Cloud Computing

Your guide to Provisioned Throughput (PT) on Vertex AI

When AI agents make thousands of decisions a day, consistent performance isn’t just a technical detail — it’s a business requirement.  Provisioned Throughput (PT) solves this by giving you reserved resources that guarantee capacity and predictable performance. To help you scale, we are updating PT on Vertex AI with three key improvements: Model diversity: Run […]

Your guide to Provisioned Throughput (PT) on Vertex AI Read More »

Unlocking enterprise data to accelerate agentic AI: How Ab Initio does it

Your AI agents are only as good as the data behind them. For enterprise teams building agentic AI, that’s both the opportunity and the core question: How do you give Gemini and other AI models access to accurate, well-documented data when that data lives across dozens of systems, from modern cloud services to legacy mainframes?

Unlocking enterprise data to accelerate agentic AI: How Ab Initio does it Read More »

Unlocking enterprise data to accelerate agentic AI: How Ab Initio does it

Your AI agents are only as good as the data behind them. For enterprise teams building agentic AI, that’s both the opportunity and the core question: How do you give Gemini and other AI models access to accurate, well-documented data when that data lives across dozens of systems, from modern cloud services to legacy mainframes?

Unlocking enterprise data to accelerate agentic AI: How Ab Initio does it Read More »

Using the Neo4j Extension in Gemini CLI

Gemini CLI integrates Gemini’s reasoning capabilities directly into your terminal. As graph databases like Neo4j become foundational AI infrastructure—turning raw data into actionable knowledge—their convergence with Gemini CLI offers a powerful new solution. By leveraging the Model Context Protocol (MCP), the Neo4j Gemini CLI extension bridges Gemini’s reasoning engine with the structured “memory” of a

Using the Neo4j Extension in Gemini CLI Read More »

Announcing America-India Connect and new investments to advance global AI access

AI is poised to accelerate progress at an unprecedented rate — but only if we democratize access to it from the start. Today, Google is announcing new investments in digital infrastructure and skilling initiatives designed to increase connectivity, accelerate economic growth, and deepen resilience in India and around the world. Expanding AI connectivity across four

Announcing America-India Connect and new investments to advance global AI access Read More »

Introducing Agent Plugins for AWS

Deploying applications to AWS typically involves researching service options, estimating costs, and writing infrastructure-as-code tasks that can slow down development workflows. Agent plugins extend coding agents with specialized skills, enabling them to handle these AWS-specific tasks directly within your development environment. Today, we’re announcing Agent Plugins for AWS (Agent Plugins), an open source repository of

Introducing Agent Plugins for AWS Read More »

New BigQuery global queries let you explore distributed data with a single SQL statement

In a global economy, data is generated and stored all over the world. For a multinational corporation, customer data may reside close to headquarters in the US, while transaction logs are split between Europe and Asia, helping to meet performance, regulatory compliance, and data sovereignty needs. However, this creates a challenge: How do you get

New BigQuery global queries let you explore distributed data with a single SQL statement Read More »

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Written by: Peter Ukhanov, Daniel Sislo, Nick Harbour, John Scarbrough, Fernando Tomlinson, Jr., Rich Reece Introduction  Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSSv3.0 score of 10.0. Analysis of incident response engagements revealed that UNC6201, a

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day Read More »