Best Practices For Securing Kubernetes Deployments
Although Kubernetes is a powerful container orchestration platform, its complexity and its adoption makes it a prime target for security attacks. We’ll go over some of the best practices for…
Share
Frontier Model Security
As the capabilities of frontier artificial intelligence models continue to increase rapidly, ensuring the security of these systems has become a critical priority. In our previous posts, we’ve…
Share
5 Effective Tactics For Ecommerce Link Building
Ecommerce link building involves acquiring links from other websites to increase your website’s authority and visibility in search engine results pages (SERPs). This process can also…
Share
The Agile Mindset: A Path to Personal Fulfillment and Growth
In 2016, Professor Julian Birkinshaw, a distinguished expert in Strategy and Entrepreneurship at the London Business School, acknowledged that we had entered the Agile age. The Agile…
Share
Tricentis Launches Quality Engineering Community ShiftSync
New community to serve as destination hub for professionals passionate about the development of high-quality, high-performing, and highly secure software AUSTIN, TEXAS – May 23, 2023…
Share
5 Open Ways To Help UX Designers And Developers Collaborate Better
Designing with open decisions can help increase collaboration between user experience and dev teams. Ideally, designers have a good relationship with their product team and users. However, the…
Share
Intel, CrowdStrike And Zscaler Unveil Compatible Solutions For Zero Trust Security
Zero trust is maturing as a mainstream security best practice to minimize uncertainty by enforcing accurate, least-privileged access to information. This has become particularly relevant over…
Share
A Search Engine For Creative Commons
Find images and audio with open licenses. Are you looking for content that is openly licensed that you can reuse? Then you might be interested in Openverse. Openverse is an innovative…
Share
5 Priorities That Cut Cloud Costs And Improve IT Ops
With infrastructure as code, virtual desktop infrastructure, and a proactive approach to incident management, you can help keep cloud costs reasonable. During the past decade, companies have…
Share
How AI Can Improve Digital Security
AI is having a transformative moment and causing profound shifts in what’s possible with technology. It has the power to unlock the potential of communities, companies, and countries around…
Share
Pythonic Techniques For Handling Sequences
Sequences and Collections are an integral part of any programming language. Python particularly handles them uniformly, i.e. any type of sequence from Strings and XML elements to arrays,…
Share
A 10-Step Guide For A Successful Hackathon
Follow this blueprint for planning, hosting, and managing a successful hackathon. Hackathons are easy. How much thought do you need to put into them anyway? Just set a date, and people will…
Share
Why We Advocate For Workload-Centric Over Infrastructure-Centric Development
Score envisions a developer and workload-centric approach to improve developer productivity and experience. In this article, we take a deeper look at the “why” and see this as a starting point…
Share
Building Out Your Support Insights Pipeline
Getting into the details We wrote previously about how we used clustering to connect requests for support (in text form) to the best tech support articles so we could answer questions faster…
Share
A Better Way To Pass Technical Interviews
To LeetCode or not to LeetCode? What if you don’t want to practice 100s of coding questions before your next coding interview? There is a part of me that dislikes coding interviews, primarily…
Share
Archive Data: Old Or Historic?
To be “historic,” an event or place must be associated with a degree of importance that makes it worthy of notice, study, or preservation. To be “old” merely means something has been around a…
Share
Workflows Patterns And Best Practices – Part 2
This is part 2 of a three-part series of posts, in which we summarize Workflows and service orchestration patterns. You can apply these patterns to better take advantage of Workflows and…
Share
Understanding Transactional Locking In Cloud Spanner
Cloud Spanner is a fully managed relational database with unlimited scale, strong consistency, and up to 99.999% availability. It is designed for highly concurrent applications that read and…
Share
Why Should Game Companies Choose Cloud Spanner To Power Their Games
Organizations globally use Cloud Spanner, because of its unlimited scale, strong consistency, and up to 99.999% of availability. In particular, game companies, like Embark Studios use Spanner…
Share
People In The Cloud Native Maturity Model
Community post by Annalisa Gennaro of the Cartographos Working Group This blog post takes a closer look at the People section of the Cloud Native Maturity Model (CNMM). To learn more visit…
Share
Google Public Sector Announces Continuity-Of-Operations Offering For Government Entities Under Cyberattack
Cyberattacks that target our government are all too common these days. From SolarWinds, to hacks against widely used email servers, to attacks against the defense industrial base, we know that…
Share
Cloud Storage Gets Better System Observability With Customizable Monitoring Dashboards
Google Cloud Storage is a managed service for storing unstructured data and allowing retrieval of the data as often as users like. Because Cloud Storage is a fundamental and highly utilized…
Share
CISO Survival Guide: How Financial Services Organizations Can More Securely Move To The Cloud
It’s not just children and adults who face excitement and nervousness on the first day of school. The first day in the cloud can be daunting for financial services organizations, too. Chief…
Share
3 Best Practices To Reduce Application Downtime With Google Cloud’s API Monitoring Tools
How many times have you closed an application when you encounter the “spinning wheel of death” (a melodramatic way of saying an application that is taking too long to load)? In today’s digital…
Share
When Should I Use Cloud Armor?
Google Cloud Armor is a well known enterprise-grade DDoS defense and web application firewall service that provides additional security for your applications and websites running on Google…
Share
Seven Zero Trust Rules For Kubernetes
Every day, the drumbeat to adopt Zero Trust in tech infrastructure amplifies. Like any cybersecurity buzzword, Zero Trust is both more and less than it seems. As more, it holds an enduring…
Share
How Wayfair Partnered With Google Cloud To Upskill Their Engineers
Over the past ten years, Wayfair, an online furniture and home goods retailer, experienced exceptional growth, with online shoppers engagement (i.e., website, app). This surge in traffic and…
Share
Practicing The Principle Of Least Privilege With Cloud Build And Artifact Registry
People often use Cloud Build and Artifact Registry in tandem to build and store software artifacts – these include container images, to be sure, but also OS packages and language…
Share
Zero Trust For Cloud-Native Workloads: Mitigating Future Log4j Incidents
In my previous blog post, I introduced the brief history of zero trust, the core pillars of a zero-trust model, and how to build a zero-trust model for cloud-native workloads. In this blog…
Share
A Deep Dive Into Spanner’s Query Optimizer
Spanner is a fully managed, distributed relational database that provides unlimited scale, global consistency, and up to five 9s availability. It was originally built to address Google’s needs…
Share
Accelerate Speed To Insights With Data Exploration In Dataplex
Data Exploration Workbench in Dataplex is now generally available. What exactly does it do? How can it help you? Read on.Imagine you are an explorer embarking on an exciting expedition. You…
Share
Building Scalable Real Time Applications With Firestore
Firestore is a serverless, fully managed NoSQL document database. In addition to being a great choice for traditional server-side applications, Firestore in Native Mode also offers a…
Share
Cloud Logging Pricing For Cloud Admins: How To Approach It & Save Cost
Flexera’s State of the Cloud Report 2022 pointed out that significant cloud spending is wasted, a major issue that is getting more critical as cloud costs continue to rise. In the current…
Share
Backup & Disaster Recovery Strategies For BigQuery
BigQuery is increasingly becoming the landing zone of choice for many customers’ data in Google cloud. BigQuery is designed to provide high data durability. Data is written synchronously…
Share
Cloud Bigtable Schema Tips: Key Salting
Cloud Bigtable is a low-latency, high-throughput NoSQL database. With NoSQL, you want to design a schema that can scale and adapt to your business growth. When working with large sets of data…
Share
Rethinking Your VM Strategy With Spot VMs
Organizations globally choose Google Cloud as their transformation partner to accelerate their business and digital transformation because of our leadership in sustainability, AI/ML, data…
Share
Manage Storage Costs By Automatically Deleting Expired Data Using Firestore Time-To-Live (TTL)
We are thrilled to announce that we have added time-to-live (TTL) support for both Firestore Native and Datastore mode! Use Firestore TTL policies to remove out-of-date data from the database.…
Share
If You Are Using ‘kubectl’, You Are Probably Doing It Wrong
Like many people, I managed my first cluster using the kubernetes cli (aka kubectl). I deployed a handful of ‘objects’ such as deployments, secrets, configmaps, and services by directly…
Share
Cloud Wisdom Weekly: 3 Ways Serverless Can Save Money And Accelerate App Development
“Cloud Wisdom Weekly: for tech companies and startups” is a blog series dedicated to answering common questions our tech and startup customers ask us about leveraging data and building apps…
Share
Cloud Wisdom Weekly: 4 Ways AI/ML Boosts Innovation And Reduces Costs
“Cloud Wisdom Weekly: for tech companies and startups” is a new blog series we’re running this fall to answer common questions our tech and startup customers ask us about how to build apps…
Share
Take Your ML Models From Prototype To Production With Vertex AI
You’re working on a new machine learning problem, and the first environment you use is a notebook. Your data is stored on your local machine, and you try out different model architectures and…
Share
Implementing Observability For Always-On Ecommerce Experience
In today’s Digital age, the emphasis continues to be on automation and improving business processes, employee productivity and customer experiences to meet the ever changing business and…
Share
Cloud Wisdom Weekly: 6 Tips To Optimize Data Management And Analytics
“Cloud Wisdom Weekly: for tech companies and startups” is a new blog series we’re running this fall to answer common questions our tech and startup customers ask us about how to build apps…
Share
Advanced Topic Modeling Tutorial: How to Use SVD & NMF in Python
In the context of Natural Language Processing (NLP), topic modeling is an unsupervised learning problem whose goal is to find abstract topics in a collection of documents. Topic…
Share
Optimizing Terabyte-Scale PostgreSQL Migrations To Cloud SQL With Searce
Google Cloud allows you to move your PostgreSQL databases to Cloud SQL with Database Migration Service (DMS). DMS gives you the ability to replicate data continuously to the destination…
Share
Spatial Clustering On BigQuery – Best Practices
Most data analysts are familiar with the concept of organizing data into clusters so that it can be queried faster and at a lower cost. The user behavior dictates how the dataset should be…
Share
How To Avoid Cloud Misconfigurations And Move Towards Continuous Compliance
Security is often seen as a zero-sum game between “go fast” or “stay secure.” We would like to challenge this school of thought and introduce a framework to change that paradigm to a “win-win…
Share
How A Vulnerability Exploitability eXchange Can Help Healthcare Prioritize Cybersecurity Risk
Diagnosing and treating chronic pain can be complex, difficult, and full of uncertainties for a patient and their treating physician. Depending on the condition of the patient and the…
Share
Best Practices Of Migrating Hive ACID Tables To BigQuery
Are you looking to migrate a large amount of Hive ACID tables to BigQuery? ACID enabled Hive tables support transactions that accept updates and delete DML operations. In this blog, we will…
Share
Controlling Your BigQuery Costs
Are you worried about controlling your BigQuery costs across multiple projects? In this blog, you will learn about the different guardrails BigQuery provides to limit costs, and monitor…
Share
Building Security Guardrails For Developers With Google Cloud
Organizations across the globe are using the cloud to drive innovation. Developers are using cloud technology as the engine to test new ideas, fail fast, and automate scalability. Innovation…
Share