Cloud Computing

Introducing the new Google Cloud Trace Explorer

Distributed tracing is a critical part of an observability stack, letting you troubleshoot latency and errors in your applications. Cloud Trace, part of Google Cloud Observability, is Google Cloud’s native tracing product, and we’ve made numerous improvements to the Trace explorer UI on top of a new analytics backend. The new Trace explorer page contains: […]

Introducing the new Google Cloud Trace Explorer Read More »

How partners are unlocking scalable audio transcription with Gemini

From transcribing customer calls and meetings, to analyzing research interviews and creating accessible content, audio transcription plays a vital role in extracting insights from spoken data. Our partners are collaborating with clients across industries to implement transcription solutions that enhance efficiency, accessibility, and data-driven decision-making. Traditional audio transcription methods, such as manual transcription or basic

How partners are unlocking scalable audio transcription with Gemini Read More »

WellRight modernizes to an event-driven architecture to manage bursty and unpredictable traffic

WellRight is a leading comprehensive corporate wellness platform provider that helps organizations and employees drive meaningful outcomes through personalized wellness programs. The platform increases engagement and benefit utilization by delivering engaging challenges across multiple dimensions of wellness, from physical activities like step tracking to mental health initiatives and team-building exercises. In this post, we share

WellRight modernizes to an event-driven architecture to manage bursty and unpredictable traffic Read More »

Phishing Campaigns Targeting Higher Education Institutions

Written by: Ashley Pearson, Ryan Rath, Gabriel Simches, Brian Timberlake, Ryan Magaw, Jessica Wilbur Overview Beginning in August 2024, Mandiant observed a notable increase in phishing attacks targeting the education industry, specifically U.S.-based universities. A separate investigation conducted by the Google’s Workspace Trust and Safety team identified a long-term campaign spanning from at least October 2022,

Phishing Campaigns Targeting Higher Education Institutions Read More »

Optimizing image generation pipelines on Google Cloud: A practical guide

Generative AI diffusion models such as Stable Diffusion and Flux produce stunning visuals, empowering creators across various verticals with impressive image generation capabilities. However, generating high-quality images through sophisticated pipelines can be computationally demanding, even with powerful hardware like GPUs and TPUs, impacting both costs and time-to-result. The key challenge lies in optimizing the entire

Optimizing image generation pipelines on Google Cloud: A practical guide Read More »

Introducing Cloud DNS public IP health checks, for more resilient multicloud deployments

Organizations use multiple clouds to gain agility, use resources more efficiently, and leverage the strengths of different cloud providers. However, managing application traffic across these environments is challenging. To support predictable services, organizations need a system that intelligently selects the optimal backend for each request. The selection takes into account both the real-time health of

Introducing Cloud DNS public IP health checks, for more resilient multicloud deployments Read More »

Announcing quantum-safe digital signatures in Cloud KMS

The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential highlights the need for developers to build and implement quantum-resistant cryptography now. Fortunately, post-quantum cryptography (PQC)

Announcing quantum-safe digital signatures in Cloud KMS Read More »