Cloud Computing

Unico builds cutting-edge IDTech with Spanner Vector Search

Unico is a leading biometric verification and authentication company addressing the global challenges of identity management and fraud prevention.  With nearly two decades of experience in the Brazilian market, Unico has become a reliable supplier to over 800 companies, including four of the top five largest banks and leading retailers. Since 2021, Unico has facilitated […]

Unico builds cutting-edge IDTech with Spanner Vector Search Read More »

Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave

We’re pleased to announce that Google has been recognized as a Leader in The Forrester Wave™: Data Security Platforms, Q1 2025 report. We believe this is a testament to our unwavering commitment to providing cutting-edge data security in the cloud.  In today’s AI era, comprehensive data security is paramount. Organizations are grappling with increasingly sophisticated

Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave Read More »

Building and Debugging .NET Lambda applications with .NET Aspire (Part 1)

In a recent post we gave some background on .NET Aspire and introduced our AWS integrations with .NET Aspire that integrate AWS into the .NET dev inner loop for building applications. The integrations included how to provision application resources with AWS CloudFormation or AWS Cloud Development Kit (AWS CDK) and using Amazon DynamoDB local for

Building and Debugging .NET Lambda applications with .NET Aspire (Part 1) Read More »

Use Gemini 2.0 to speed up document extraction and lower costs

A few weeks ago, Google DeepMind released Gemini 2.0 for everyone, including Gemini 2.0 Flash, Gemini 2.0 Flash-Lite, and Gemini 2.0 Pro (Experimental). All models support up to at least 1 million input tokens, which makes it easier to do a lot of things – from image generation to creative writing. It’s also changed how

Use Gemini 2.0 to speed up document extraction and lower costs Read More »

Best practices for achieving high availability and scalability in Cloud SQL

Cloud SQL, Google Cloud’s fully managed database service for PostgreSQL, MySQL, and SQL Server workloads, offers strong availability SLAs, depending on which edition you choose: a 99.95% SLA, excluding maintenance for Enterprise edition; and a 99.99% SLA, including maintenance for Enterprise Plus. In addition, Cloud SQL offers numerous high availability and scalability features that are

Best practices for achieving high availability and scalability in Cloud SQL Read More »

How to calculate your AI costs on Google Cloud

What is the true cost of enterprise AI? As a technology leader and a steward of company resources, understanding these costs isn’t just prudent – it’s essential for sustainable AI adoption. To help, we’ll unveil a comprehensive approach to understanding and managing your AI costs on Google Cloud, ensuring your organization captures maximum value from

How to calculate your AI costs on Google Cloud Read More »

Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions

Written by: Joshua Goddard Executive Summary Rosetta 2 is Apple’s translation technology for running x86-64 binaries on Apple Silicon (ARM64) macOS systems. Rosetta 2 translation creates a cache of Ahead-Of-Time (AOT) files that can serve as valuable forensic artifacts. Mandiant has observed sophisticated threat actors leveraging x86-64 compiled macOS malware, likely due to broader compatibility

Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions Read More »

Cloud CISO Perspectives: Prepare early for PQC to be resilient against tomorrow’s cryptographic threats

Welcome to the second Cloud CISO Perspectives for February 2025. Today, Christiane Peters from our Office of the CISO explains why post-quantum cryptography may seem like the future’s problem, but it will soon be ours if IT doesn’t move faster to prepare for it. Here’s what you need to know about how to get your

Cloud CISO Perspectives: Prepare early for PQC to be resilient against tomorrow’s cryptographic threats Read More »