Learn Beam Patterns With Clickstream Processing Of Google Tag Manager Data

Roche Renews Its Selection Of Google Workspace As Its Foundational Digital Collaboration Partner

Empowering DevOps To Foster Customer Loyalty In Modern Retail With MongoDB Atlas On Google Cloud

Vodafone Provides Anonymized Mobile Phone Signal Data To Help Monitor The Spread Of COVID-19 And Inform Early Warning Systems For New Outbreaks

EllaLink Collaborates With Equinix On First-Ever High-Capacity Subsea Cable Between Latin America And Europe

Announcing The Release Of VMware Tanzu RabbitMQ 1.2

Gilead And AWS Collaborate On Development And Delivery Of New Medicines For Patients

Giving Your Legacy Applications An API Facelift

Gradle And AGP Build APIs: How To Write A Plugin

Join Us For Google Cloud Security Talks: Zero Trust Edition

Can You Make OpenStack More Interesting To Cloud Natives? Here’s How!

Illicit Coin Mining, Ransomware, APTs Target Cloud Users In First Google Cybersecurity Action Team Threat Horizons Report

Getting Started With The Security Foundations Blueprint Automation Repo

How To Hack Ethically

Edge Computing—Building Enterprise Edge Applications With Google Cloud

Navigating The Future Of Hybrid Work In APAC




Learn Beam Patterns With Clickstream Processing Of Google Tag Manager Data

Roche Renews Its Selection Of Google Workspace As Its Foundational Digital Collaboration Partner

Empowering DevOps To Foster Customer Loyalty In Modern Retail With MongoDB Atlas On Google Cloud

LATEST POSTS

By now, you may have already read through our previous blog posts covering the Security Foundations Blueprint and perused the security foundations guide. If you did, then the next question you might ask is how you could put these blueprints to use for your Google Cloud infrastructure and benefit from all of these security-focused best practices. Fortunately,  the second …

Share

Ethical hacking’s main goal is to find a system’s flaws or vulnerabilities and secure it against hackers. Hackers are always attempting to get unauthorized access to an organization’s resources to gain undeserved profits. When a company wishes to do offensive testing to uncover system flaws, they call it “ethical hacking.” The individual doing the testing …

Share

As we discussed in part 2 of this blog series, if you design your edge computing realistically, your systems may not be connected to the network all the time. But there are a variety of tools you can use to manage those edge deployments effectively, and that can even tie them back into your main …

Share

For many leaders, including myself, navigating hybrid work in APAC has opened our eyes to how the sociocultural landscape impacts the future of work. Unlike other regions, where flexible work has made inroads, navigating hybrid work in Asian markets comes with its own nuanced set of challenges. We recently partnered with Economist Impact on a …

Share

Editor’s note: Today we hear from Kenny Kon, an SRE Director at Sabre. Kenny shares about how they have been able to successfully adopt Google’s SRE framework by leveraging their partnership with Google Cloud.  As a leader in the travel industry, Sabre Corporation is driving innovation in the global travel industry and developing solutions that …

Share

Security Command Center (SCC) is Google Cloud’s security and risk management platform that helps manage and improve your cloud security and risk posture. It is used by organizations globally to protect their environments providing visibility into cloud assets, discovering misconfigurations and vulnerabilities, detecting threats, and helping to maintain compliance with industry standards and benchmarks. SCC …

Share

Simple communication principles to help keep your (t)explanations concise and totally non-condescending this holiday season. In case you hadn’t noticed, the holiday season is already upon us once again. That means people all around the world will soon begin scrambling to purchase gifts for the people they care about. Many of those gifts will involve …

Share

(Disclaimer: If you’re under the age of 12 and are reading this, no matter what anyone says, Santa Claus is real) All naughty kids get a lump of coal for Christmas but all good kids get gifts from their wishlists. Everyone knows that. On the Internet, the tables are turned, like the dystopian inverted entropy …

Share

You might have noticed a series of short videos introducing various Google Cloud certifications being published over the last few months. We created a dedicated Cloud Certifications Playlist to organize this new content to give you an easy way to scan all the Google Cloud Certifications, what they are and where to get started. In …

Share

As we explored in part one of this series, today’s edge computing environments represent an enormous opportunity for enterprises — both in terms of the new use cases they enable, as well as opportunities to reduce costs. But edge computing is also a sea change in terms of how to architect applications. When thinking about …

Share

Lockheed Martin (NYSE: LMT) and the U.S. Space Force conducted the system level Critical Design Review (CDR) for the Next Generation Overhead Persistent Infrared Geosynchronous Earth Orbit (NGG) Block 0 space program. This marks another significant step toward the first NGG satellite launch in 2025. NGG is the Space Force’s new, advanced space-based missile warning system that …

Share

We are transfixed by sports. Our eyes are drawn to the screen almost against our will, even when we’re not watching our favorite teams or athletes, because against the backdrop of our often too-predictable and prosaic lives, we have a chance to glimpse at greatness. If the word holy seems too strong, consider the frequency …

Share

Rackspace Technology® (NASDAQ: RXT), a leading end-to-end multicloud technology solutions company announced their 2020 Google Cloud Breakthrough North America Partner of the Year award was due to successful migrations of IT environments to Google Cloud for customers like, GoHenry, Mrs. T’s and Eagle Eye. GoHenry Rackspace Technology supported GoHenry with its global growth plans by …

Share

Guest post originally published on Snapt’s blog by Iwan Price-Evans In this data-driven world, we capture data for just about everything in our software and hardware. User data, user behaviors, events, data flows, and the inner workings of our servers, virtual machines (VMs), and containers are all recorded. Applications expose ever more data to DevOps and IT …

Share






MENU

Back