, customer training, the formation of the company's lean customer development method, development model based on value stream reach. [details]
16:35[Architecture Practice Forum] 58 fair group system architect, technical responsible for Xuan sun to "why need to move the push push", "three phase single platform, multi platform, company unified high performance architecture how design optimization" series, open the 58 city high to mobile push push platform architecture evolution "share the theme. Mobile environment under the weak network problems, APP news cannot touch dajen push become hard to be, but the IOS platform special does not allow a background service resident, unified the APSN (Apple Push Notification Service), and Android platform has a characteristic of open source, independent research and development, the third party push, consideration, 58 with the city developing out based on third party push push send platform, independent research and development of high performance provider combination of mobile push push solutions. [details]
16:30[front-end development forum] Tencent Internet value-added business front-end team responsible for in in his speech to share the site performance optimization of hybrid mode of speed control system, hybrid model, the front end of the continuous integration and monitoring automation system of three parts. Focus on sharing the Webview parallel initialization, Webview pre create, decentralized I/O, offline package management optimization, Webview and page parallel load four core optimization program.
16:10[database] Tencent Inc Senior Software Engineer Pan Anqun share "Tencent Financial Database TDSQL analysis". The core of TDSQL is based on MySQL. Tencent based TDSQL master, Webank and Tencent Financial cloud three financial grade database products. Financial industry for the database has some requirements: high consistency, zero data loss; 7 * 24 hours automatic disaster recovery, high availability, with easy expansion characteristics. It has a capacity of billion, the transaction flow, 1 00000 level per second concurrent, millisecond transaction accordingly. He analyzed the disaster recovery mechanism, TDSQL expansion mechanism and supporting facilities. [details]
16:10[Security Technology Forum] Wanda electricity suppliers to share the information security engineer, "operation and maintenance of the security of those things". He believes that the operation and maintenance of safety for network operation and maintenance operation and maintenance of safety, security and basic application server security part. The third part is closely related, mutual interference, and do a good job in the operation and maintenance of the three parts is essential. Security is a whole, to ensure that security does not lie in how strong the place, but to find their own weak place, and the network needs to be taken seriously. [details]
15:50[Architecture Practice Forum] fast senior architect Wang Xiaoxue detailed analysis of the fast from 2012 on the line before and after the merger of this year's architecture practice and evolution. From V1 workshop style development, basic functions available, V2 of the core link optimization, ensure that the mainstream business process normal, to V3 stage system architecture transformation. Under the background of rapid growth in business volume, fast establish the development process, code, fault accountability system, implementation of strict code review, combing the link on the single point, performance bottlenecks, establish service degradation mechanism, and small scale of iterative reconstruction, was applied to the Distributed Innovation of architecture engineering. [details]
15:40[R & D Management Forum] China Civil Aviation Information Network Inc R & D center product line manager Fu Zhifeng bring from 9 to 1 - air letter passenger protection project agile development practice, the theme of the speech. She said civil aviation information software development facing the test environment is not stable, parallel development difficulties of parallel development difficulties, and civil aviation R & D center developed seat protection (REA) business, with manual testing, testing tools, it, cucumber, JUnit to strengthen cooperation and to human tutoring and automation to facilitate automation test 10% to 60%, and the accumulation of knowledge in development to promote the development of, to eliminate duplication as the center, develop a change driven, products, development, testing three closely to achieve true iterative development. [details]
15:25[Security Technology Forum] black cloud security researcher Hu Qianwei shared the "talk from the SSL agreement". He believes that encryption is the cornerstone of security. Information transmission in the presence of eavesdropping, tampering, posing risks, and to solve the problem of the method can be used to encrypt the transmission, increase the verification mechanism, with the identity certificate. SSL protocol is divided into handshake phase and application phase, the protocol can achieve the above functions. [details]
15:20[front-end development forum] Style Coding is very important? He Shijun, the front end of the people network engineer in the keynote speech, said in fact it is not so important, but still need to pay attention to the developer. The release of ES6 will bring a huge upgrade of Style Coding, and recommend the ESLint tool, it has a plug-in architecture, highly configurable, a large number of preset rules, can be shared reuse and so on. He takes the airbnb code style as an example to introduce the features of ESLint.
15:20[Database combat Forum] south general 8t GBase technical director Sun Guorong speech theme for the "8t GBase high availability solutions". At present, the core business system is mainly to establish a disaster recovery scheme based on storage. In the new environment, the stability of information systems need to face the challenges of database abnormal downtime, disk failure, network interruption etc.. 8t GBase provides a complete database level high availability solutions that provide a second level fault auto switching function. [details]
15:15[R & D Management Forum] Alibaba process improvement expert Zhang Chengrong share "of continuous delivery of thinking -- how to in R & D management do continuous delivery" of the keynote speech, the Alibaba sustained delivery of theory, to complete the continuous delivery cycle of detailed analysis. He pointed out that the characteristics of the project management, managed code, build management, continued to release four functional architecture complete sustained delivery cycle, summed up the project management, the dynamic characteristics of the document, configuration tasks and project information with and project schedule visualization features, the managed code can be used, unlimited storage, construction management of safe passage, high-speed download, and rapid delivery of continuous delivery, high extension and intelligent forms characteristics. [details]
14:50[Forum] security technology clouds white hat dance "skinny Jiao share Android application security analysis". First introduces the Android platform under the mainstream methods of attack were reverse compile, acting capture analysis cloud API, source dynamic debugging, in pile, hook, etc.. And its common vulnerabilities under the platform is divided into rights disclosure, information leakage, component security, etc.. Ensuring the safe way is to use third-party security framework and security configuration testing and careful use of third-party libraries /SDK/ tools, early applications consider avoiding the safety design, custom development specification, system vulnerabilities effective method. [details]
14:40[Architecture Practice Forum] passers-by cattle travel network research and development director Gao Jian from the service to promote, the pain of Beijing south room, performance promotion practice, APP client technology evolution of four aspects explain the changes of the architecture of wireless site the way cattle. [details]
14:30[Database combat Forum] Bo Rui data chairman and CTO Liu Ruimin share the "RapidsDB massive parallel SQL in big data deep learning application". Liu Ruimin explains in detail the physical, logical structure and characteristics of RapidsDB. For users, only need to focus on the preparation of the SQL statement, the complex distributed memory processing and query optimization, the system to automatically deal with the underlying system. Distributed data stored in the memory of each node, is unified management and access, the user will be submitted to the query RapidsDB distributed query engine DQS. RapidsDB in addition to support SQL, but also support relationships, the server side of the cross partition multi table association. He also details the work of SQL MPP engine optimization. [details]
14:23[R & D Management Forum] Alibaba UC browser version of the computer technical director Li Yun to bring the team effectiveness mining "keynote speech, pointed out that the scarcity of self-management is the universal pain of Chinese engineers and self management is the starting point of management technology, and the end, continue to improve the ability of the individual is core management. Li Yun presented in detail the self-management team should pay attention to details, cultivate a variety of habits, in a transparent transport as this, start small, step by step, product kuibu thousands of miles to improve self-management; honor quantization, document templates and appreciation and encouragement provided high level of knowledge management method; and cultivate the habit of work focus on the user feedback, enhanced between the two types of work product technology and mutual trust, enhance professional skills. [details]
14:20[front Development Forum] Baidu EFE team, senior engineer, Baidu ECharts Product Engineer Qiao Gang in a keynote speech to share how to turn data into visual elements, in order to show people. Before he said data analysis, it is very important to carry out a visual display. Interaction is an important part of data visualization, should follow the visual design principles overview first, scaling filter; see details on demand.
13:50[front-end development forum] hungry? Senior front-end architect and a large front team responsible for Jian Feng Lin in a keynote speech based on hungry? Development way, development and dissemination, to explain the ELE.ME is and how it works. Hungry what to use "$dev make" a command line to get the work environment to build. JS framework is the use of JS Angular and JS Vanilla, the use of Babel/browserfy to compile.
13:40[Architecture Practice Forum] afternoon began, millet network research and development department is responsible for people, architect Zhang Tao "millet net buying" opened a share of the millet network architecture changes in practice ", detailed millet network architecture how to solve spike, intercept cattle, inventory etc. user hard problems. The first generation of millet net is rapid, simple, and can be used, including all official website, order processing, warehousing logistics, after-sales system share a database, with system calls between increased to form a reticular structure, coupling is more and more serious, thus evolved into a star shaped structure, layer, business layer, data layer of the three-tier structure. Technology and business expansion into the architecture of the millet network has brought a double challenge, how to manage to achieve the highest cost of the best efficiency? Millet network to business platform cross slitting, using Go, MCC, "Nginx, PHP, LVS. The global cache is built by Twemproxy+redis, speed (single node 14 million QPS), can be extended (automatic sheet), stability, asynchronous message service support plenty of news communication, minute message delivery, custom message indexing and protocol, allowing unlimited message accumulation. At the same time, through the virtualization technology to reduce costs, improve the utilization of computing resources, while the business system to design more flexible. [details]
13:40[database] Baidu big data, director of the Department of the architect Ma Ruyue to "Palo analysis database in the application of Baidu" in the title, share the speech. Palo is applicable to the statistical analysis of data, report forms (MySQL save the result data, batch processing) and a number of analysis (Hadoop+Hive). Baidu statistics applied after the Palo, the number of machines dropped from 220 to 58, the average query delay is reduced from 30ms to 60ms. In his speech, Ma Ruyue analyzed multiple sets of data model, and the overall structure of Palo and key technology. [details]
13:30[Security Technology Forum] millet Security Engineer Lv Wei share the "my pass your card". He believes that the number of accounts to steal from the password tired vulnerabilities, authentication Cookie stolen and other types of vulnerabilities. And the best solution to ensure the safety of httponly+HTTPS+HSTS is Cookie. And pass certification function of some of the loopholes will produce no behavior recognition, CSRF vulnerability forgery authorization request, etc.. And the best way to repair the authentication center to cross domain for the sub station to set the authentication cookie, single point automatic landing need to protect CSRF, so that users can not make a request for a fake landing. App embedded page login risk and binding account login will be a threat to the security of the pass. [details]
13:30[R & D Management Forum] pleasant loan CTO segment read the use of OKR to help research and development team to enhance the management level, the theme of the speech. He introduced the Intel company, which was used by many companies as a OKR tool for the management of enterprise objectives, and mentioned that OKR's goals are challenging and clear, while OKR's key results are measurable and direct support. How to analyze the organization of the landing OKR and bottom-up communication and incentives. At the same time, he also proposed the use of horizontal and vertical organizational approach, the definition of a clear performance of the goal-driven system, the establishment of a set, supervision and summary of the mechanism of OKR in the team introduced OKR recommendations. [details]
11:40[Architecture Practice Forum] hungry, deputy director of the research and development of innovative products, deputy director of the field to share the overall structure of the hungry mody. In 2015, hungry compared to last year to achieve a growth rate of 10 times, a single day 2 million 800 thousand, a peak of about 300 single / second, in this behind, hungry, what the structure of the change? Load equilibrium, SOA, gateway, and service from haproxy and stand-alone era NGINX-PHP, Cheng Jun explain the hungry the architecture evolution, and adopts the technical scheme, according to the field to split the database and asynchronous message notifications, in MySQL proxy connection reuse, current limiting, separate read and write, depots table, foreground and background separation. [details]
11:30[front-end development forum] U.S. group technology terminal group senior engineer Lu Wei in the keynote speech introduced frontend compiler design principle of the system, he said that the ultimate goal is to replace Webpack Browserify, even single compilation can take advantage of multi-core to speed up compilation. It will be used for U.S. group CI system and on-line system. It will be fully open source after the official launch.
11:30[Database combat Forum] open source distributed database TiDB founder, Codis project founder, distributed system expert Liu Qi to TiDB:HBase distributed transaction and SQL implementation to share the speech. TiDB is suitable for high concurrency, large scale, distributed database system architecture design. TiDB supports the MySQL protocol, which is easy for users to migrate from MySQL related solutions. He details the implementation of TiDB distributed transaction engine, how to achieve distributed transactions on the Hbase. [details]
11:25[R & D Management Forum] Agilean consultant, Wu Qiong share the knowledge work efficiency optimization "Ba Duan Jin", "the keynote speech, he Baduanjin as an analogy, optimization of knowledge work efficiency cited eight examples, recommended eight books, and puts forward eight important point: the Kanban flow transparent, condensates by improved consensus; reduce the size of the batch, accelerated flow and feedback; reduce transaction costs, further reduce the volume; congestion control, waiting, restore the flow; reduce the flow friction; eliminate the flow bottleneck; adaptability index is established and feedback system; throughout the organization to embrace the complexity and uncertainty. Wu Qiong believes that management must improve the productivity of knowledge workers and knowledge workers, the most valuable assets of organizations (enterprises and non profit organizations) will be knowledge workers and their productivity. [details]
11:20[Forum] security technology PKAV team member Li Pujun share "Web2.0 security.". He reverse hijacking and repair from the opener, as well as the vitality of the AOuth vulnerability, as well as the correct correct way to repair the security problems caused by the local storage cache Web security issues such as JS side details. And introduces the browser's latest third party SRI resource tamper resistant technology, its technology can effectively solve the problem of third party resources and CDN resources are tampered with.
11:00[Database combat Forum] Alibaba senior technical experts, DRDS person in charge Wang Jingyu (flower name: Shen Xun) shared the "Ali distributed database double 11 combat". First, he reviewed the development of database storage. In the process of database development, there have been a hierarchical model, relational model. Hierarchical model is used to query a data need to traverse all levels, and the relationship model can be completed through a line of code query. Performance loss is the disadvantage of the relationship model. The performance of the system can be promoted by index query. The mobile / Internet era, the user needs to achieve a direct interaction with the core data and capabilities of each service. For the database, we need to talk about data distributed to more machines, the system can achieve the expansion of the level level. Starting in 2009, Ali 11 began to use DRDS to ensure the stability and speed of the system, TPS to achieve a transformation from 5000 to several million. They added more room this year. They split the data into multiple units, from business applications, DRDS to the database. He gave a detailed analysis of actual process of double 11 DRDS. [details]
10:45[Architecture Practice Forum] Sogou architect Jian Ji Liu in the Sogou business infrastructure platform evolution history detailed the fast iterative under infrastructure evolution of practice. A good infrastructure should provide high performance, high availability, high scalability business support platform to support agile business development, improve R & D efficiency, and reduce operation and maintenance costs. From the initial technical services to business, priority function of rapid construction, based on the relative independence of the database interaction, team, select the appropriate / familiar with the technology to the period of the rapid development of business, infrastructure faced with the performance, can reduced maintenance, collaboration, and the costs and benefits and other challenges. Liu Jian site to share the Sogou infrastructure to explore the four steps to go": Initial stage - All-In-One, rapid prototyping, based on open source / experience, team independence; Horizontal -- Distributed conversation, database access framework, MongoDB access framework; Service oriented - unified communication framework, service registration center, service monitoring management, service tracking framework; Stream computing: a real time log publish subscribe framework. [details]
10:40[Security Technology Forum] Ctrip security product manager Wang Runhui shared the "business security account system and password". He believes that the main problems in financial security, marketing activities, financial security, and ultimately can lead to a substantial loss of corporate funds, financial products forced shut down, etc.. How to prevent the marketing and financial security is the primary problem to be solved, and the password security is among the first hurdle. In the face of more and more security problems, people have to step up to defend the safety of the pace.
10:35[R & D Management Forum] Baidu research and development platform, Senior Product Manager Wang Yinan published a "mainstream software development tool platform comparison" theme speech. Compare with development tools such as agile software development tool platform for the influence of he first to mainstream software development tool platform were introduced, then the waterfall model of software development tool platform, agile methods of software R & D and R & D tools platform features, agile value views. At the same time, he is also the scene analysis should be how to choose a suitable team tool platform, and puts forward the excellent tool platform of future development should possess the characteristics of faster, quality risk forward, more collaborative. [details]
10:20[front-end development forum] Strikingly.com CTO and co-founder Guo Dafeng in his keynote address from the four aspects of third-party database integration, lazy load component, container component and global state object, share a strikingly in react development practice experience and skills. He directly to the scene of the encoding sortable React demonstration using the jQuery package process, and that we can rest assured that the use of the React in the third party library.
10:00[Security Technology Forum] double spiral offensive and defensive laboratory responsible person Zhang Ruidong, double spiral offensive and defensive laboratory penetration test engineer Xu Chuanrong shared the title is "black and white". They played a white hat hackers two distinct perspective are discussed from the aspects of software vulnerabilities and security. Programmers need to have the function of processing logic, security risks, the meaning of the statement and the role of the data, data receiving and output needs which filter and other essential skills.
Double spiral offensive and defensive laboratory penetration test engineer Xu Chuanrong.
9:50[Database combat Forum] speech officially began, the first speaker Luirre, vice president of technology shared the challenges and analysis of distributed database. He first briefly introduced the isolation of the distributed database, CAP theory and NoSQL. He made a comparative analysis of OLTP and OLAP from several aspects, such as user and system oriented, functional, DB design, data characteristics, access number, work unit, user number and DB size. He gave an example to analyze the how in the SSD storage improve database performance, how to support distributed transactions under the premise to improve data transfer performance, and how to thousands or even tens of thousands of column complex queries provide second level returned results. He details the characteristics of the Elasticsearch, as well as for multi dimension real-time query and processing of Pinot and Druid. [details]
9:50[R & D Management Forum] Haier electrical technology director, "top of the technical management" author Huang Zhekeng published "how to build a high quality Internet technology team from 0?" "Keynote speech. He brought his work "management technology summit" in "to create high quality and efficiency of the technical team of practicing cheats" exercise to benefit the internal organs and moves the interesting to share. While practicing cheats "six pulse divinesword" are the organizational structure of the flat, vertical, matching the construction of team size, value oriented demand management, target management method of OKR, employee career development system, data driven development platform and Internet technology team culture analysis. [details]
9:45Database combat forum, in the refining stone network CEO CipherGateway Bai Xiaoyong presided over the official start. [details]
9:45Hosted by Agliean consulting Wu Qiong, the research and Development Management Forum officially began.
09:40[front Development Forum] Facebook front end engineer Huang ShihChi (Huang Shiqi) in the keynote speech, "React matters/scale Why" to share the React core technology points. "Once Write Anywhere Learn" is the core idea of React, UI and JavaScipt are two important characteristics of it. One Thing and Do It Well Do Write, Programs to Work Together, Text Streams Handle and other technical characteristics is the important reason for its to attract a large number of developers to use.
9:40 architecture practice forum space information system architecture of normal steel "Internet plus era architecture transformation" theme speech. Fan Gang said, a good source to keep evolving architecture. (from the shopping mall, double booking (11), and ticket booking hall) to taxi (street car, taxi artifact), "Internet plus" brings a huge change for us. However, as an architect, in the "Internet plus", in fact, under a lot of pressure, in the face of instantaneous peak and volume of business growth, architects need to continue to carry out technological upgrading and transformation. However, technology upgrading and transformation is not plain sailing, fan steel with their own practical experience shared architect of the eight year war of resistance against Japan "and explain why the technological transformation will fail and facing risks and challenges. First of all, the original system has accumulated a large number of subtle and complicated logic, if the new system is not correctly identified will allow users to lose confidence in the new system. While rework can quickly and effectively get rid of the original system of technical debt, but also for the technical transformation has brought great project risk. Van steel suggested, should take progressive type of technological transformation, makes the system suitable for technological transformation, smoothing transplant code, through the optimization of the internal structure of the and the business code gradually and at all levels and all sorts of decoupling technology, eventually as replacement parts updates system. [details]
9:30[front Development Forum] w3ctech promoter Zhou Yubo as moderator, after the introduction of all the lecturers, the forum officially began.
9:30Architecture practice forum in the former joint founder of the people network, CTO Pan Xiaoliang, under the auspices of the official start. Pan Xiaoliang said, choose to use what architecture is based on the actual business scenarios, it is recommended to think more about the architecture of peer selection, based on their predecessors to take its essence to improve their own architecture. [details]
17:30[algorithm practice Forum] interesting chief scientist Wang Xugang from the perspective of business and application scenarios to analyze how to use the "figure" to complete real-time analysis, so as to discover the value of data. First, from it to DT, from traditional to brand as the center to take the consumer as the center, data to quantify, tracking, recognition, prediction more accurate and continuously achieve commercialization, so that operating efficiency to achieve a substantial improvement. To membership operations, for example, from the facts, forecast, action of three dimension analysis, respectively: multi channel members operation analysis; churn behavior in the early warning model, mining model potential consumers, consumer value model; packet content recommendation, personalized push, intelligent customer service. However, data marketing existence quantity of data, diverse, real-time and associated technical challenges and need a unified framework to meet real-time correlation of a large amount of data calculation. Thus, the diagram calculation engine emerges as the times require. From the scene of building user portrait, for precision advertising, mining potential customers, loss of membership activation and through different combinations were corresponding algorithms, such as intimacy algorithm, namely according to the different paths and weights calculated starting from a node a to reach the probability of other nodes. [details]
16:50[Micro Channel Development Forum] Twilight interactive CEO Zhang Yongsheng in a keynote speech in cites numerous multi screen interactive scenarios. Completion of multi screen interactive needs to be paired + real time two basic technology. Pairing function can be implemented using two-dimensional code, audio, iBeacon three pairing mode. Complete real-time communication, can rely on Ajax polling, Poll Long, WebSocket three technology.
16:50[Programming Language Forum] Maxleap.com senior Java Engineer Liu Xiaoxi's speech theme is the Vert.x3 asynchronous framework of actual combat, Vert.X was born in 2011, was named Node.X. As a Reactive development tool on the JVM, with (1) light weight, low dependence; (2) asynchronous non blocking; (3) multi language support; (4) distributed, scalable; (5) Java 8, etc.. Liu Xiaoxi for each feature to do the interpretation, for example, in the distributed support, Vert.X not only support the use of stand-alone multi-core, multi machine distributed, can also support HA, support packet mode... [details]
16:35[products and Design Forum] to share the Internet enterprise boss system construction "theme speech where senior director of product Hao Ruoyun. He introduced the concept and the construction of the boss system, where the boss system construction process is analyzed, and rely on customer basic information management, business open security and billing mode to realize the function. He pointed out that QBOSSD decoupling of the construction process, divided into the billing, accumulating accounts, accounts and other financial domain, connecting external systems, system growth, growth of funds and other user domain create the client, the application ID, record the relationship between customer domain. In addition, Hao Ruoyun put forward a number of support system product manager TIPS, including not to start reconstruction project, always concerned about the business line trends, etc.. [details]
16:20[algorithm practice Forum] iqiyi video recommendation system expert Wang Min for everyone to bring the "iqiyi recommendation system framework and practice of" speech share. Iqiyi has 1.5 million unique users, 1.9 billion hours of video viewing time, 11 billion video views, behind this, iqiyi recommendation system is how to realize personalized and relevant recommendations covering all the terminals of dozens of product form? The iqiyi recommended at the base of the system operation and the calculation relies heavily on the Hadoop ecosystem, the recommendation algorithm is based on memory caches data and calculations, based on the RDD data set logic structure, Scala simple functional programming based on experience. Wang Min said that a good recommendation system must possess four important factors: massive data analysis; fast processing new data and real-time interaction; flexible join and various iterations of recommendation algorithm low latency in response to a request high QPS's recommendation. [details]
16:00[Programming Language Forum] in the afternoon of the three speeches by red language inventor nenad rakocevic, as well as the only product will chief architect Cai Xueyong, speech is the theme of Red: ten times to improve your programming efficiency. Red language is known as the full-stack language, powerful, support, including hardware, including a variety of field programming. In Red language developers like to use DSL to solve the problem. Compared to the C language, Red language can do anything C language to do, but not the syntax of the C language. It is currently static compilation, compilation speed is relatively slow, about four times slower than the C language, because it does not do optimization. In addition, Red language, there are many C language does not have the function, such as namespace. In addition, red there are some language reflection API, developers can directly used to control hardware, if you want to bring things to do, red language is also very suitable for, because of the very small, suitable for in memory inside of the Internet of things. Prior to this, Red language has done a lot of Internet of things, including the demonstration of the robot. [details]
15:40[Micro Channel Development Forum] Tsinghua University post doctoral, Internet veteran observers Ji bin Wang for saying "micro channel development of winter has been to" pointed out the reason: no touch up real net demand; blind expansion of chaotic management; target changeable conflicts. By analyzing the reasons for the success of e bags, he stressed that the micro channel development team is not only in the technology to overcome the waterfall development more to the Internet era of gene injection into the micro channel development team.
15:40【算法实践论坛】美团网数据组技术专家 付晴川发表《机器学习在美团用户画像中的应用》主题演讲，以What、Why、How开启了对于用户画像的细节解读。以其中的MT dmspa为例，统一特征提取框架，多工程师/模型自给自足、人力/计算资源冗余，在实现上特征统一提取/集中存储，支持no-coding，最终的建模周期将由3-4周下降到1-2周，人力/计算冗余估算将减少2倍。在分享过程中，付晴川抛出了一个颇为有趣的关于算法工程师的段子，引出在实践中遇到的那些坑。理想中的算法工程师是“提出假设->收集数据->训练模型->Interpretation of the results, however, things are not willing to, in reality, contains the constant debugging, to collect data, to collect more data and other links. Between the target and the actual effect, the algorithm engineer should be to approximation rather than rivalry. Before the depth of the optimization model, make full use of the characteristic data, to understand the model's advantages and disadvantages, choose suitable model. [details]
15:35[products and Design Forum] Sogou, senior product manager, share the mobile app "primitive force release" keynote speech, he summed to create mobile app needs to rely on five artifact: 1, the product plan of the system. 2, the optimization of the details experience grinding core competitiveness. 3, make full use of the equipment in mobile scenarios "perception" capability, combined with the mobile ecosystem, task type that is, thus creating explore the mobile Internet; 4, East by the other platform to launch products; 5, using humanized brand image, fan base maintenance brand. Xu Meng proposed product design to core, in-depth excavation, frontier exploration to build the planning system of the products, to details of the experience of the pursuit of the ultimate, analysis of data, a / B test, iterative verification to polish mobile app, and combined with the depth of the moving scene, equipment capacity, mobile state to build the product. [details]
15:10[products and Design Forum] lazy investment CEO Chen Yuyin share "from 0 to 1 to 100, keynote speech, he put forward the product design the best location is found suitable for their own path, locking target users need to identify pain points, in order to know the enemy and know yourself open from 0 to 1 A breakthrough. When it comes to product innovation, Chen Yuyin that need to be based on the user's understanding, through product upgrading better solve the customer pain points, and is the most effective interaction allows users to enjoy the, again big strategic to start from the service user. Finally he concluded that the difference of the product design to avoid unnecessary disputes, sophisticated user operations around the user to do. [details]
14:50Elixir language designer Jos Valim shared the theme for the "an Elixir web framework Phoenix: for the new web" speech. Phoenix is an architecture open network framework. From the outside, Phoenix can accommodate all kinds of browsers; internally, due to the distributed architecture design, user and host each for information exchange will set up a new independent process can ensure the which when a channel is blocked, and does not influence the normal work of the other processes. From the data feedback point of view, to the Phoenix request and response processing time will be faster than the same network framework. [details]
14:40[Micro Channel Development Forum] Shenzhen cloud soft co-founder and chief technology vice president Huang Rongzhen in his speech pointed out that open to those who cannot avoid business customers, and payment is not open around the business sectors, by micro payment strung business logic can be summarized in ten points: pay attention to; pay cuts; buy membership; membership privileges; coupon card; card vouchers spread; the line to line; recognition and encouragement of channels; customer segmentation; precise marketing.
14:35[algorithm practice Forum] Alibaba search division algorithm expert Yan Qiang Shao Cheng around the "personalized" algorithm detailed since three years, Ali in the double eleven 35.019 billion, 571 million, 912.17 billion behind big data innovation and personalized algorithm system. With personalized business technology platform (TPP), can be a line of code to achieve the rapid large-scale Match CF framework (eTREC), real-time scheduling framework (Olive) to form a dual 11 personalized algorithm system. Among them, the high efficiency of the TPP algorithm iteration, real-time feedback, support for Automated Deployment and operation and maintenance, and Olive is included in the two parts: Streaming System Online, Learning Real-time. [details]
14:30[products and Design Forum] Jingdong Mall Senior Director Zou Yu to bring the product data research "theme of the speech, he to Jingdong Mall product data proposed research driven product innovation, he thinks the Internet company's research data on product understanding and insight into the data, line and speed iterative data analysis, the off-line data mining, real-time recall, data filtering and ordering of the recommender system algorithm, analyzes the sorting platform data sequences of loops including data storage modeling data, data indexing, sorting data retrieved node fruit sorting prediction system etc.. [details]
13:50[Micro Channel Development Forum] IBOS founder / Product Manager Yang Fangxian said in a keynote speech development and application suite, is one of the choices of individual developers and small teams. Planning application suite products should follow four principles, namely, the identification of suite demand, seize the core needs; remodeling and guarantee a product demand, to meet the different usage scenarios; carding process structure and is convenient for users to use; optimized interface design, in line with the user group preferences.
13:30[algorithm practice Forum] officially began at the beginning of the afternoon, TalkingData chief data scientist Zhang Xiatian share the "random non parametric learning algorithm Introduction" theme speech. Summer, said data increase rapidly, the algorithm complex degree high, the era of big data machine learning is facing enormous challenges, to parallel hardware accelerated and efficient algorithm combining can effectively solve this problem. In the algorithm are compared, random decision trees algorithm combines multi teeth were constructed by decision tree prediction results for classification / regression, contribution low overhead, in the process don't need to use label information, its computational complexity with the number of training samples is linear growth. [details]
13:30[products and Design Forum] will be CEO Li Xianghao bring the social transaction, "the keynote speech, he will metaphor of social business, put forward a viewpoint that the social of the transaction, from information, experience, cost and value between social and transaction, and points out that the social product design for screening of low cost is reduced to vertical development, precise matching, and promote the" deal "to reduce costs, increase revenue. In addition, Li Xianghao also mentioned the social APP to use noise reduction means, matching mode, operational noise reduction, information mechanism, a variety of ways to reduce the user's social noise. He said that social product and social noise struggle is a long-term process, but will usher in the day of blossom. [details]
11:40[algorithm practice Forum] Tencent wide core engineer Yan Hao: the Peacock: large scale subject model and in Tencent business applications "keynote speech, detailed LDA model training in four steps: randomly initializes each word topic; continuous re sampling each topic, the update count; repeated sampling, until the model converges. In improved Gibbs sampling speed, big big data model, support for adjusting parameter optimization model of quality, the peacock is given than common large-scale LDA model more perfect scheme, first of all, implementation based on the go language, sparselda can be algorithm is used, block matrix parallel computing, can support 10 million x 1 billion of matrix decomposition, and each iteration of the hyper parameters optimization, intelligent training topics number. [details]
11:40Chen Hong, founder of the future application of the development of the forum in a speech to share the developers to use the H5 Nuggets should avoid many mistakes. He said that has expired H5 activity pages have some long tail traffic, you can put the last page of these pages together with the latest H5 activities to the link, in order to precipitate a number of active users. Also cites a double eleven most fire H5 application, micro channel entrance; strong content and users to take the initiative to share; large user base in several common characteristics.
11:35[products and Design Forum] Alibaba products expert Liu Yulong bring the sense of product safety design "theme of the speech, he proposed in reality sense of security establishment and security products in the sense of design comes in its own resources, for their own environment, their own initiative, to Ali money shield of product design, for example, put forward to product design through visual information for security is perceived, through active marketing and let user perceived value, with the nature of the product of the microblogging marketing to make risk visualization, summed up the final products of the sense of security design process should be for resource location, determine the scene, visual risk, let the user perceived let. [details]
11:20[Programming Language Forum] gopher China initiated, open source framework beego author Xie Mengjun share entitled "go cloud computing era system language, speech, including analysis of the go language design background, cloud computing applications, trends and future development aspects. Especially in the era of cloud computing system features are very large scale, distributed, universal, high scalability, low cost of several characteristics. In these areas, Go language has provided a lot of support. In the field of cloud computing, Go language has the corresponding open source projects, such as the container class: coreos, Docker; database: Codis, TiDB; distributed database scheduling: kingshard; DevOps:open-falcon... A large number of domestic and foreign companies have been used in the production environment Go language, Google, Apple, Foundry Cloud, MongoDB, Ali cloud CDN, Baidu, millet, seven cattle, HUAWEI, Kingsoft, cheetah move, hungry it... [details]
10:40[algorithm practice Forum] Jingdong Mall search recommendation, director of Liu Sizhe from Jingdong recommendation mechanism and prediction of general model, sorting and monitoring four a detailed analysis of the practice of Jingdong Mall in the recommended application system. Recommendation system throughout all aspects of online users, its value lies in mining the user's potential demand for the purchase, shorten the user to the product distance, for users in demand is not clear and definite reference and satisfy curiosity. Jingdong recommendation algorithm optimization in data analysis as a tool, enhance the quality of the data and coverage, test different algorithms in the effect of different data sources, improve quality of recall model, increase the degree of recognition and user feedback as the basis, on the recommendation of the reordering, increase number according to the update frequency. Liu Sizhe said that the recommendation system is a complete project implementation, algorithms, engineering two are indispensable, algorithm optimization is the process of gradual iteration, the need for more inspiration. [details]
10:35[Micro Channel Development Forum] Beijing guest to play Technology Co., Ltd. CEO Zhao Fei in the keynote speech on the iBeacon and its work and the main form of data. Micro channel shake is based on the iBeacon near field Bluetooth technology. He focus on how to join the micro channel shake, ibeacon how to work, Android phone is compatible with the ibeacon. Why said micro channel shake a shake in the scene of the interactive marketing have advantage and other popular problem solutions.
10:30[Programming Language Forum] wheel Internet chief architect, PHP official expansion of the development team member Han Tianfeng brought the theme for the PHP asynchronous network communication programming speech. He compared the asynchronous + mainstream nginx, Nginx+Lua, Erlang/Golang, Node.Js, PHP-Swoole etc. several parallel programming model, and explains the PHP asynchronous IO related expansion, including: stream, sockets, Libevent, Pcntl/Posix, pthread. [details]
10:20[Product Design Forum] and Baidu senior technical manager Shi Jialiang shared the "Crowdsourcing" products "make a keynote speech. He introduced the crowdsourcing platform refers to using the Internet to the task handed out, to complete the work by the wisdom of the masses, and to recover the creative, data, information, and the desired outcome, to Baidu crowdsourcing practice case analysis the Baidu all the measurement and MTC products, and analyzes the crowdsourcing facing users of quantity and quality, and diversity of the user's attention, how from the C-terminal to the B side of the management and technology problems, the proposed thinking and solving methods. [details]
09:55[Micro Channel Development Forum] Meng Zhiping, founder of the iH5.cn (Interactive Master) in the a HTML5 underlying development tool history "theme of the speech introduces the birth history of HTML5. He believes that HTML5 and micro channel complement each other, HTML5 is also a micro channel inevitable choice. HTML5 possible future development direction of the electricity business platform, AR/VR, online education, intelligent hardware, such as native APP. Fast development, high quality content is the biggest bottleneck in the development of HTML5.
9:50[algorithm practice Forum], Ju, deputy director of the odd Netease technology on intelligent query rewriting in the search application, query synonyms mining application in search advertising share the query optimization of practical experience. The site to explain how the based on users search log mining, based on the weight of query phrases similar of error correction and query optimization means to achieve RPM rise, "exact" recall more advertising, single click price increase. [details]
9:40[Programming Language Forum] the first speech from Zhuhai Yun Chong technology research and development center, technical director Qi Yu, he brought the theme of "the beauty of C++1y" speech. The content mainly consists of three parts: (1) to check whether the member function exists; (2) the function cache; (3) to achieve a router http. In the first instance, Qi Yu compares the differences between C++98/03 and C++11 to check the existence of the member function, which reflects the flexibility and efficiency of C++11. And in the cache function, the traditional practice is each function need a container to cache the results, can not be universal, the function signature cannot generalize, and if the C++1y, it only need a container, universal, suitable for any function. Through a specific case to achieve HTTP router, Qi Yu strongly expressed C++ confidence equal to anything. [details]
09:35[Micro Channel Development Forum] IBOS founder / Product Manager Yang Fangxian served as moderator. He reviewed the 2014 CSDN hosted two micro channel Developers Conference, this symposium will continue last year's general assembly, with the majority of micro channel developers and then the latest technology in the field of micro channel in recent years, the latest technological achievements.
9:35[product and Design Forum] "growth hacker" author Fan Bing brings "growth hacker: black magic of entrepreneurial team" theme speech. He first introduced the concept of growth hacker is a group of data driven marketing, market guidance products, through technical means to carry out the growth target. He proposed hacker should have character growth is the inventor, geeks, mad men, and analysis technology products to being together, Clipsal, premise is not playing swollen face fat filled, technology driven marketing are not necessarily tall black technology, always thinking "is not is must do", "if do, is there a better way" and "now the results and the optimization of the space?", product technical should understand and comply with human nature, especially the dark side of human nature. [details]
9:35Programming language forum in CTO Ruff Zheng Ye, under the auspices of the official start. Zheng Ye has more than ten years of programming experience, the use of a variety of development languages. The opening is thrown out a controversial topic: which language is the most efficient programming language? Some people say that the stage is C++, some people say that Java, but also some people say that the Go language is difficult to have an accurate answer to this question. Today's programming language has invited experts at home and abroad to share the experience of the development of language in the actual combat environment, and how to make a comparison between the mainstream language and the new language. [details]
9:35[algorithm practice Forum] by the appropriate letter big data innovation center data scientist Xiang Liang as chair, after all the speakers were introduced, the forum officially began. [details]
9:30[product and Design Forum] from the meeting will be chaired by Li Xianghao CEO product and Design Forum officially began. [details]
17:10[cloud computing security and trusted computing Forum] computer school, Wuhan University Professor, doctoral tutor Huanguo and the Chinese Institute of Electronics cloud computing committee members, Intel China R & D center data center business department chief software architect Li Yan shared the a end "to the end of trusted cloud resolving scheme". Zhang Huanguo said: cloud computing also exists such as equipment, data, content and the common security of the text, but also such as the sharing of resources caused by the sharing of personal security. Currently trusted computing has made series of norms and industrialization of achievement, such as the announcement of the three trusted computing technology standard; TCG announced the TPM2.0 and TSS2.0 new code, and will continue to publish other specification, Microsoft released WIN-8, full support of trusted computing etc.. In terms of end to end, to achieve the trusted cloud infrastructure, trusted cloud platform, trusted cloud terminals, trusted cloud systems, trusted cloud services, the need to build a trusted community in china. Li Yan focuses on the Intel trusted execution technology (TXT), trusted computing pool (TCP), open source remote authentication (OAT), how to help more companies to achieve security and identity protection.
17:00[cloud computing applications for large data intelligent transportation industry forum] treasure ship 2 product director Du Zhongping entitled "treasure ship shipping network 2 construction of ecological practice" speech, first introduced the process of upgrading transformation of shipping formats, from commercial technology and user perspective introduces the characteristics of treasure ship network 2: business research new technology, architecture, design and implementation of more close to the user, to explore Internet plus business model. He then introduced treasure ship Web 2.0 in four areas of port services, inland river shipping, logistics services, personnel services. He also introduced the treasure ship company's core product S-GIS, and treasure ship network cloud 2.0 ecological and shipping data based architecture. He said that a big opportunity for the ecological system of shipping market, you can provide a development, transparency and integrity of the environment, and make innovation in this ecology into a more simple, more likely to occur.
16:30[cloud computing security and trusted computing Forum] CSA Greater China Chairman, HUAWEI chief network security expert Li Yuhang published the 2 era of cloud computing network space security, keynote speech. Cloud computing has evolved from the first generation of the traditional data center, virtual machine to the second generation of green data center, containers, spark, IOT devices such as, the top-level network security framework including international strategy, national laws and industry standards, management processes, tools and talent cultivation in six dimensions. Each dimension need international and cross-border and inter agency, cross sectoral cooperation. For cloud computing software defined boundaries, quantum secure and networking security and mobile application security vulnerability detection, cloud security alliance were launched CSA SDP, CSA quantum safe, IOT security controls and CSA mast service.
16:10[cloud computing data applications of intelligent transportation Forum] Shenzhen city comprehensive traffic command center chief engineer Guan Zhichao brought theme for the new generation of information technology era urban traffic monitoring, modeling, simulation, and evaluation system of speech. He introduced the Shenzhen city traffic cloud computing practice, including the Shenzhen city comprehensive transportation information center and Shenzhen city future traffic key laboratory and so on. He then introduced in Shenzhen city traffic monitoring and model system, he said, build region, macro, meso and micro integration of multi-level traffic model system that can form the reunification of the city's traffic model platform, meet different levels and types of transportation decision support needs. Finally, he introduced the macro, meso, micro, online intelligent simulation environment and impact assessment of urban traffic in Shenzhen city.
16:05["Internet plus" Financial Forum] at Beijing law firm senior partner Wang Xinrui's keynote speech is the name of "financial big data practices and compliance issues", he makes a detailed analysis of credit risk control, marketing, and collection of several aspects of the financial big data business practice, and from the laws and regulations of the enterprise a detailed guide practice data.
15:45[cloud computing security and trusted computing Forum] China Telecom Co., Ltd. cloud computing branch company deputy general manager Zheng Shaobin in entitled "credible, from China Telecom" speech focus on shared China Telecom's practice in terms of security. China Telecom has 15 five-star and 90 four-star data center, has formed a "4 + 2" cloud data center, build more cloud data center; computational capacity of millions of nuclear physics; storage up to EB level; room egress bandwidth over 10TB. Whether it is the government, large enterprises, small and medium-sized enterprises or enterprises for internal use, with the high security requirements for safety.
15:35["Internet plus" Financial Forum] home of the founder of net loan & Ying Chan Group Chairman and President Xu Hongwei has called "cloud credit - to create a P2P net loan industry ecosystem" lectures. During the speech, he shared the credit status of P2P net loan industry for the guests: P2P net loan industry consists of three core participants, investors, borrowers and borrowers P2P platform, directly determines the quality of investor willingness to invest and platform for survival, looking for high quality borrowers because of its breakthrough in the core of the entire P2P net loan industry the former; P2P net loan industry in the rapid development of our country, China has become the world's largest P2P net loan market, but due to the development of China's credit industry is relatively backward, the development of P2P net loan industry in our country at present and bottlenecks; in the central bank's credit system, only 300 million people have real credit relations with banks the accounting for less than 25%, and the P2P platform is currently not included in the central bank credit system, the large and small credit company a lot, but no one is able to provide a P2P net loan A complete copy of the credit report.
15:30[cloud computing security and trusted computing Forum] security dog CEO Chen Fen in the theme for the cloud service model is used to solve the safety of the small and medium-sized enterprises pain points, "the speech said, the small and medium-sized enterprises are facing the risk allocation and external attack serious, very serious security situation, 90% of small and medium-sized enterprises lack systematic safety planning, in terms of security investment and the overall IT investment accounted for less than 3%. According to the safety protection system, network security, security baseline system (anti anti intrusion), identity authentication, Cross hybrid cloud and a public cloud management of several typical cloud security service scenarios and security dogs were put forward several solutions, including: production safety image template, safety producer of image template, community security forces -Store, cloud computing vendors network infrastructure, based on host host level, based on VPC (virtual private cloud).
15:25[cloud computing architecture core technology forum] lark technology founder and CEO left Yue for our decryption windows container of the history, present situation, future and application. Yue left first introduced the difference between windows and Linux designers, and then focuses on the Drawbridge container technology, and compared to the docker, first docker and kernel is shared, Drowbridge is not to be shared and the starting time of the docker relatively much faster. Drowbridge phase of relatively slow. Image Docker does not support multiple integration (such as Apache+MySQL), but Drawbridge can. Because Drawbridge to achieve the 45 API, you can do something Docker can not do things, such as support for Snapshot, can do availability High, as well as enclave Secure (SGX) -R/G. Drawbridge 2, the latest research and development, has been applied in the Machine Learning Azure.
15:20[cloud computing platform to construct and practice Forum] China, member of the Committee of experts on big data, Shanghai Sheng Tao Big Data Technology Co., Ltd. General Manager Ding in the theme is "big data intelligent IT tools and platform" speech first examples of large database market exists many problems: (1) inheritance -- does not support acid, big data will always be "from the sideline while talking"; (2) the performance of large data not only "big", but also to "fast". High performance, real time big data is the future of the road; (3) easy to use - big data to bring us not only the "value big", more important is that everyone will use the big data.
15:18[cloud computing data applications of intelligent transportation Forum] Tongji University Professor Yang Dongyuan, entitled, "big data era urban traffic thinking, analysis and decision making," the speech said, for urban traffic, big data is not a fashionable, but technology to promote, demand pull and task concept change the common call creativity, and the face of the field of urban traffic data technology application problems, need the government to improve predictability, establish the correct values and enhancement of pulse diagnosis ability. Period, he also said in the field of urban traffic, the application of information technology, neither the big data stuffing technique traditional technology framework, nor of association analysis technique and simple to apply. Finally, he introduced the large data evidence based decision analysis framework technology. Its main goal is to improve the decision-making effect of the organic integration of urban transport strategy, policy, planning, construction, management, and control of technical aspects of the strategic control process.
15:15["Internet plus" Financial Forum] letter big data innovation center research and development director Gu Wendong's speech on the theme "Bo that is new, extension letter financial data cloud". He believes that the recommended system is a typical application of large data. After that, he put forward the "connection Internet plus" financial bearing is flat, can be generated and any vertical field, financial products also has a platform, all walks of life cannot do without the financial, this platform what chemical reactions at the beginning and gradually vertical field releases great value. So, he believes that the development trend of Internet banking is: service, scene, cloud + end. In the end, he mentioned that the letter should be used to the letter, businesses, partners Trinity financial services system.
15:10[cloud computing security and trusted computing Forum] was in the Internet companies do safety work and Entrepreneurship of sinomenine cloud security founder &CEO Fu on safety of understanding is very profound. In entitled "for future adaptive security architecture" speech, share a real enterprise security story: famous game was hacked, final 7 joint team with 2 months time through a variety of technical means to found server 10% were infected. He believes that: the security environment is very grim, security has been far behind the development of cloud computing, unable to respond to drastic changes in business needs, more unable to face the professional attacker, corporate security into trouble. So the enterprise need more: applicable to various infrastructure, easy deployment, rapid response, easy to use, real-time detection of unknown threats, continuously monitor contains and protects the core assets, personnel rely on low cloud security services.
15:00Cloud computing platform to build and practice Forum] Hangzhou and pat cloud CTO Huang Huipan published a speech entitled "what is cloud acceleration" speech. He first introduced in the end what is cloud acceleration, he believes that the nature of the network is accelerated, after which he also shared the UPYUN cloud computing system architecture. Although cloud acceleration will bring the cost of hardware, system development and operational aspects of the network cost, but cloud acceleration brings the value is obvious, he thinks there are two main reasons, first is the service standard, transparent, fair; the second is service quality consistency and optimization cycle is short, and as a new generation of CDN Accelerated Service UPYUN redefined the cloud acceleration.
14:55[cloud computing architecture core technology forum (2)] DaoCloud co-founder and CEO Chen Qiyan in the subject is mentioned in the speech of the container to help enterprises transition to the Internet architecture ", before the vessel, the software development is less team collaboration, operation difficult to trace, quality control, integrated continuous, cluster to telescopic, delivery lacks uniform and other pain points plagued. The emergence of the container, the software development process with new ideas, namely: Lean Engineering (Methodology), mobile (application), GIT flow (collaboration), micro (Architecture), cloud platform (platform), container (released). He also introduced said, DaoCloud currently available products and solutions have two, a is DaoCloud should management platform (www.daocloud.io) it is native cloud application one-stop solution; another is DaoStack enterprise service, it is enterprise docker service, including private cloud, hybrid cloud.
14:52[cloud computing data applications of intelligent transportation Forum] drops fast taxi, vice president of technology, big data and commercial career department general manager Zhu Lei: the titled "line in" the cloud "- the era of big data intelligent life" theme speech. He describes the application of large data, products, business and operations related to the case. In addition, Zhu Lei shared a taxi orders intelligent matching, from the human, material, information, services, the nature of the four points of view, and the user's loss of monitoring and early warning systems and operational strategies. Finally, he introduced the big data architecture from two aspects of business and engineering drops taxi.
14:50[platform construction and practice of cloud computing Forum] China Telecom Co Branch Technical Director Guang Xiaoming published a report entitled "field exploration and practice of" China Telecom cloud computing cloud computing speech, he said China Telecom has set up north and south two cloud data center construction covering 8 regions, 2 cloud base, 2 isolation area a total of 17 resource pool nodes (excluding the isolation zone and two bases), and share the Tianyi Yunnan North double live storage pool case and hybrid cloud application case, at the same time, he also introduced the Tianyi hybrid cloud five scenarios, including disaster recovery has been applied, the flexible research and development testing, mobile APP and virtual desktop. In the end, he also introduced the core technology index of sky wing hybrid cloud,
14:45["Internet plus" Financial Forum] ant payment service financial cloud Solutions Manager Wang Lei shared the "cloud computing" Internet plus financial empowerment. He believes that the wide use of financial cloud is in line with the trend of the financial industry, especially the inevitable result of Internet plus finance. He mentioned, financial cloud background is: financial IT application of self-control technology has risen as a national strategy; Internet banking online at any time, small frequent characteristics of traditional IT systems bring enormous challenges; more new small and medium-sized financial institutions, there is an urgent need to specialization, socialization resource support. He believes that although "Internet plus" character from "characteristics Internet plus" business, but for financial, robust, security is also very important.
14:40[cloud computing security and trusted computing Forum] 360 cloud division product director Zhang Xiaobing issued a cloud security technology architecture sharing theme speech. 2014 domestic new malicious samples, phishing sites 2 million 620 thousand, Android virus 3 million 260 thousand, 65.5% sites there are loopholes, the security of the Internet Co has led to a public security accident has led to the disclosure of information leakage. For this purpose, 360 put forward the concept of "data driven security", using QVM artificial intelligence engine, based on massive data mining, the introduction of intelligent machine learning algorithm, accurate identification of unknown malicious software. And through the large data association technology, with a variety of graphics to show the way to help security experts to analyze the unknown threats, discovery, backtracking, tracking and warning. In addition, but also to provide multi tenant isolation, cluster and company business isolation, high anti DNS service, with five network distribution security CDN service, DDoS attack prevention etc. to build secure cloud environment, and independent research and development of the Hawk Eye System for real-time scanning door.
14:30"[Internet plus China]" Financial Forum big data expert committee, Chinese Institute of electronics, cloud computing expert committee, nine one financial information services (Beijing) Co., Ltd. founder and CEO Xu Zewei shared the "Internet financial innovation based on big data". He believes that there are three asymmetric information in the whole traditional finance: information asymmetry, knowledge asymmetry, service asymmetry, and these three can rely on technology to solve the asymmetry. Based on this, he suggested: in essence, Internet banking is the integration of information flow and capital flows. He believes that the data itself does not produce value, how to analyze and use big data to help the business is the key. After that, he proposed three principles of Internet financial industry data transactions: the two sides actively submit transaction data; platform capabilities to the product is simple enough; platform operating data efficiency and liquidity.
14:25[cloud computing data applications of intelligent transportation Forum] Shanghai Beidou satellite navigation platform Co., Ltd., deputy general manager, chief engineer Zhu Feng published entitled the dipper high precision navigation and intelligent transportation "topic. First introduced the development of Beidou and related aspects, he shared the high precision navigation and service cloud, he believes that entering the market with high precision positioning of Beidou (including the entry to the field of Intelligent Transportation), promote the application of innovation with high precision, will promote the development of the Beidou industry, then, he introduced some applications of Beidou in the field of intelligent transportation, and said Lane level applications will become the Big Dipper in the field of intelligent transportation tipping point precision, promote the application of innovation of intelligent transportation, finally he introduces the technical challenges of Beidou high precision navigation, precision positioning, map (high precision Lane level) and availability, high dynamic and low cost (positioning terminal).
14:20[Cloud Computing Core Technology Architecture Forum] vice president and CTO Sun Dongfeng, vice president of foot note how to remember how to use the cloud platform architecture based on ten million mobile applications. Mobile Internet applications based on the picture, the registered users nearly DAU, 3000W million level, the date of new users 30~40%. Problems encountered MySQL+PHP traditional architecture including data bottlenecks, performance bottleneck and horizontal spreading bottleneck of the book of foot, for example, 1. A huge amount of data must pools; 2. The level of SOA extensions service cluster; 3. Three level cache, MySQL downgrade for persistence tool. Through the application of public cloud services, enough memory to achieve a dynamic and easy to expand, on-demand services, the cost of the early 1, the rapid expansion of the late 2 perfect monitoring system and operation and maintenance background; 3 professional data storage support.
14:18[cloud computing platform construction and practice Forum] Intel China Shanghai branch company big data software engineer Luo Zhongyue immediately Ruan Xingping speech, from a technical point of view the Intel mechanism is how to combine the openstack. Mainly includes two steps, (1) RSA in the OpenStack rendering; (2) the use of RSA to expand the function of OpenStack.
14:12[the cloud computing platform for building and practice Forum] Intel data center cloud platform division whole cabinet architecture market, technical manager Ruan Xingping published entitled "Intel machine cabinet architecture: for software defined Infrastructure Optimization of cloud infrastructure solutions", he said with the development of cloud technology to construct data center requirements become more and more standard, deliver more elastic, the deployment of more flexible. Intel's entire cabinet is a logical architecture for computing resources, network resources and storage resources to achieve decoupling and the need for restructuring. This scheme has been applied to redefine today's data center cloud architecture so as to realize the efficient deployment of cloud services. Finally, he also shared the combine software defined infrastructure case with openstack ironic and Intel whole cabinet architecture.
14:10[cloud platform construction and practice Forum] HYPER founder &CTO Wang Xu in his speech, said that the current is in the Docker boom, what is Docker? Docker=Container (LxC) +Layered image (aufs), both LxC and aufs is not something new, and combination has produced great effect, the reason lies in the docker's core is used as the center, to greatly simplify the overall release process, reduce the difficulty of operation and maintenance. Docker for the application of the package, so that the operating system to return to the original , the application and the operating system is completely decoupled, is a revolution in the field of operation and maintenance. At the same time, he said virtual machine is not do the application as the center and hyper is center application virtualization. Finally, he also introduced the nature of hyper, and has a container, why also virtual machine and hyper and containers were compared.
14:05[cloud computing security and trusted computing Forum] Microsoft trusted safety technology policy director chenkai entitled "building a trusted cloud computing platform" of speech, with particular reference to it technology, such as mobile, application, big data, cloud computing and other development brings an of great challenges and opportunities in the calculation. Especially in terms of trust, how to protect the data, who can access the data, where the data, how to prove that you are committed to the user has been concerned about the. To this end, Microsoft provides credible (core security, privacy protection, synthetic gauge and reliability promise), open and flexible (cross platform experience consistent, anytime, anywhere all data, scalable application development and flexible infrastructure) of the security services. As in the Azure platform, companies are free to choose the Linux system. Microsoft's commitment in terms of network security is: development, provide security products and services; customers to protect data security and privacy; assist customers and partners to protect their assets; to help in the fight against cyber crime. Technology, Microsoft in data encryption, through "the data transmission between customer and business, the data transmission between the data center, data storage, between the user end to end data protection to achieve all-round protection. Microsoft has a full set of security system in terms of security.
14:00[cloud computing architecture core technology forum (2)] spruce Beijing Century Network Technology Co., Ltd. CEO Qi Ya Xuan in the theme for the SDN in cloud computing data center application "speech mentioned, SDN simplifies network management, and provide support for the application. In the Internet, SDN is evolution, and not change, because without migrating, free expansion, at any time to retreat and spruce can be realized by OF/OF/VXLAN, such as Arista, centec; in terms of service, SDN is open, rather than closed, using open source technology and integration of third-party resources and quality assurance, spruce is realized through the nfv, such as array and NSFocus; in terms of security, SDN variable passive defense to active defense, need to go through the data acquisition, analysis, and execution.
13:55 "Internet plus" Financial Forum Secretary General of thousands of Internet financial, co-founder Wen Xuechen shared the name "trend of Internet financial reporting and analysis" keynote speech. During the period, he analyzed the "Internet plus" financial background as well as for the "Internet plus" financial future judgments and opinions. He believes that the financial industry is now facing three major aspects of the proposition: the economic downturn, institutional change, technological innovation. He shared two formats for the future development trend of the industry: Internet Securities and Internet insurance. For Internet insurance, he believes that the Internet and insurance overlay to bring new effects: the Internet will give the insurance industry to bring a new blue ocean market; product pricing has become more and more precise, new business models appear. For the development trend of Internet banking, he summed up as: high speed development, innovation integration, integration and reconstruction.
13:50[cloud computing data applications of intelligent transportation Forum] China Institute of electronic cloud computing honorary director of the Committee of experts committee, China big data expert advisory committee, Li Deyi academician of Chinese Academy of Engineering: the "intelligent driving" recognition of the theme of the opening speech. Academician Li said architecture design, module division and the interface agreed to determine the core competitiveness of the smart car industry. Subsequently, he shared the four principles of the architecture design: systems, modules, and happy programming principle, detailing the machine vision to form the driver's vision, he said, machine vision is far from all of human visual perception of the full range simulation. Finally, he shared the smart car sensor how to select and configure and machine vision.
13:40[cloud computing security and trusted computing Forum] CNPC richfit Information Technology Co., Ltd. information security, senior director of technology Huang Sheng: the enterprise private cloud safety protection practice and exploration of "theme speech. Existing enterprise information system on the basis of the use of the model to determine the current stage of enterprise private cloud will be using IaaS based, PaaS supplemented by the model. With the gradual shift to the application layer and become more complex, the traditional single border protection mechanism is difficult to ensure security. From AWS metadata penetration test and full stack attack case, we can see that the cloud computing technology changed everything, but cloud computing platform itself is a complex information system, especially virtualization management, and cloud management system using common software and the existing technology development and eventually deploys on the traditional hardware platform, is still subject to the influence of traditional software and hardware technology ecosystem. Therefore, the traditional means of attack is still a threat, or need to rely on traditional means of protection as a basis for private cloud security.
13:40[Cloud Computing Core Technology Architecture Forum] Su Ningyun business OpenStack research and development center director Zhang Xiaobin share the "OpenStack based private cloud of the road". From the beginning of May 2014, Suning Electric private cloud to thousands of physical and KVM virtual machine transformation into openstack private cloud, after a single control node openstack production cluster deployed to deploy multiple data centers, multi region, high availability cluster production changes, there are now four regions, including network and the DMZ a plurality of available domain, multi host sets (clusters), special resource pool calculated and storage intensive host resource pool.
13:36["Internet plus" Financial Forum] Chinese Cloud Computing Technology Industry Association vice chairman, China big data expert committee vice chairman, vice chairman of the Institute of electronics China Liu Rulin delivered the opening speech. He stressed that the essence of cloud computing is the service, it should be to provide the traditional product, software concepts to provide services. Financial service is also provided, in the "Internet plus" under the banner of the proposed financial is necessary. Finance is not only related to the national economy and the people's livelihood, but also related to the vital interests of the people, but also often mentioned in the cloud computing security issues. He believes that the "Internet plus" financial reform there are a lot of things, a vast world.
13:34June 5 in the afternoon, the seventh China Cloud Computing Conference cloud computing data applications of intelligent transportation forum under the auspices of the Chinese Intelligent Transportation Association executive director, vice secretary general, director of the national intelligent transportation industry technology innovation strategic alliance Long Guan Jizhen officially opened.
13:32[cloud computing security and trusted computing Forum] "cloud computing security and trusted computing forum" in the stone network CEO CipherGateway Bai Xiaoyong, under the auspices of the official open.
13:32[cloud computing platform and Building Forum] vice chairman of the Committee of China's big data experts, vice chairman of the China Institute of electronic cloud computing Expert Committee Huang Xiaoqing as chairman of the forum delivered a speech.
13:30Cloud Computing Core Technology Architecture Forum (two) officially launched, there will be 5 guests to share the OpenStack, containers, SDN and other popular technology. Forum by the China Institute of electronic cloud computing expert committee, Beihang University, Professor Qian Depei School of computer science and chair.
13:30[the cloud computing platform for building and practice Forum] June 5, cloud computing platform to build and practice forum in China Institute of electronic cloud computing expert committee, the Chinese Academy of Sciences cloud computing industry technology innovation and incubation, director of the center, Guangdong Electronic Industry Research Institute president Ji Tongkai presided over officially began.
13:30"Internet plus" Financial Forum officially opened in the nine one financial co-founder Wu Wenxiong under the auspices of. Wu Wenxiong pointed out that the moment, the traditional industry has been deeply affected by the Internet thinking, and in the Internet highly fit within the financial industry, cloud computing and big data has become a new trend.
11:30China big data expert consultant, China Institute of electronics, cloud computing vice chairman of the Committee of experts, China Academy of Engineering Li Bohu said that the industry is facing the global new technological revolution and the industrial revolution challenges: the integration of the new generation of information and communication technology and the rapid development of manufacturing industry and the depth, is causing development concept, manufacturing mode and manufacturing method and system, and major changes in the value chain; China manufacturing industry big but not strong, is facing from the lower end of the value chain to high-end, from a big manufacturing country to a powerful one, China from manufacturing to China to create a critical period of transformation; the development trend of the international manufacturing industry and the competition facing a major adjustment; China's economic development and national security put forward higher requirements on the development of the manufacturing industry. In his speech, Li Bohu academician also put forward the corresponding countermeasures for a more challenging. [details]
11:00CSA cloud security alliance founder and CEO Jim Reavis published entitled "cloud today, cloud tomorrow" of the speech. He first introduced the CSA and the cloud computing and healthy development of the importance, he said CSA currently has 64000 members and 300 corporate members, 75 branches. , he also introduced the current leaders of enterprises are using cloud of things including: cloud security agent, operation and maintenance, container technology (docker, rocket), safety analysis, integration of the networking, create local cloud security strategy etc.. So when it comes to the challenges faced by CSA in the future, he said CSA future will work to make the security of the cloud more than any other IT system. This requires CSA to develop some standards to provide some certification, he believes that security should be provided as a service to. Finally, he introduced the SDP virtual private cloud and Internet of things use cases. [details]
10:30Beijing sansec Technology Development Co., Ltd. founder and CEO Zhang Yue Gong said that shared intensive thought based on cloud resources, cloud security risks are mainly from: the boundaries of traditional security thinking failure, sealing, blocking, check, kill off guard, virtual environment, authentication and authorization, visit control more difficult, the cloud administrator has greater authority. In view of this phenomenon, ZhangYue recognized for cryptographic techniques have more advantages in the cloud security: Cryptographic technology is the theoretical foundation of; cryptography is active safety technology, in authentication, authorization, control and data protection has the advantage; cryptography and data processing closely, in line with the depth protection strategy. And in the implementation of the password technology, the hardware is undoubtedly more advantage. [details]
10:00Central South University Professor, thousands of people plan expert Chen Jianer in a keynote speech from many aspects to share the development and changes in transparency in this year. Transparent computing is a new computing model. It is different from the cloud computing, virtual desktop, emphasizing the software on the server side, the calculation of the client, the implementation of the flow of cross platform and small terminal. Cloud computing to solve the problem of data cloud, and transparent computing to solve the problem of cloud software. The main features of transparent computing are: cross software and hardware platform; security issues; easy to use and easy maintenance management; small terminals and a variety of instruments and equipment to run different large software; low cost and environmental protection. Its core key points include HTML5. To achieve cross platform; transparent (cloud) architecture, to achieve controllable service, credible, environmental protection; OS Meta, with security, cross platform characteristics. Transparent calculation of network security has three to ensure that (1) OS Meta active protection; (2) the implementation of the virus protection; (3) data stream monitoring and management. [details]
9:30Adgetec company, CEO of, a bestselling book author Professor Mark Mueller-Eberstein published entitled "cloud computing data drive business innovation and development" speech and introduces how effective use of cloud computing and data networking technology and bring opportunities to rapid changes in the world can become our business accelerator in the. Mark Mueller-Eberstein said became the winner of the new world and reduce cost is not an important issue, more innovative, more take the customer as the center, more flexible to meet the needs of customers is the key, and it maturity is crucial to corporate success indicators. Cloud computing, mobile, data, Internet of things, super app, smart city, 3D printing technology trends to us brings many new opportunities, we should use cloud computing unlimited computing power and data contains the value. [details]
9:00Hughes James (Qiu Jianyi), chief technology officer of Seagate technology senior storage, published a speech entitled "the future of cloud storage", he first introduced the ASTC (advanced storage technology alliance) technology roadmap. He predicted that in 2017, the mechanical hard disk storage density will maintain a compound annual growth rate of 30%, and eventually reached around 2025 per square inch 10Tb, which contributed to the realization of 100TB hard drive. After he introduced the object storage as well as from 2001 to 2013 13 between the object storage startups financing situation, are gradually increasing, of course, Seagate also see this trend. This is also the reason Seagate force in this field. Finally, he concluded that the future storage needs will continue to increase, open source software, including Swift, CEPH, Riak and other software defined storage will eventually reduce the cost of spending, storage API will make the development of a more simple. [details]
8:35Chinese Institute of electronics, cloud computing and vice chairman of the Committee of experts, China big data deputy director of the Committee of experts committee, vice director of committee of National Natural Science Fund, China Academy of Engineering Gawain Academy in the city of multimedia data, storage and processing technology of speech said: the new Turing Award winner is Dr. Michael Stonebraker, one of the most famous experts in the field of database. It is also proved that the big data technology is very important for the industry. Smart city as a representative of the practice of big data. First, smart city is a complex information ecosystem.; secondly, smart city based, big city data sensing network and data center; third, prerequisite for the success of the smart city is main basis for government decision-making from large data centers. [details]
8:30The seventh China Cloud Computing Conference Third Plenary Session of the committee, deputy director of China's big data experts, China electronic society, vice chairman of the Committee of experts committee Huang Xiaoqing chaired the official start.
8:25The seventh China Cloud Computing Conference third days after the morning plenary session, is the core technology of cloud computing architecture (two), the construction and practice of cloud computing platform (two), cloud computing security and trusted computing, "Internet plus" finance, big data cloud computing intelligent transportation industry should use "5 forums.