Community Products Roadmap Update, January 2025
An update on recent launches and the upcoming roadmap.
Community Products Roadmap Update, January 2025 Read More »
An update on recent launches and the upcoming roadmap.
Community Products Roadmap Update, January 2025 Read More »
Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software’s SysTrack installer to obtain arbitrary code execution. An attacker with low-privilege access to a system running the vulnerable version of SysTrack could escalate privileges locally. Mandiant responsibly disclosed this
CVE-2023-6080: A Case Study on Third-Party Installer Abuse Read More »
For developers who want to use the PyTorch deep learning framework with Cloud TPUs, the PyTorch/XLA Python package is key, offering developers a way to run their PyTorch models on Cloud TPUs with only a few minor code changes. It does so by leveraging OpenXLA, developed by Google, which gives developers the ability to define
Improving model performance with PyTorch/XLA 2.6 Read More »
Modern AI workloads require powerful accelerators and high-speed interconnects to run sophisticated model architectures on an ever-growing diverse range of model sizes and modalities. In addition to large-scale training, these complex models need the latest high-performance computing solutions for fine-tuning and inference. Today, we’re excited to bring the highly-anticipated NVIDIA Blackwell GPUs to Google Cloud
Blackwell is here — new A4 VMs powered by NVIDIA B200 now in preview Read More »
Ryan is joined by Fynn Glover (CEO) and Ben Papillon (CTO), cofounders of Schematic, for a conversation about managing feature flags in software development. They explore theoretical and practical applications of feature flags, the issue of tech debt, and how orgs could manage entitlements and pricing models more effectively.
Feature flags: Theory meets reality Read More »
We are thrilled to announce the collaboration between Google Cloud, AWS, and Azure on Kube Resource Orchestrator, or kro (pronounced “crow”). kro introduces a Kubernetes-native, cloud-agnostic way to define groupings of Kubernetes resources. With kro, you can group your applications and their dependencies as a single resource that can be easily consumed by end users.
Simplify the developer experience on Kubernetes with KRO Read More »
In today’s complex digital world, building truly intelligent applications requires more than just raw data — you need to understand the intricate relationships within that data. Graph analysis helps reveal these hidden connections, and when combined with techniques like full-text search and vector search, enables you to deliver a new class of AI-enabled application experiences.
Announcing the general availability of Spanner Graph Read More »
Welcome to the second Cloud CISO Perspectives for January 2025. Iain Mulholland, senior director, Security Engineering, shares insights on the state of ransomware in the cloud from our new Threat Horizons Report. The research and intelligence in the report should prove helpful to all cloud providers and security professionals. Similarly, the recommended risk mitigations will
Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats Read More »
Are you a cloud architect or IT admin tasked with ensuring deployments are following best practices and generating configuration validation reports? The struggle of adopting best practices is real. And not just the first time: ensuring that a config doesn’t drift from org-wide best practices over time is notoriously difficult. Workload Manager provides a rule-based
Rapid advancements in artificial intelligence (AI) are unlocking new possibilities for the way we work and accelerating innovation in science, technology, and beyond. In cybersecurity, AI is poised to transform digital defense, empowering defenders and enhancing our collective security. Large language models (LLMs) open new possibilities for defenders, from sifting through complex telemetry to secure
Adversarial Misuse of Generative AI Read More »