Cloud Computing

vLLM Performance Tuning: The Ultimate Guide to xPU Inference Configuration

Additional contributors include Hossein Sarshar, Ashish Narasimham, and Chenyang Li.   Large Language Models (LLMs) are revolutionizing how we interact with technology, but serving these powerful models efficiently can be a challenge. vLLM has rapidly become the primary choice for serving open source large language models at scale, but using vLLM is not a silver […]

vLLM Performance Tuning: The Ultimate Guide to xPU Inference Configuration Read More »

Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats

Written by: Patrick Whitsell In March 2025, Google Threat Intelligence Group (GTIG) identified a complex, multifaceted campaign attributed to the PRC-nexus threat actor UNC6384. The campaign targeted diplomats in Southeast Asia and other entities globally. GTIG assesses this was likely in support of cyber espionage operations aligned with the strategic interests of the People’s Republic

Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats Read More »

Don’t just speculate, investigate! Gemini Cloud Assist now offers root-cause analysis

Debugging in a complex, distributed cloud environment can feel like searching for a needle in a haystack. The sheer volume of data, intertwined dependencies, and ephemeral issues make traditional troubleshooting methods time-consuming and often reactive. Just as modern software development demands more context for effective debugging, so too does cloud operations. Gemini Cloud Assist, a

Don’t just speculate, investigate! Gemini Cloud Assist now offers root-cause analysis Read More »

Simplify multi-tenant encryption with a cost-conscious AWS KMS key strategy

Organizations face diverse challenges when it comes to managing encryption keys. While some scenarios demand strict separation, there are compelling use cases where a centralized approach can streamline operations and reduce complexity. In this post, our focus is on a software-as-a-service (SaaS) provider scenario, but the principles we discuss can be adopted by large organization

Simplify multi-tenant encryption with a cost-conscious AWS KMS key strategy Read More »

How to build a real-time voice agent with Gemini, Google ADK, and A2A protocol

Building advanced conversational AI has moved well beyond text. Now, we can use AI to create real-time, voice-driven agents. However, these systems need low-latency, two-way communication, real-time information retrieval, and the ability to handle complex tasks. This guide shows you how to build one using Gemini and the Google Agent Development Kit (ADK). You’ll learn

How to build a real-time voice agent with Gemini, Google ADK, and A2A protocol Read More »

How startups can help build — and benefit from — the AI revolution

Startups are at the forefront of generative AI development, pushing current capabilities and unlocking new potential. Building on our Future of AI: Perspectives for Startups 2025 report, several of the AI industry leaders featured in the report joined Jason Calacanis on the “This Week in Startups” podcast’s Startup Basics series, offering their perspective on what’s

How startups can help build — and benefit from — the AI revolution Read More »

Intelligent code conversion: Databricks Spark SQL to BigQuery SQL via Gemini

As data platforms evolve and businesses diversify their cloud ecosystems, the need to migrate SQL workloads between engines is becoming increasingly common. Recently, I had the opportunity to work on translating a set of Databricks SQL queries to BigQuery SQL — a task that is deceptively complex due to differences in syntax, functions, and execution

Intelligent code conversion: Databricks Spark SQL to BigQuery SQL via Gemini Read More »