Unlike traditional industrial optimization, all agents in a multi-agent system are replaceable by each other and their working process is non-linear, which makes it difficult to directly model the system efficiency. The system efficiency is often approached indirectly by adjusting task assignment and moving paths and optimizing the total task route. However, in practice, we find that the task route is poorly related to system efficiency. With limited cost budget, the number of agents is often limited. When the task route is optimized, some agents are overburdened while some others are idle.

Therefore, based on the practice and thinking of…

By Raghav K.

Enterprise networks have their share of complexities and advantages. In a distributed setting, there are different factors to counter and leverage. Networks have faced infiltration attempts for years. Barricading as a preventive measure helped keep networks and resources secure. While that was not a comprehensive approach to maintaining security, infrastructure integrity, and solutions, it was the only line of defense against malicious attacks.

After the introduction of cloud-native, containers based on Kubernetes have helped enterprises achieve their true potential. Cloud-native microservices have provided many advantages for building large applications that require a faster development to deployment cycle…

By Raghav K.

In Part 1 of this series, I gave an overview of zero-trust security architecture. The cloud-native architecture has responded to industry demands for software delivery implementation that automates and channels builds to release and helps with management. Containerization is the answer. Kubernetes with cloud-native architecture has led to a significant shift for organizations adopting the cloud-native approach to build business applications.

The concepts of DevOps also lacked a total end-to-end security solution that had a significant impact on services. DevSecOps was introduced to overcome the security shortcomings of DevOps. …

By Raghav K.

A decade has passed since the zero-trust security model was introduced. Today, in the ever-changing technological overlays, security is a paramount concern for organizations worldwide. Digital transformation has led to a major shift in the standard operating policies for organizations in all industries with practices ranging from multiple business types.

Enterprises have been implementing the zero-trust security architecture rapidly. After a decade, zero-trust architecture has moved to a more mainstream zone, with enterprises depending on the model to protect the most sensitive systems. You may ask why? Attacks are becoming more sophisticated. …

By Wang Siyu (Jiuzhu)


OpenKruise is an open-source cloud-native application automation management suite from Alibaba Cloud. It is currently a Sandbox project hosted under the Cloud-Native Computing Foundation (CNCF). Based on years of Alibaba’s experience in container and cloud-native technologies, OpenKruise is a Kubernetes-based standard extension component widely used in Alibaba’s internal production environment. It follows the standards of the upstream community with the technical concepts and best practices for large-scale Internet scenarios.


OpenKruise released v0.8.0 on March 4, 2021. Please visit this website to view the changelog. This article gives an overview of the latest version.

Kruise-Daemon Component Added

If you are…

By Raghav K.

Today, the world is highly interconnected and can count on seamless communication and data processing to make life easier. Enterprises are implementing solutions using technologies that accelerate growth and provide easy access to flexible, scalable, and practically unlimited computing, storage, security, and network solutions. Edge computing is the next big thing within the IT infrastructure. Its high-performance approach differs completely from how data is processed by a traditional data center or the cloud.

What Is Edge Computing and How Does It Work?

Edge computing technology is based on the concepts of distributed computing that incorporates edge devices (or nodes) to bring intelligence into the concept of…

To learn more about how to store, manage and process your content with ease, download How to Ready Your Content for Today’s Media Market whitepaper today.

Digitization has hit the media industry, hard. Consumers now demand high-quality content, available without any restrictions and across any device, location and platform. This places media organizations under tremendous pressure to store, manage and process their content, fast.

But traditional content management tasks are highly resource-intensive — from both a data and human perspective. This is where a cloud-based solution can help, providing you with intuitive solutions including scalable storage options and fast content…

By Xiao Hansong (Xiaokai)

During Java development, if different JAR packages depend on different versions of some common JAR packages, errors may occur during running because the loaded class is not the same as expected. How can we avoid this situation? This article analyzes the causes of JAR package conflicts and the implementation principles of class isolation and shares two methods for implementing custom class loaders.

1. What Is Class Isolation?

If you write enough Java code, this will definitely happen. The system has introduced a new middleware JAR package. Everything is normal during compiling, but an error will be reported as soon as it…

Many data scientists, analysts, and general business intelligence (BI) users rely on interactive Structured Query Language (SQL) queries to explore data. Flink SQL, as a core Flink module, functions as a distributed SQL query engine. Flink SQL allows users to perform union queries on disparate data sources and write complex SQL queries for data analysis in one single program. Flink SQL features high query efficiency with the integration of cost-based optimizers (CBOs), column-oriented storage, and code generation. The fault tolerance mechanism and high scalability of the Flink runtime architecture also allow Flink SQL to easily process large amounts of data.

By Fengshui

A micro frontend brings many benefits and challenges. How can we access a micro frontend based on the current technology stack? What common functions are required? How can we resolve the plug-in mechanism? This article describes a micro frontend access solution and implementation details.


The micro frontend concept has reached news headlines several times in China, and the problems it solves are prominent. However, these challenges mentioned in the micro frontend are significant when our team maintains projects.

“The micro frontend is some framework with some technology.”

This statement shows limitations, which can be assumed as opinions of…

Alibaba Cloud

Follow me to keep abreast with the latest technology news, industry insights, and developer trends.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store