Talk:Alibaba Cloud
This is the talk page for discussing improvements to the Alibaba Cloud article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Individuals with a conflict of interest, particularly those representing the subject of the article, are strongly advised not to directly edit the article. See Wikipedia:Conflict of interest. You may request corrections or suggest content here on the Talk page for independent editors to review, or contact us if the issue is urgent. |
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
The following Wikipedia contributors may be personally or professionally connected to the subject of this article. Relevant policies and guidelines may include conflict of interest, autobiography, and neutral point of view.
|
Recent deal
editWould be good to add the recent deal https://www.techrepublic.com/article/why-alibabas-deal-with-mariadb-might-open-up-a-new-front-in-the-cloud-wars/ — Preceding unsigned comment added by 1.129.110.14 (talk) 02:26, 5 October 2018 (UTC)
Bulletproof hosting
editShould we mention they provide bulletproof hosting for spammers? // Liftarn (talk) 11:48, 29 January 2019 (UTC)
- of course! — Preceding unsigned comment added by 87.91.51.235 (talk) 08:46, 1 June 2019 (UTC)
Some questions
editWhat is the meaning of Alyun?
Is there privacy issues since the server is in China? Hacking issues? If not, what are the guarantees?
What are the trial offers?— Preceding unsigned comment added by 87.91.51.235 (talk) 08:45, 1 June 2019 (UTC)
Please consider incorporating material from the above draft submission into this article. Drafts are eligible for deletion after 6 months of inactivity. ~Kvng (talk) 00:46, 18 November 2019 (UTC)
Promotional article
editA lot of PR about how they protect their own networks, but no information about how so many attacks against other networks originate from it... Sources are difficult to find, though (in case someone can help with that, I would help to expand the article). —PaleoNeonate – 11:00, 12 December 2021 (UTC)