Cloud Computing

How Google Does It: Building the largest known Kubernetes cluster, with 130,000 nodes

At Google Cloud, we’re constantly pushing the scalability of Google Kubernetes Engine (GKE) so that it can keep up with increasingly demanding workloads — especially AI. GKE already supports massive 65,000-node clusters, and at KubeCon, we shared that we successfully ran a 130,000-node cluster in experimental mode — twice the number of nodes compared to […]

How Google Does It: Building the largest known Kubernetes cluster, with 130,000 nodes Read More »

Google is a Leader in the 2025 Gartner® Magic Quadrant for Cloud Database Management Systems

Google is a Leader in the 2025 Gartner Magic Quadrant for Cloud Database Management Systems for the sixth year in a row, and for the third consecutive year is positioned furthest in vision.  This comes as we cross into the era of agentic AI. Leading enterprises are in the early days of deploying agents to

Google is a Leader in the 2025 Gartner® Magic Quadrant for Cloud Database Management Systems Read More »

From interaction to insight: Announcing BigQuery Agent Analytics for the Google ADK

In a world of agentic AI, building an agent is only half the battle. The other half is understanding how users are interacting with it. What are their most common requests? Where do they get stuck? What paths lead to successful outcomes? Answering these questions is the key to refining your agent and delivering a

From interaction to insight: Announcing BigQuery Agent Analytics for the Google ADK Read More »

Beyond the Watering Hole: APT24’s Pivot to Multi-Vector Attacks

Written by: Harsh Parashar, Tierra Duncan, Dan Perez Google Threat Intelligence Group (GTIG) is tracking a long-running and adaptive cyber espionage campaign by APT24, a People’s Republic of China (PRC)-nexus threat actor. Spanning three years, APT24 has been deploying BADAUDIO, a highly obfuscated first-stage downloader used to establish persistent access to victim networks. While earlier

Beyond the Watering Hole: APT24’s Pivot to Multi-Vector Attacks Read More »