Posts in category

Tools


How To Manage Your GraphQL APIs With Apigee

Read More

At Google, we follow a security-first philosophy to make safeguarding our clients’ and users’ data easier and more scalable, with strong security principles built into multiple layers of Google Cloud. In line with this philosophy, we want to make sure that our Container-Optimized OS adheres to industry-standard security best practices. To this end, we released …

University Targeted by ‘PrivateLoader’, a Pay-Per-Install Malware Distribution Service Darktrace, a global leader in cyber security AI, today announced that an African technology university stopped a recent cyber-attack using Darktrace AI. The attackers attempted to distribute PrivateLoader malware, a pay-per-install malware service commonly associated with crypto-mining and IP theft. The public university, which has been …

Setting up Service Level Objectives (SLOs) is one of the foundational tasks of Site Reliability Engineering (SRE) practices, giving the SRE team a target against which to evaluate whether or not a service is running reliably enough. The inverse of your SLO is your error budget — how much unreliability you are willing to tolerate. …

In a world that has to contend with constant cyber threats, this new book by author Bryson Payne is a necessary read for any open source technologist who spends time on the internet. The internet can be a dangerous place. Not a week goes by without a cyber attack taking place. Go H*ck Yourself: A Simple …

It’s 4 PM on a Friday afternoon, and your mind has already checked out for the weekend. Just as you are about to close your laptop, you see an e-mail come in from your engineering manager. You dread what lies ahead. “Our data science team needs to analyze streaming data from our Kafka cluster. They …

We’re just a few weeks away from our first-ever Google Workspace Summit (May 4, 2022), where you can discover how organizations of all sizes are building productive, secure, and flexible environments for the evolving future of work. Hear from global brands, internationally recognized security experts, Google executives, and technology partners about how they’re transforming the …

In the United States, Tax Season descends upon the country every April, requiring millions of Americans to spend hours deciphering cryptic documents and performing complex math just to figure out what they owe. Wouldn’t it be grand if there was a way for a computer to take all the relevant documents and extract out exactly …

Increased customer demands, climate concerns, and higher delivery expectations from the consumer market are just a few of the emerging macro trends that retail, logistics, and consumer packaged goods industries face. To stay competitive in this environment, businesses need to improve execution, both to serve customers and to address the onslaught of logistical and environmental …

The ability to customize applications is one of the great strengths of open source. Disabilities significantly impact people’s lives. As someone with dyspraxia and dyslexia, I can tell you that is true. One thing that mitigates my difficulties is the technology I use, such as a screen-reader and task manager. I’ve set up an ecosystem of sorts that …

This is the second part of the blog series that covers the migration story of NCR Corporation’s Card Management solution, Authentic Cards, to Google Cloud. This installment describes the Google Cloud solutions used in the architecture to strengthen the functional and technical capabilities of the product. We start again by reiterating the fact that migrating …