Rakuten’s First Personalized Bot & Beyond

, Masayuki Chatani, AI

    I am happy to share the news that Rakuten had introduced our first personalized chatbot based on Rakuten AI Platform. This AI Platform was announced in April, 2017 and is DevOp-ed by AI Promotion Department at Rakuten.

Read More…

Collaborative Ecosystems with Data and AI at Rakuten Institute of Technology

, Masaya Mori, AI

New Approach to Innovation – A Collaborative Ecosystem

    Data is one of the most important resources for the economy in the present age. And what’s more, AI is now bringing new value to society at a significant pace.

Read More…

AI-nization at Rakuten

, Masayuki Chatani, AI

Introduction of Rakuten AI Platform

    At Rakuten, AI Promotion Department was established in August, 2016 and accelerates the commercial deployment of AI functionalities to various Rakuten services.

Read More…

SHIFT to Swift

, Pavan Kumar, Swift

SHIFT to Swift

An Unusual Journey from Objective-C

Table of Contents

  • Who should read this document?
  • Objective-C to Learning Swift
  • About Swift
  • Why Swift?
  • Swift vs Objective-C
  • Difference
  • Swift and Objective-C Interoperability
  • Case Study
  • Conclusions

Read More…

Rakuten Technology Conference 2017

, Masaya Mori, announce

Message from Chairperson

On the opening of Rakuten Technology Conference 2017

    This year happily marks the 11th anniversary of Rakuten Technology Conference which we have been hosting since 2007 thanks to your continued support. This conference is planned and operated by Rakuten engineers each year with a theme relative to innovation trends.

Read More…

Kubernetes Traffic Routing - Part 2 of 2

, KAZUHIRO TACHIBANA, CONTAINER

Overview

    This blog explains the details of Ingress, which is one of the ways to expose Pods running in K8S cluster to outside the world, what is Ingress and it’s fundamental concept and major features.
    By the end, you will learn what you benefit from Ingress.

Read More…

Kubernetes Traffic Routing - Part 1 of 2


Overview

    This blog introduces multiple ways how Kubernetes (a.k.a K8S) routes inbound traffic from outside of K8S cluster in a practical manner. By the end, you will get some input to achieve K8S loadbalancer function as the best practice.

Read More…

Rakuten's Journey to HTTPS

, William Moore, HTTPS

Rakuten’s Journey to HTTPS – Lessons So Far

Rakuten group is currently migrating its services to HTTPS; any service that uses HTTP is being migrated to HTTPS. This includes not just websites but also our mobile applications and other services we offer, for example ad and content services. This work is still ongoing, however globally over 80% of Rakuten’s services had completed their migration by March 2017. We wanted to share our lessons for managing such a large scale migration.

Read More…

Security Team's activities with the academic world


Self Introduction

Hello, World, this is Yu-Lu “Chris” Liu, I am the Office Manager of the IT Security Engineering Office, the technical security team at Rakuten, Inc. (hereby Rakuten). I am also a member of Rakuten-CERT. I would like to share about our on-going activities with universities. We believe we are nourishing the next generation of security pioneers, and contributing to society while protecting Rakuten’s users.

Read More…

The Fight Against Cybercrime

, YOJI MASUMURA, SECURITY

Background

  In recent times, as our reliance on technology increases, so does the threat of online cybercrimes.Online Criminals are dedicated to stealing your online personal information and identification. Important details like user IDs, passwords, credit card or bank information as well as personal information are all at risk of theft from cybercriminals. These online thieves utilize phishing emails, or fraudulent websites as their methods of attack. Whether through email or the web, cybercriminals are sophisticated in making their attacks appear as if they are legitimate websites or messages. The even utilize phishing email schemes, to appear as though they are sent from Rakuten. One real-world example of this is an email that appeared to be sent from Rakuten with the email subject “Congratulations”. These cybercriminals attempted to lure the user with a promise of a prize by inputting their personal information into a fraudulent website. These falsified websites are artistically deceitful as they are often meticulously modeled after Rakuten, utilizing Rakuten’s logo, merchandise photos and descriptions taken directly from one of Rakuten’s services. These websites even feature an e-commerce shopping basket, helping to craft the illusion they are a legitimate service. Of course, no order will ever actually ship. This occurrence becoming more and more common has made all users question the safety and security of online services.

Read More…