Cloud Computing

Experimenting with BigQuery data compression

With the introduction of BigQuery’s physical storage billing model, BigQuery users now have more control over their storage costs, unlocking potential savings, especially for large deployments. But as we showed in a previous blog post, opting for this model can yield different size reductions for different data sets. You might be wondering why the range […]

Experimenting with BigQuery data compression Read More »

Brewing innovation: Google Cloud and Oracle powering AI-driven experiences

For coffee lovers, the pursuit of the perfect cup can feel like an endless quest. With a countless array of beans, roasts, and flavor profiles to choose from, finding the one can be overwhelming. But what if there was a way to simplify the search? Enter Coffee Nirvana, an AI-powered solution that harnesses the power

Brewing innovation: Google Cloud and Oracle powering AI-driven experiences Read More »

Enhancing Observability in the AWS SDK for .NET with OpenTelemetry

Starting with version 3.7.400, the AWS SDK for .NET added significant observability enhancements. It introduced powerful tracing and metrics capabilities with OpenTelemetry support, an industry-standard for observability. With these enhancements, developers can now gain deeper insights into their applications’ behavior, from tracking API call durations to monitoring system metrics. In this blog post, we’ll guide

Enhancing Observability in the AWS SDK for .NET with OpenTelemetry Read More »

Protecting Multi-Cloud Resources in the Era of Modern Cloud-Based Cyberattacks

Written by: Rupa Mukherjee, Jon Sabberton In the era of multi-cloud adoption, where organizations leverage diverse cloud platforms to optimize their operations, a new wave of security challenges have emerged. The expansion of attack surfaces beyond traditional on-premises environments, coupled with complex permission structures and the prevalence of overly permissive accounts, has created fertile ground

Protecting Multi-Cloud Resources in the Era of Modern Cloud-Based Cyberattacks Read More »

Regnology Automates Ticket-to-Code with agentic GenAI on Vertex AI

A significant challenge in software development  faced by many tech driven companies with internal software development teams, is the “Ticket-to-Code Problem”.This issue arises when-reported bugs or requirements are logged as tickets, which then need to be transformed into actionable  code changes. Regnology, a global technology pioneer in regulatory reporting solutions, is no exception.  The process

Regnology Automates Ticket-to-Code with agentic GenAI on Vertex AI Read More »

Regnology Automates Ticket-to-Code with agentic GenAI on Vertex AI

A significant challenge in software development  faced by many tech driven companies with internal software development teams, is the “Ticket-to-Code Problem”.This issue arises when-reported bugs or requirements are logged as tickets, which then need to be transformed into actionable  code changes. Regnology, a global technology pioneer in regulatory reporting solutions, is no exception.  The process

Regnology Automates Ticket-to-Code with agentic GenAI on Vertex AI Read More »

The AI detective: The Needle in a Haystack test and how Gemini 1.5 Pro solves it

Imagine a vast library filled with countless books, each containing a labyrinth of words and ideas. Now, picture a detective tasked with finding a single, crucial sentence hidden somewhere within this literary maze. This is the essence of the “Needle in a Haystack” test for AI models, a challenge that pushes the boundaries of their

The AI detective: The Needle in a Haystack test and how Gemini 1.5 Pro solves it Read More »

Insights on Cyber Threats Targeting Users and Enterprises in Mexico

Written by: Aurora Blum, Kelli Vanderlee Like many countries across the globe, Mexico faces a cyber threat landscape made up of a complex interplay of global and local threats, with threat actors carrying out attempted intrusions into critical sectors of Mexican society. Mexico also faces threats posed by the worldwide increase in multifaceted extortion, as

Insights on Cyber Threats Targeting Users and Enterprises in Mexico Read More »