In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
I. Portrait of the crowd
1. What is the portrait of big data?
Crowd portraits establish a user model and extract the targeted analysis of typical target users by collecting a series of real data, such as user behavior characteristics, age characteristics, user scenes, regional characteristics, target motivation and so on.
two。 What is the function of the crowd portrait big data?
Most of the existing crowd portraits are only used for marketing activities, through the existing establishment of crowd portraits, explore potential user resources, and then targeted marketing for this specific group. In addition, it is also a common means to analyze the product management situation on the basis of crowd portraits. However, the crowd portrait does not seem to have been well applied in engineering practice.
Second, Tencent big data-- Tianyu system
1. What is the Tianyu system?
Tianyu Business Security (Business Security Protection) builds user profiles based on Tencent's massive big data analysis of user behavior, combined with the risk level of the account, and relies on Tencent's internal anti-brushing architecture to prevent vicious behaviors such as "econnoisseur" brushing activities and * bumping into libraries.
two。 Background
With the rapid development of e-commerce industry in recent 1 ~ 2 years, a variety of start-up companies have sprung up like bamboo shoots after a spring rain. Businesses use various forms of subsidies to obtain users and cultivate users' consumption habits.
But everything has two sides, high subsidies and concessions also gave birth to "econnoisseur" at the same time.
The behavior of "econnoisseur" is only one step away from fraud, and their existence seriously destroys the purpose of the activity and encroaches on the resources of the activity, so that normal users can not enjoy the direct benefits of the activity.
Third, the defense logic of Tiantian system.
The real-time system is developed and implemented by CramCraft +, and all the data is stored in shared memory. Compared with other systems, the security system has its own special situation. Here, the idea of "lossy" is used to realize it, which greatly reduces the development cost and difficulty.
Data consistency
Multiple machines, using shared memory, how to ensure data consistency?
In fact, security policies do not need to be strong data consistency.
From the perspective of security itself, the risk itself is a probability value, uncertain, so there is a little data inconsistency, does not affect the overall situation.
Related link: reveal the tip of Tencent big data iceberg-Tencent Tianyu system
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.