Cloud Computing

Blackwell is here — new A4 VMs powered by NVIDIA B200 now in preview

Modern AI workloads require powerful accelerators and high-speed interconnects to run sophisticated model architectures on an ever-growing diverse range of model sizes and modalities. In addition to large-scale training, these complex models need the latest high-performance computing solutions for fine-tuning and inference. Today, we’re excited to bring the highly-anticipated NVIDIA Blackwell GPUs to Google Cloud

Blackwell is here — new A4 VMs powered by NVIDIA B200 now in preview Read More »

Simplify the developer experience on Kubernetes with KRO

We are thrilled to announce the collaboration between Google Cloud, AWS, and Azure on Kube Resource Orchestrator, or kro (pronounced “crow”). kro introduces a Kubernetes-native, cloud-agnostic way to define groupings of Kubernetes resources. With kro, you can group your applications and their dependencies as a single resource that can be easily consumed by end users.

Simplify the developer experience on Kubernetes with KRO Read More »

Announcing the general availability of Spanner Graph

In today’s complex digital world, building truly intelligent applications requires more than just raw data — you need to understand the intricate relationships within that data. Graph analysis helps reveal these hidden connections, and when combined with techniques like full-text search and vector search, enables you to deliver a new class of AI-enabled application experiences.

Announcing the general availability of Spanner Graph Read More »

Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats

Welcome to the second Cloud CISO Perspectives for January 2025. Iain Mulholland, senior director, Security Engineering, shares insights on the state of ransomware in the cloud from our new Threat Horizons Report. The research and intelligence in the report should prove helpful to all cloud providers and security professionals. Similarly, the recommended risk mitigations will

Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats Read More »

Introducing custom rules in Workload Manager: Evaluate workloads against customized best practices

Are you a cloud architect or IT admin tasked with ensuring deployments are following best practices and generating configuration validation reports? The struggle of adopting best practices is real. And not just the first time: ensuring that a config doesn’t drift from org-wide best practices over time is notoriously difficult.     Workload Manager provides a rule-based

Introducing custom rules in Workload Manager: Evaluate workloads against customized best practices Read More »

Adversarial Misuse of Generative AI

Rapid advancements in artificial intelligence (AI) are unlocking new possibilities for the way we work and accelerating innovation in science, technology, and beyond. In cybersecurity, AI is poised to transform digital defense, empowering defenders and enhancing our collective security. Large language models (LLMs) open new possibilities for defenders, from sifting through complex telemetry to secure

Adversarial Misuse of Generative AI Read More »

Outbrain: Taking control of extension security with Chrome Enterprise

Editor’s note: Today’s post is by Travis Naraine, IT Infrastructure Engineer, and Harel Shaked, Director of IT Services and Support, both for Outbrain, a leading technology platform that drives business results by engaging people across the open internet. Outbrain adopted Chrome Enterprise and integrations from Spin.AI to create policies for secure app and extension use

Outbrain: Taking control of extension security with Chrome Enterprise Read More »