How To Manage Your GraphQL APIs With Apigee

Read More

AgroScout Improves Development And DevOps With Oracle Cloud Native Services

Read More

Storing state with containers Kubernetes has become the preferred choice for running not only stateless workloads (e.g., web services) but also for stateful applications (e.g., e-commerce applications). According to the Data on Kubernetes report, over 70% of Kubernetes users run stateful applications in containers. Additionally, there is a rising trend of managed data services like MariaDB and Databricks using Google …

Editor’s note: This blog was originally published by Siemplify on April 29, 2021. With cybersecurity moving from backroom to boardroom, and the societal imperative that workplace cultures renounce toxicity for more sensitivity and tolerance, there is a rapidly-growing call for empathy to pervade the infosec function, from the CISO all the way down. Within security …

As we shared at the beginning of the year, we are making significant investments in Google Cloud Marketplace to accelerate growth for our customers and partners. This includes new technical capabilities that provide the purchasing flexibility and choice our enterprise customers need when buying software from Google Cloud partners through Marketplace. Private Offers are now …

We launched session affinity for Cloud Run services this June (in preview). You can use session affinity to improve responsiveness of services that store client-specific state on container instances.  In this blog, I’ll dive deeper into when session affinity is useful for you and I’ll show you how it works on Cloud Run. With session …

In security, the three “A”s of controlling access are Authentication (Who is the user?), Authorization (What is the user allowed to do?), and Auditing (What are they doing?) Going a bit deeper: Authentication (AuthN): Authentication is the process of identifying a user through a private form of verification (for example, a password, a certificate, a …

The cybersecurity industry is faced with the tremendous challenge of analyzing growing volumes of security data in a dynamic threat landscape with evolving adversary behaviors. Today’s security data is heterogeneous, including logs and alerts, and often comes from more than one cloud platform. In order to better analyze that data, we’re excited to announce the …

Developers and data scientists are increasingly turning to Google Kubernetes Engine (GKE) to run demanding workloads like machine learning, visualization/rendering and high-performance computing, leveraging GKE’s support for NVIDIA GPUs. In the current economic climate, customers are under pressure to do more with fewer resources, and cost savings are top of mind. To help, in July, we launched a GPU …

Last year, we launched Eventarc, a unified eventing platform with 90+ sources of events from Google Cloud, helping make it a more programmable cloud. We recognize that most Google Cloud customers utilize a myriad of platforms to run their business, from internal IT systems, to hosted vendor software and SaaS services. Creating and maintaining integrations …

As enterprise and public sector cloud adoption continues to accelerate, having an accurate picture of who did what in your cloud environment is important for security and compliance purposes. Logs are critical when you are attempting to detect a breach, investigating ongoing security issues, or performing forensic investigations. These five must-know Cloud Logging security and compliance features …

Today’s consumers expect incredible feats of speed and service delivered through easy-to-use apps and personalized interactions. Modern conveniences have taught consumers that their experience is paramount—no matter the size of the company, complexity of the problem, or regulations in the industry. “Cloud-native technologies empower organizations to build and run scalable applications in modern, dynamic environments …