Networking

A Focus On Network Connectivity Use Cases In The Cloud
Enterprises today have a very broad mix of networks — from SD-WANs, dedicated WANs such as MPLS, cloud interconnects, to VPNs. At the same time, they’re moving those WANs to the cloud to take advantage of faster turn-up, lower cost, and increased feature velocity. As workloads migrate to the cloud and multi-cloud environments, we believe …

10 Considerations To Help You Design Cloud Networks
Designing your cloud network can be a critical part of your cloud journey. How the final design looks will depend on your own use case. Thinking ahead can save you some time and help avoid potential issues in the future. These ten tips provide some insight into helping you design a better cloud network architecture …

Introducing Media CDN—the Modern Extensible Platform For Delivering Immersive Experiences
The digital media and entertainment industry is experiencing dramatic growth, as audiences migrate to online experiences and content providers seek to deliver new and innovative content. According to The Global Internet Phenomena Report, streaming video accounted for 53.7% of internet bandwidth traffic, up by 4.8% from a year ago. This rapid growth of over-the-top content …

IP Addressing Options In Google Cloud: Networking Basics
In this blog we’ll be visiting the topics of IP addresses and subnetting on Google Cloud. IP addressing and subnetting can be confusing to many, but addressing is a very important requirement in your network. An IP address is a unique identifier for a network and a host. To separate an IP address into network …

Voice Trading In The Cloud — Digital Transformation Of Private Wires
With our experience working with financial services customers, we recently partnered with a large interdealer broker to co-innovate on the modernization of their core voice trading infrastructure. Their motivation was simple: they wanted traders to be able to work remotely, make it easy to onboard new locations with resilience and scale, and to enable new …

Google Cloud’s Security And Resiliency Measures For Customers And Partners
As the tragic Russian invasion of Ukraine continues, we want to provide customers and partners with an update on how Google Cloud is providing resources for organizations, protecting against potential cyberattacks, and delivering network resiliency. We continue to work closely with U.S. and international officials in our approach—and have undertaken several steps across Google to …

Standardize Traffic Management: Service Directory And Traffic Director
Modern services are built on a mix of heterogeneous infrastructure platforms, and this mix is constantly changing as services migrate to the cloud to simplify operations. When you migrate services to the cloud, or move from legacy technologies to newer ones, it can involve a cumbersome reconfiguration of key components like load balancing and traffic …

Control Access To Microservices With GRPC And Traffic Director
We are excited to announce Traffic Director’s general availability of client authorization by proxyless gRPC services. This release, in conjunction with Traffic Director’s capability for managing mutual TLS (mTLS) credentials for Google Kubernetes Engine (GKE), enables customers to centrally manage access between workloads using Traffic Director. With the new authorization support, you can explicitly …

How To Publish Applications To Our Users Globally With Cloud DNS Routing Policies?
When building applications that are critical to your business, one key consideration is always high availability. In Google Cloud, we recommend building your strategic applications on a multi-regional architecture. In this article, we will see how Cloud DNS routing policies can help simplify your multi-regional design. As an example, let’s take a web application that …

How To Hack Ethically
Ethical hacking’s main goal is to find a system’s flaws or vulnerabilities and secure it against hackers. Hackers are always attempting to get unauthorized access to an organization’s resources to gain undeserved profits. When a company wishes to do offensive testing to uncover system flaws, they call it “ethical hacking.” The individual doing the testing …