IT |
ITmedia 総合記事一覧 |
[ITmedia ビジネスオンライン] 低空飛行の9年、パナ津賀社長最後の決算 |
https://www.itmedia.co.jp/business/articles/2105/11/news055.html
|
itmedia |
2021-05-11 07:40:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia エンタープライズ] LGWAN経由でServiceNowを利用可能に、両備システムズが「R-Cloud Proxy for ServiceNow」を提供へ |
https://www.itmedia.co.jp/enterprise/articles/2105/11/news033.html
|
ITmediaエンタープライズLGWAN経由でServiceNowを利用可能に、両備システムズが「RCloudProxyforServiceNow」を提供へ両備システムズは、ServiceNowのデジタルワークフローソリューションを利用できるサービス「RCloudProxyforServiceNow」を地方自治体に向けて提供する。 |
2021-05-11 07:30:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia News] 米石油パイプライン大手へのサイバー攻撃、犯人はロシアを拠点とする集団「DarkSide」とFBIが発表 |
https://www.itmedia.co.jp/news/articles/2105/11/news053.html
|
colonial |
2021-05-11 07:10:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia エグゼクティブ] コロナ禍の今こそDXでビジネスモデルを見直す好機――ANA 野村泰一氏 |
https://mag.executive.itmedia.co.jp/executive/articles/2105/11/news007.html
|
ITmediaエグゼクティブコロナ禍の今こそDXでビジネスモデルを見直す好機ーANA野村泰一氏安心と信頼を基礎に、世界をつなぐ心の翼で、夢にあふれる未来に貢献することを目指す全日本空輸ANA。 |
2021-05-11 07:07:00 |
TECH |
Techable(テッカブル) |
理想の家を自分で設計できるデジタル家づくりプラットフォーム「Nesting β」 |
https://techable.jp/archives/154290
|
biotope |
2021-05-10 22:00:28 |
AWS |
AWS News Blog |
Resolve IT Incidents Faster with Incident Manager, a New Capability of AWS Systems Manager |
https://aws.amazon.com/blogs/aws/resolve-it-incidents-faster-with-incident-manager-a-new-capability-of-aws-systems-manager/
|
Resolve IT Incidents Faster with Incident Manager a New Capability of AWS Systems ManagerIT engineers pride themselves on the skill and care they put into building applications and infrastructure However as much as we all hate to admit it there is no such thing as uptime Everything will fail at some point often at the worst possible time leading to many a ruined evening birthday party or … |
2021-05-10 22:11:44 |
AWS |
AWS Big Data Blog |
Manage and process your big data workflows with Amazon MWAA and Amazon EMR on Amazon EKS |
https://aws.amazon.com/blogs/big-data/manage-and-process-your-big-data-workflows-with-amazon-mwaa-and-amazon-emr-on-amazon-eks/
|
Manage and process your big data workflows with Amazon MWAA and Amazon EMR on Amazon EKSMany customers are gathering large amount of data generated from different sources such as IoT devices clickstream events from websites and more To efficiently extract insights from the data you have to perform various transformations and apply different business logic on your data These processes require complex workflow management to schedule jobs and manage dependencies … |
2021-05-10 22:18:16 |
AWS |
AWS |
AWS Supports You: Building Modern Applications using Amazon EFS |
https://www.youtube.com/watch?v=mDi2Gz2O2XY
|
AWS Supports You Building Modern Applications using Amazon EFSAWS Supports You Building Modern Applications using Amazon EFS gives viewers on the twitch tv aws channel an introduction to Amazon Elastic File System Amazon EFS Use cases Modern application development with EFS Containers Lambda Security and Developer and administrative best practices This series showcases best practices and troubleshooting tips from AWS Support This episode originally aired on May Subscribe More AWS videos More AWS events videos AWS |
2021-05-10 22:14:17 |
AWS |
AWS |
AWS DeepRacer League 2021 Teaser |
https://www.youtube.com/watch?v=2SX162djt6Q
|
AWS DeepRacer League TeaserRev up your machine learning skills by competing the AWS DeepRacer League the world s first global autonomous racing league Compete in the all new open division to score digital rewards such as custom virtual cars and official DeepRacer merchandise Place in the top to advance on to the pro division for a chance to win an AWS DeepRacer Evo device From the pro division qualify for the championships to win a trip to AWS re Invent and compete against the best in the world to take home the title Learn more about AWS DeepRacer League at Subscribe More AWS videos More AWS events videos AWS DeepRacer ArtificialIntelligence LearnML MachineLearning AutonomousVehicle DroneRacing |
2021-05-10 22:06:48 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
Android アプリで Facebook loginを実行しようとしたところ、実機で実行後すぐに落ちてしまう。 |
https://teratail.com/questions/337638?rss=all
|
AndroidアプリでFacebookloginを実行しようとしたところ、実機で実行後すぐに落ちてしまう。 |
2021-05-11 07:56:34 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
Firebaseに追加した値をDroppdownbuttonに入れようと思った時に以下のようなエラーが出て、困っています。 |
https://teratail.com/questions/337637?rss=all
|
Firebaseに追加した値をDroppdownbuttonに入れようと思った時に以下のようなエラーが出て、困っています。 |
2021-05-11 07:49:36 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
phpMyAdminに接続できない |
https://teratail.com/questions/337636?rss=all
|
phpMyAdminに接続できない使用PCWindowsbit※MAMP使用phpnbspMySQLversionnbsp以前から問題なくアクセスできていたphpMyAdeminに、今日から急にアクセスできなくなりました。 |
2021-05-11 07:31:33 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
wordpress対応をすると画像と文字が消える。 |
https://teratail.com/questions/337635?rss=all
|
wordpress対応をすると画像と文字が消える。 |
2021-05-11 07:15:33 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
自分ではなく、指定したユーザがログイン中かどうか確認する方法 |
https://teratail.com/questions/337634?rss=all
|
的外れな質問してたらすみません。 |
2021-05-11 07:14:10 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
インデックス付きEnumerable.Selectメソッドでラムダ式がタプルを返すときにエラーとなる理由をしりたい。 |
https://teratail.com/questions/337633?rss=all
|
Ⅱ④のコードのときエラーとなる理由を知りたい。 |
2021-05-11 07:13:28 |
Ruby |
Rubyタグが付けられた新着投稿 - Qiita |
フラットなファイル構成のディレクトリでguardを使ってrspecを自動実行する |
https://qiita.com/ytnk531/items/3d933e99ef80de3283b5
|
ポイントspecpathsにカレントディレクトリを設定するguardはこれをテスト用のファイルが入っているディレクトリとみなす。 |
2021-05-11 07:15:30 |
Linux |
Ubuntuタグが付けられた新着投稿 - Qiita |
Ubuntu Server 21.04 に Samba サーバを立てて Mac とファイルを共有する |
https://qiita.com/hajime-f/items/b1cf3885b2a52d1298fe
|
Sambaユーザのユーザ名とパスワードを聞かれるので、入力しましょう。 |
2021-05-11 07:45:13 |
海外TECH |
DEV Community |
cyber secutiry |
https://dev.to/vishwasnarayan5/cyber-secutiry-3c8a
|
cyber secutiryFirst I would say understand the seven layers of the Cyber security Now understand all the hardware and software and the ports just run on Operating System and have a specific driver and any set of the hardware s defined thus its hackable What is cyber security The practice of protecting computers websites mobile devices electronic services networks and data against malware threats is known as cyber defense It s sometimes referred to as information infrastructure protection or electronic data security The concept is used in a number of ways ranging from enterprise to mobile computing and can be classified into a few general groups for the computer defence Computer defence never go offensive also known as cybersecurity or information technology security is the safeguarding of computer systems and networks from information leakage theft or harm to their devices applications or electronic records as well as interruption or misdirection of the services they offer It s no surprise that online security breaches are becoming so common Despite the fact that digital is pervading every aspect of our lives most people are terrible at security In a Pew Research poll on cybersecurity the vast majority of online adults correctly answered just two of thirteen questions Let s do something about it by strengthening our own personal digital protections While not to be confused with the internet the word cyberspace refers to identities or incidents that occur during the contact process Consider a website which exists in CyberSpace as well Interactions of others If you make a tweet upload a photo or share a message all of these social experiences take place in Cyber Space and this Cyber Space is evolving in seconds rather than minutes Many of these activities are taking place in cyberspace not in their actual environments You can see a picture below of different digital devices that are linked through the internet The comoanies assets are on the internet I ve made it a tradition over the last years or so to do an annual audit of my personal digital security Every year I review all of my online activities for security risks and make a commitment to improve As a product of the endeavor these are the behaviors I employ for the search and bounty In general I attempt to address these core questions What data is available about me and where is it stored and what kind of a domain it Never say to a person where you have hosted your websites through always make sure to use a custom domain name certificate and also have a certified SSL for your websites What are the risks that I m going to guard against playing defensive against all the offenses i e what is my Threat Model Please make sure that you have all the ethical aspects when you do the bounty or the cyberattack and also dont missuse your freedom What are the impacts to my privacy and also about my social presence You should be very carefull abut what is your social presence and also about all the aspects that you want to take care Network protection is the practise of defending a computer network against intruders whether they be targeted attackers or opportunistic malware Application secutiry is concerned with keeping apps and computers safe from attacks A hacked programme could allow access to the data it is supposed to secure Protection starts in the design stage well before a software or system is implemented Information protection safeguards the confidentiality and anonymity of data when it is in storage and transit The procedures and decisions for managing and maintaining computer properties are included in operational security This includes the permissions that users have when connecting to a network as well as the procedures that govern how and where data can be accessed or exchanged Disaster recovery and business continuity describe how a company reacts to a cyber security incident or some other situation that results in the loss of activities or records Disaster recovery procedures govern how an organisation recovers its activities and records in order to resume operations at the same level as before the disaster Business sustainability is the plan that a company uses when it is unable to function due to a lack of funding End user education tackles the most unpredictability of cyber security individuals By failing to observe sound security standards someone may inadvertently inject a virus into an otherwise stable environment Instructing users to remove questionable email attachments rather than inserting unknown plug in Types of cyber threats and attacks that you might faceThe threats countered by cyber security are three fold Today the term is almost entirely used to refer to information security issues We ve taken to visualising the digital phenomena as a tangible one because it s difficult to imagine how digital signals flowing over a wire might reflect an assault A cyber assault is an attack launched against us or our digital devices through cyberspace Cyberspace a non existent cyber space has become a term for understanding digital weaponry designed to threaten us What is true though is the attacker s motive as well as the possible effect While certain cyber attacks are minor annoyances others are very serious even endangering human lives Cyber attacks are a major concern Cyber attacks will result in power outages the loss of military facilities and the disclosure of national security information They will lead to the stealing of important and confidential data such as medical information They have the ability to interrupt phone and internet networks as well as paralyze devices rendering data inaccessible It is not an exaggeration to suggest that cyber attacks have the potential to disrupt the functioning of life as we know it Threats are now becoming more severe According to Gartner cybersecurity risks pervade every organisation and aren t always directly under IT s control Market executives are pushing forward with digital business plans and those leaders are making technology related risk decisions on a daily basis Increased cyber vulnerability exists but so do computer protection solutions Virtually every cyber threat falls into one of these three modes In terms of attack techniques malicious actors have an abundance of options Actors in cyberspace In cybersecurity the enemy we may learn about is known as a threat actor a concept that may apply to lone individuals organised crime organisations or whole entities attempting to compromise an individual s or organization s protection Cybercrime includes single threat actors or groups targeting systems like DDOS for financial gain or to cause disruption Cyber attack often involves politically motivated information gathering and threats which can be like an apocalypse Cyberterrorism is predetermined to undermine electronic systems to cause panic or fear in the victim Cyber attacks may originate from a wide range of locations individuals and contexts Among the malicious actors are Individuals that create attack vectors using their own software toolsCriminal organizations that are run like corporations with large numbers of employees developing attack vectors and executing attacksNation statesTerroristsIndustrial spiesOrganized crime groupsUnhappy insidersHackersBusiness competitorsSo how do malicious actors gain control of computer systems Here are some common methods used to threaten cyber security MalwareMalware is short for malicious applications Malware is software developed by a cybercriminal or intruder to disable or destroy a legitimate user s computer It is one of the most popular cyber threats Malware which is often distributed through unsolicited email attachments or legitimate looking downloads can be used by cybercriminals to make money or in politically motivated cyber attacks There are a number of different types of malware including Virus A software that binds itself to clean files and spreads within a computer system infecting files with malicious code Trojans Malware that behaves as legitimate apps Cybercriminals deceive users into installing Trojans on their computers which inflict harm or capture data Spyware A software that secretly tracks what a user does in order for cybercriminals to use this material Spyware for example may record credit card information Probably shoulder surfing and spoofing might also come uder this category Ransomware Malware that encrypts a user s files and data and threatens to delete it until a ransom is paid Adware Advertising tech that has the potential to distribute malware in the victims local system or the server Botnets Malware infected computer networks that cybercriminals use to execute activities online without the user s consent SQL injectionSQL structured language query injection is a method of cyber attack used to gain access to and steal data from a database Cybercriminals take advantage of flaws in data driven applications to inject malicious code into a database with a malicious SQL comment This grants them access to the database s classified details this attack is a fact that we still know how the computer or the server behaves PhishingPhishing occurs as cybercriminals send emails that claim to be from a reputable organisation and request personal information from victims Phishing attacks are often used to trick users into providing credit card information and other sensitive information Man in the middle attackA man in the middle attack is a type of cyber threat in which a cybercriminal intercepts contact between two people in order to steal information On an insecure WiFi network for example an attacker might intercept data passing between the victim s computer and the network Denial of service attackA denial of service attack occurs as cybercriminals overload networks and servers with traffic in order to block a computer system from serving legitimate requests This makes the machine inoperable and prevents an entity from performing critical functions and many moreDomains of Cyber SecurityBelow are the domains of Cybersecurity as a subject Access Control Systems and MethodologyTelecommunications and Network SecurityBusiness Continuity Planning and Disaster Recovery PlanningSecurity Management PracticesSecurity Architecture and ModelsLaw Investigation and EthicsApplication and Systems Development SecurityCryptographyComputer Operations SecurityPhysical SecurityAccess Control Systems and Methodology The primary goal of Cyber Security is to safeguard your files But first we ll learn more about Data and the different access control schemes and methodologies Six Dimensions of Data Quality Assessment A Data Quality DQ Dimension is a well known concept that describes a data attribute that can be analysed or tested against predefined criteria in order to analyse data quality The six core data quality dimensions are ConsistencyCompletenessCorrectnessAccessibilityTimelinessAccuracyStates of Data Understanding the various states of digital data will help you choose the various types of security measures and encryption methods to use on the data In this section we will look at three types of data states Data at rest storage Data at rest refers to data that has been stored on a physical medium or backup medium such as hard drives or even cell devices What distinguishes data at rest is that it is unused and is not actually being exchanged or stored Data in motion transmission The second data process has begun Data in motion is actually being sent over a network or is sitting in a computer s RAM waiting to be read modified or interpreted Emails or data shared through FTP or SSH are examples Data in process The third step of data is in use or in operation This data state is not passively stored on a storage medium This is the data that one or more programmes are processing This is the information that is currently being created modified appended or deleted The third step of data is in use or in operation This data state is not passively stored on a storage medium This is the data that one or more programmes are processing This is the information that is currently being created modified appended or deleted Confidentiality It guarantees that only approved parties have access to computer related assets also known as confidentiality or privacy Measures taken to discourage classified information from meeting the wrong persons and to ensure that only designated individuals have access to it Technique used is EncryptionEncryption to ensure Confidentiality If we choose to word “HELLO we can use cryptography to substitute each alphabet of HELLO with its neighbour alphabet such as H replacing I E replacing F and so on rendering the word meaningless Then we decrypt using the same method as on the other hand Bitlocker is a disk drive level encryption We cannot apply BitLocker on file The NTFS file system is used for Windows EFS Encrypted File System File Level Encryption is accessible Right click on the file and choose Properties Compress the contents in blue color Features of EFS There are two colors that show encryption and decryption Policies are at the heart of the whole operation To hold a data backup When an employee resigns the corporation reformats the scheme erasing the BitLocker keys and other data Types of EncryptionThere are two top level types of encryption Symmetric and AsymmetricSymmetric Encryption Encrypts and decrypts data with the same key Consider using a desktop password manager You enter your name which is encrypted with your exclusive key When it is time to recover the data the same key is used and the data is decrypted Asymmetric Encryption It employs a private key and a public key pair A single key will encrypt but not decrypt its own decrypted data The paired key is needed to decrypt Asymmetric encryption is used for topics like HTTPS Transport Layer Security TLS and data signing Access Controls Access controls authenticate and authorize individuals to access the information they are allowed to see and useSomething you know ー you know passwords Something you are ー biometric scan Something you have ー ATM card Something you do ー signature style Integrity of Data Integrity This ensures the properties can only be changed by registered parties and in approved ways Ensures the material is in a format that is true and valid for the purposes for which it was created It entails ensuring the quality precision and trustworthiness of data over the entire life cycle Hash is the technique used Hash Hash Calculator that accepts a file as input and applies an algorithm to it The object of hashing is to demonstrate that the original file has not been altered Let s look at a real world example of hashing using the Microsoft File Checksum Integrity Verifier You will have it from the internet Availability of Data It ensures the funds are available to approved parties at all times High availability percent with a percent error rate and uptime with a error rate when improved It is carried out by techniques such as hardware repair programme patching and network optimization A Denial of Service Attack is a classic example of a malicious actor s lack of availability DOS SLA The Service Level Agreement is a legally binding contract It is a contract between a service provider and a customer Specific facets of service ーsuch as consistency affordability and obligations ーare settled upon between the service provider and the service consumer If a service recipient should not accept files in a timely manner the service provider is fined Before discussing the types of DOS attacks let s have a look at Ping Command Ping is a computer network management software utility that is used to measure a host s reachability on an Internet Protocol network A quick way to see if a computer can connect with another computer or network system over the network available both in Windows anf Linux ping is a loopback address ping lt any ip gt is for any domain to be tested Types of DOS Attacks Will discuss a few of the DOS AttacksPing of DeathPing of FloodSmurf AttackFraggle AttackPing of Death A Ping of Death attack is a form of Denial of Service DoS attack in which the attacker sends a packet that is greater than the maximum allowed capacity forcing the target computer to freeze or crash Ping of Flood Ping flood also known as ICMP flood is a popular Denial of Service DoS attack in which an attacker overwhelms a victim s device with ICMP echo requests also known as pings As an example consider the Education Board s website Fraggle Attack A Fraggle attack is a form of DOS attack in which the attacker sends a large amount of spoofed UDP traffic to a network router s broadcast address Note Bugs and Viruses play a majour role in destoying the software thus some first found were On September CE the world s first computer bug was discovered On September a team of computer scientists at Harvard University announced the world s first computer bugーa moth stuck in their computer The first computer virus known as the Creeper Virus was discovered in The virus was finally removed by a machine known as The Reaper although it is important to remember that the Reaper was also a virus TeleCommunications and Network Security The focus is on messaging protocols and network facilities as well as the possible flaws involved with each It refers to the procedures and policies put in place to deter and track unauthorised access and abuse of a computer network and its infrastructure Protocols Network Protocols are a series of rules that regulate the exchanging of information in a simple dependable and protected manner There are three kinds of network protocols as mentioned below TCP IPOSI ModelCISCO Hierarchical ModelTCP IP VS OSI ModelThe two most popular network protocols are TCP IP and the OSI model The primary distinction between them TCP IP is a functional model used for forming a stable link and communicating over a network while OSI is a logical model Hierarchical Model of Cisco Cisco has developed a three layered hierarchical architecture for creating a dependable infrastructure Each of the layers has its own functionality and features which aids in the reduction of network complexity Access Layer Control network resource access for users and workgroups Layer switches are usually used in this layer Distribution Layer It acts as a bridge between the entry layer and the main layer This layer is usually made up of multilayer switches Core Layer This layer also known as the Backbone layer is in charge of easily moving large volumes of traffic Planning for the Unexpected Contingency Planning IR Incident Response There are several tears so the first move is to identify contain investigate forensics execute the remedy and register document DR Disaster Recovery Floods and earthquakes are examples of high level problems that cause significant damage BCP Business Continuity Planning When all is lost in a storm how will the company continue Laws Investigations and Ethics Law Investigation and Ethics is one of the most intriguing defence realms As the name suggests this security domain addresses the legal aspects of information security Cryptography is a form of encryption Cryptography or data coding is one of the most commonly used authentication methods today The Cryptography security domain is intended to teach you how and when to use encryption What s next This article was written to provide you with a short overview and how to guide for Cyber Security Fundamentals Feel free to play around with it ethically Latest cyber threatsWhat are the most recent cyber attacks that people and companies must be aware of Here are some of the most recent cyber attacks identified by the governments of the United Kingdom the United States and Australia Hijack of TelegramTelegram has a critical flaw that allows hackers to spread cryptojacking malware Hackers gained access to Telegram s email details and messenger of some of the top cryptocurrency companies The hackers according to rumours at the time used Signaling System SS which is used to link mobile networks all over the world According to cybersecurity analysts the hackers were searching for two factor authentication FA login information from the server They took over the network s short message services centre SMSC and used it to send calls for location alerts to over high profile victims The attackers carried out the assault in order to obtain cryptocurrencies It is a frequent attack in the crypto space but victims are still unsure how to defend their networks from such attacks However with blockchain technologies at work it appears that the crypto world has superior authentication mechanisms than using call or SMS based FA Cybersecurity researchers believe that protocols such as SS can not be used by telecom experts because they lack the necessary security standards to guard against advanced attacks in the modern era Dridex malwareThe US Department of Justice DoJ indicted the leader of an organised cyber criminal organisation in December for their role in a multinational Dridex ransomware attack This malicious campaign had a global impact on the public economy infrastructure and industry Dridex is a financial trojan with many capabilities It has been infecting machines via phishing emails or existing malware since It has incurred huge financial damages amounting to hundreds of millions of dollars by stealing passwords banking records and personal data that can be used in illegal transactions In reaction to the Dridex threats the United Kingdom s National Cyber Security Centre urges the public to ensure that computers are patched anti virus software is turned on and up to date and files are backed up Romance scamsIn February the FBI sent a warning to U S people about trust theft perpetrated by cybercriminals using dating forums chat rooms and applications Perpetrators prey on individuals looking for new relationships duping victims into disclosing sensitive information According to the FBI romance cyber attacks targeted victims in New Mexico in resulting in million in financial losses Emotet malwareThe Australian Cyber Security Centre sent an alert to national entities in late about a pervasive global cyber threat posed by Emotet malware Emotet is a complex trojan that has the ability to harvest data as well as load other malware Emotet thrives on simple passwords serving as a reminder of the value of having a safe password to protect against cyber attacks Sopra Steria AttackOn October Sopra Steria a French IT service provider was targeted by a ransomware attack by a new version of the Ryuk ransomware which was previously unknown to cybersecurity providers Sopra Steria stated after the attack that the attack infected a portion of its IT architecture According to the firm the data breach caused no harm or leakage of consumer data When it comes to ransomware threats Ryuk is one of the most potent in this day and era The ransomware has infiltrated high profile companies such as Prosegur a Spanish logistics firm and EWA a US defence contractor End user protectionEnd user safety also known as endpoint defence is a critical component of cyber security After all it is frequently a person the end user that unintentionally downloads ransomware or some kind of cyber threat to their desktop laptop or mobile device But how can cyber security safeguards safeguard end users and systems To begin cryptographic protocols are used to encrypt emails directories and other sensitive data in cyber security This not only safeguards information in transit but also prevents it from destruction or fraud Furthermore end user protection programme checks machines for malicious malware quarantines it and then deletes it from the system Security programmes can also identify and delete malicious code concealed in the Master Boot Record MBR and are programmed to encrypt or erase data from the hard drive of a device Real time intrusion prevention is also a subject of electronic security protocols Many people use heuristic and behavioural analysis to track a program s and its code s actions in order to protect against viruses or Trojans that change form with each execution polymorphic and metamorphic malware Security programmes can isolate potentially malicious programmes in a virtual bubble isolated from the user s network in order to observe their actions and learn how to spot new pathogens more effectively As cyber security experts discover emerging risks and ways to fight them security programmes begin to develop new protections Employees must be trained about how to use end user security tools in order to get the best out of it Importantly keeping it going and upgrading it on a regular basis means that it will protect consumers from the most recent cyber attacks Cyber safety tips safeguard yourself from cyber attacksHow will companies and individuals protect themselves from cyber threats Here are our top cyber safety tips Update your software and operating system you benefit from the latest security patches updates from the company that has given the software One of the safest ways to defend your devices from any hacking attempt is to keep your system informed on a daily basis The majority of attacks occur as hackers discover a security flaw or loophole that they can manipulate However with routine patches those bugs will be eliminated It is best to run programme upgrades for your device as soon as they become usable Use anti virus software security solutions like Kaspersky Total Security will detect and removes threats Keep your software updated for the best level of protection Use strong passwords ensure your passwords are not easily guessable and make sure that you regularly change the software every fiscal time change every days recommended Do not open email attachments from unknown senders These could be infected with malware or just can be a phishing mail to gather all your information Do not click on links in emails from unknown senders or unfamiliar website Avoid using unsecure Wi Fi networks in public places like hotels and malls etc Unsecure networks leave you vulnerable to man in the middle attacks If your archives or records are corrupted and stolen a previous backup of those files will assist in fully restoring them It is important to backup the data and archive it in a reliable cloud storage service or on an external hard drive As a result if a file is lost due to a hacking event or system corruption you will copy those data again The methods mentioned above are some of the most powerful ways to defend your device from malware intrusion or attack happy learning folks thank you |
2021-05-10 22:23:35 |
海外TECH |
Engadget |
NTSB: Video shows owner getting into driver's seat before fatal Tesla crash |
https://www.engadget.com/ntsb-texas-model-s-preliminary-crash-report-222229483.html
|
NTSB Video shows owner getting into driver x s seat before fatal Tesla crashThe National Transportation Safety Board NTSB has released its preliminary report on the fatal Tesla Model S crash that killed two men in Texas last month |
2021-05-10 22:22:29 |
海外科学 |
NYT > Science |
FDA Authorizes Pfizer-BioNTech Vaccine for Children 12 to 15 |
https://www.nytimes.com/2021/05/10/health/pfizer-vaccine-children-kids.html
|
camps |
2021-05-10 22:50:09 |
海外TECH |
WIRED |
US Teens Can Get Their Covid Shot. What’s Next for Schools? |
https://www.wired.com/story/us-teens-can-get-their-covid-shot-whats-next-for-schools
|
US Teens Can Get Their Covid Shot What s Next for Schools Kids as young as are now authorized for Pfizer s shot That could make it easier for campuses to reopen this fallーbut it introduces a whole new set of decisions |
2021-05-10 22:16:29 |
金融 |
金融総合:経済レポート一覧 |
フィンテックによる新しい金融サービスが資産形成を促す |
http://www3.keizaireport.com/report.php/RID/454242/?rss
|
大和総研 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
EIOPAが保険ストレステストの方法論の原則に関する第2のペーパーを公表~流動性リスクへの対応:保険・年金フォーカス |
http://www3.keizaireport.com/report.php/RID/454244/?rss
|
eiopa |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
FRBのFinancial Stability Report~Improving conditions:井上哲也のReview on Central Banking |
http://www3.keizaireport.com/report.php/RID/454246/?rss
|
reportimprovingconditions |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
FX Daily(5月7日)~ドル円、108円台前半まで下落 |
http://www3.keizaireport.com/report.php/RID/454248/?rss
|
fxdaily |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
自助・公助・共助のバランスこそが基本:ニッセイ年金ストラテジー |
http://www3.keizaireport.com/report.php/RID/454250/?rss
|
自助 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
日本株の見通し~年後半は調整必至か:ニッセイ年金ストラテジー |
http://www3.keizaireport.com/report.php/RID/454251/?rss
|
調整 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
J リート保有物件の価格はコロナ禍でも下落せず:ニッセイ年金ストラテジー |
http://www3.keizaireport.com/report.php/RID/454252/?rss
|
研究所 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
毎度おなじみ謎多き雇用統計がテーパリング議論に待ったを:Market Flash |
http://www3.keizaireport.com/report.php/RID/454254/?rss
|
marketflash |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
「健康経営銘柄2021」の評価サマリー ~従業員の健康を重視する法人の見える化 |
http://www3.keizaireport.com/report.php/RID/454259/?rss
|
健康経営銘柄 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
アジア主要通貨・株価の動き(5月7日まで) |
http://www3.keizaireport.com/report.php/RID/454285/?rss
|
国際金融情報センター |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
外資系ファンドによる日本企業の買収は本当に不幸なのか~英CVCキャピタルが東芝へ買収を提案:研究員の眼 |
http://www3.keizaireport.com/report.php/RID/454296/?rss
|
日本企業 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
マーケットフォーカス(欧州市場)2021年5月号 |
http://www3.keizaireport.com/report.php/RID/454302/?rss
|
三井住友トラスト |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
マーケットフォーカス(米国市場)2021年5月号 |
http://www3.keizaireport.com/report.php/RID/454303/?rss
|
三井住友トラスト |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
2021年4月米雇用統計、雇用者数の伸びが鈍化~NYダウ、S&P500指数は過去最高値を更新:マーケットレポート |
http://www3.keizaireport.com/report.php/RID/454304/?rss
|
三井住友トラスト |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
グローバルREITウィークリー 2021年5月第2週号 |
http://www3.keizaireport.com/report.php/RID/454305/?rss
|
日興アセットマネジメント |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
4月の米雇用統計は冴えない結果に / ユーロ:ユーロへの追い風が続く / メキシコペソ:経済改善期待は根強いが懸念点も:Weekly FX Market Focus |
http://www3.keizaireport.com/report.php/RID/454307/?rss
|
weeklyfxmarketfocus |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
政治・経済スケジュール 2021年5月号 |
http://www3.keizaireport.com/report.php/RID/454308/?rss
|
三菱ufj |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
投資環境ウィークリー 2021年5月10日号【日本、米国、欧州、オーストラリア】コロナ感染の地域差が株式市場に影響の模様、分散投資でリスク分散を |
http://www3.keizaireport.com/report.php/RID/454309/?rss
|
三菱ufj |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
2021年のJリートはアフターコロナの回復を期待 |
http://www3.keizaireport.com/report.php/RID/454310/?rss
|
野村アセットマネジメント |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
週間市場レポート(2021年4月26日~5月7日)~日本の株式・債券市場、米国の株式市場、外国為替市場 |
http://www3.keizaireport.com/report.php/RID/454312/?rss
|
債券市場 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
【注目検索キーワード】給付付き税額控除 |
http://search.keizaireport.com/search.php/-/keyword=給付付き税額控除/?rss
|
給付付き税額控除 |
2021-05-11 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
【お薦め書籍】DXの思考法 日本経済復活への最強戦略 |
https://www.amazon.co.jp/exec/obidos/ASIN/4163913599/keizaireport-22/
|
日本経済 |
2021-05-11 00:00:00 |
ニュース |
BBC News - Home |
Queen's Speech: Boris Johnson promises post-Covid skills overhaul |
https://www.bbc.co.uk/news/uk-politics-57060588
|
speech |
2021-05-10 22:15:58 |
ニュース |
BBC News - Home |
Julia James: Man charged with murder of PCSO |
https://www.bbc.co.uk/news/uk-england-kent-57066360
|
community |
2021-05-10 22:09:02 |
ニュース |
BBC News - Home |
Pfizer vaccine authorised by US FDA for adolescents |
https://www.bbc.co.uk/news/world-us-canada-57066286
|
covid |
2021-05-10 22:40:42 |
ニュース |
BBC News - Home |
The papers: 'End in sight' but let's 'use common sense' |
https://www.bbc.co.uk/news/blogs-the-papers-57066013
|
lockdown |
2021-05-10 22:03:02 |
ニュース |
BBC News - Home |
Who is 'just as good if not better' than Foden? - Garth Crooks' team of the week |
https://www.bbc.co.uk/sport/football/57064779
|
Who is x just as good if not better x than Foden Garth Crooks x team of the weekWho is just as good if not better than Foden Which player is not afraid to take charge Find out in Garth Crooks team of the week |
2021-05-10 22:27:14 |
サブカルネタ |
ラーブロ |
其ノ730:【和 dining 清乃(有田市・野)】 |
http://feedproxy.google.com/~r/rablo/~3/PsscU72d8ok/single_feed.php
|
dining |
2021-05-10 23:37:24 |
北海道 |
北海道新聞 |
インスタ子ども版の断念を NY州などの司法長官要請 |
https://www.hokkaido-np.co.jp/article/542347/
|
司法長官 |
2021-05-11 07:08:00 |
ビジネス |
東洋経済オンライン |
米国保守を代表する知識人「ハゾニー」は何者か 自由民主主義に代わる「保守民主主義」の提唱者 | 読書 | 東洋経済オンライン |
https://toyokeizai.net/articles/-/426765?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
新型コロナウイルス |
2021-05-11 07:30:00 |
ニュース |
THE BRIDGE |
Gojek、インドネシア携帯通信大手Telkomselから3億米ドルを追加調達 |
http://feedproxy.google.com/~r/SdJapan/~3/laGdwdbPc0I/telkomsel-injects-us300m-more-into-gojek-to-further-grow-indonesias-digital-lifestyle-sector-20210510
|
Gojek、インドネシア携帯通信大手Telkomselから億米ドルを追加調達今回の投資は、つのテック大手の既存の協力関係の上に成り立っており、デジタルサービスの規模を拡大し、新しい革新的なソリューションを提供する上で、新たな相乗効果をもたらすだろう。 |
2021-05-10 22:15:50 |
GCP |
Cloud Blog |
What’s new with Google Cloud |
https://cloud.google.com/blog/topics/inside-google-cloud/whats-new-google-cloud/
|
What s new with Google CloudWant to know the latest from Google Cloud Find it here in one handy location Check back regularly for our newest updates announcements resources events learning opportunities and more Tip Not sure where to find what you re looking for on the Google Cloud blog Start here Google Cloud blog Full list of topics links and resources Week of May May The era of the transformation cloud is here Google Cloud s president Rob Enslin shares how the era of the transformation cloud has seen organizations move beyond data centers to change not only where their business is done but more importantly how it is done Read more Related ArticleSRE fundamentals SLIs vs SLAs vs SLOsWhat s the difference between an SLI an SLO and an SLA Google Site Reliability Engineers SRE explain Read ArticleWeek of May May Transforming hard disk drive maintenance with predictive ML In collaboration with Seagate we developed a machine learning system that can forecast the probability of a recurring failing diskーa disk that fails or has experienced three or more problems in days Learn how we did it Agent Assist for Chat is now in public preview Agent Assist provides your human agents with continuous support during their calls and now chats by identifying the customers intent and providing them with real time recommendations such as articles and FAQs as well as responses to customer messages to more effectively resolve the conversation Read more New Google Cloud AWS and Azure product map Our updated product map helps you understand similar offerings from Google Cloud AWS and Azure and you can easily filter the list by product name or other common keywords Read more or view the map Join our Google Cloud Security Talks on May th We ll share expert insights into how we re working to be your most trusted cloud Find the list of topics we ll cover here Databricks is now GA on Google Cloud Deploy or migrate Databricks Lakehouse to Google Cloud to combine the benefits of an open data cloud platform with greater analytics flexibility unified infrastructure management and optimized performance Read more HPC VM image is now GA The CentOS based HPC VM image makes it quick and easy to create HPC ready VMs on Google Cloud that are pre tuned for optimal performance Check out our documentation and quickstart guide to start creating instances using the HPC VM image today Take the State of DevOps survey Help us shape the future of DevOps and make your voice heard by completing the State of DevOps survey before June Read more or take the survey OpenTelemetry Trace is now available OpenTelemetry has reached a key milestone the OpenTelemetry Tracing Specification has reached version API and SDK release candidates are available for Java Erlang Python Go Node js and Net Additional languages will follow over the next few weeks Read more New blueprint helps secure confidential data in AI Platform Notebooks We re adding to our portfolio of blueprints with the publication of our Protecting confidential data in AI Platform Notebooks blueprint guide and deployable blueprint which can help you apply data governance and security policies that protect your AI Platform Notebooks containing confidential data Read more The Liquibase Cloud Spanner extension is now GA Liquibase an open source library that works with a wide variety of databases can be used for tracking managing and automating database schema changes By providing the ability to integrate databases into your CI CD process Liquibase helps you more fully adopt DevOps practices The Liquibase Cloud Spanner extension allows developers to use Liquibase s open source database library to manage and automate schema changes in Cloud Spanner Read more Cloud computing Frequently asked questions There are a number of terms and concepts in cloud computing and not everyone is familiar with all of them To help we ve put together a list of common questions and the meanings of a few of those acronyms Read more Related ArticleThis week s stories from Google Cloud April Get a deeper look at the week s stories on the Google Cloud blog Read ArticleWeek of Apr Apr Announcing the GKE Gateway controller in Preview GKE Gateway controller Google Cloud s implementation of the Gateway API manages internal and external HTTP S load balancing for a GKE cluster or a fleet of GKE clusters and provides multi tenant sharing of load balancer infrastructure with centralized admin policy and control Read more See Network Performance for Google Cloud in Performance Dashboard The Google Cloud performance view part of the Network Intelligence Center provides packet loss and latency metrics for traffic on Google Cloud It allows users to do informed planning of their deployment architecture as well as determine in real time the answer to the most common troubleshooting question Is it Google or is it me The Google Cloud performance view is now open for all Google Cloud customers as a public preview Check it out Optimizing data in Google Sheets allows users to create no code apps Format columns and tables in Google Sheets to best position your data to transform into a fully customized successful app no coding necessary Read our four best Google Sheets tips Automation bots with AppSheet Automation AppSheet recently released AppSheet Automation infusing Google AI capabilities to AppSheet s trusted no code app development platform Learn step by step how to build your first automation bot on AppSheet here Google Cloud announces a new region in Israel Our new region in Israel will make it easier for customers to serve their own users faster more reliably and securely Read more New multi instance NVIDIA GPUs on GKE We re launching support for multi instance GPUs in GKE currently in Preview which will help you drive better value from your GPU investments Read more Partnering with NSF to advance networking innovation We announced our partnership with the U S National Science Foundation NSF joining other industry partners and federal agencies as part of a combined million investment in academic research for Resilient and Intelligent Next Generation NextG Systems or RINGS Read more Creating a policy contract with Configuration as Data Configuration as Data is an emerging cloud infrastructure management paradigm that allows developers to declare the desired state of their applications and infrastructure without specifying the precise actions or steps for how to achieve it However declaring a configuration is only half the battle you also want policy that defines how a configuration is to be used This post shows you how Google Cloud products deliver real time data solutions Seven Eleven Japan built Seven Central its new platform for digital transformation on Google Cloud Powered by BigQuery Cloud Spanner and Apigee API management Seven Central presents easy to understand data ultimately allowing for quickly informed decisions Read their story here Related ArticleThis week on the Google Cloud blog April Here s a round up of the key stories we published this week Read ArticleWeek of Apr Apr Extreme PD is now GA On April th Google Cloud s Persistent Disk launched general availability of Extreme PD a high performance block storage volume with provisioned IOPS and up to GB s of throughput Learn more Research How data analytics and intelligence tools to play a key role post COVID A recent Google commissioned study by IDG highlighted the role of data analytics and intelligent solutions when it comes to helping businesses separate from their competition The survey of IT leaders across the globe reinforced the notion that the ability to derive insights from data will go a long way towards determining which companies win in this new era Learn more or download the study Introducing PHP on Cloud Functions We re bringing support for PHP a popular general purpose programming language to Cloud Functions With the Functions Framework for PHP you can write idiomatic PHP functions to build business critical applications and integration layers And with Cloud Functions for PHP now available in Preview you can deploy functions in a fully managed PHP environment complete with access to resources in a private VPC network Learn more Delivering our CCAG pooled audit As our customers increased their use of cloud services to meet the demands of teleworking and aid in COVID recovery we ve worked hard to meet our commitment to being the industry s most trusted cloud despite the global pandemic We re proud to announce that Google Cloud completed an annual pooled audit with the CCAG in a completely remote setting and were the only cloud service provider to do so in Learn more Anthos now available We recently released Anthos our run anywhere Kubernetes platform that s connected to Google Cloud delivering an array of capabilities that make multicloud more accessible and sustainable Learn more New Redis Enterprise for Anthos and GKE We re making Redis Enterprise for Anthos and Google Kubernetes Engine GKE available in the Google Cloud Marketplace in private preview Learn more Updates to Google Meet We introduced a refreshed user interface UI enhanced reliability features powered by the latest Google AI and tools that make meetings more engagingーeven funーfor everyone involved Learn more DocAI solutions now generally available Document Doc AI platform Lending DocAI and Procurement DocAI built on decades of AI innovation at Google bring powerful and useful solutions across lending insurance government and other industries Learn more Four consecutive years of renewable energy In Google again matched percent of its global electricity use with purchases of renewable energy All told we ve signed agreements to buy power from more than renewable energy projects with a combined capacity of gigawatts about the same as a million solar rooftops Learn more Announcing the Google Cloud region picker The Google Cloud region picker lets you assess key inputs like price latency to your end users and carbon footprint to help you choose which Google Cloud region to run on Learn more Google Cloud launches new security solution WAAP WebApp and API Protection WAAP combines Google Cloud Armor Apigee and reCAPTCHA Enterprise to deliver improved threat protection consolidated visibility and greater operational efficiencies across clouds and on premises environments Learn more about WAAP here New in no code As discussed in our recent article no code hackathons are trending among innovative organizations Since then we ve outlined how you can host one yourself specifically designed for your unique business innovation outcomes Learn how here Google Cloud Referral Program now availableーNow you can share the power of Google Cloud and earn product credit for every new paying customer you refer Once you join the program you ll get a unique referral link that you can share with friends clients or others Whenever someone signs up with your link they ll get a product creditーthat s more than the standard trial credit When they become a paying customer we ll reward you with a product credit in your Google Cloud account Available in the United States Canada Brazil and Japan Apply for the Google Cloud Referral Program Related Article resources to help you get started with SREHere are our top five Google Cloud resources for getting started on your SRE journey Read ArticleWeek of Apr Apr Announcing the Data Cloud Summit May At this half day event you ll learn how leading companies like PayPal Workday Equifax Zebra Technologies Commonwealth Care Alliance and many others are driving competitive differentiation using Google Cloud technologies to build their data clouds and transform data into value that drives innovation Learn more and register at no cost Announcing the Financial Services Summit May In this hour event you ll learn how Google Cloud is helping financial institutions including PayPal Global Payments HSBC Credit Suisse and more unlock new possibilities and accelerate business through innovation and better customer experiences Learn more and register for free Global amp EMEA How Google Cloud is enabling vaccine equity In our latest update we share more on how we re working with US state governments to help produce equitable vaccination strategies at scale Learn more The new Google Cloud region in Warsaw is open The Google Cloud region in Warsaw is now ready for business opening doors for organizations in Central and Eastern Europe Learn more AppSheet Automation is now GA Google Cloud s AppSheet launches general availability of AppSheet Automation a unified development experience for citizen and professional developers alike to build custom applications with automated processes all without coding Learn how companies and employees are reclaiming their time and talent with AppSheet Automation here Introducing SAP Integration with Cloud Data Fusion Google Cloud native data integration platform Cloud Data Fusion now offers the capability to seamlessly get data out of SAP Business Suite SAP ERP and S HANA Learn more Related Article cheat sheets to help you get started on your Google Cloud journeyWhether you need to determine the best way to move to the cloud or decide on the best storage option we ve built a number of cheat shee Read ArticleWeek of Apr Apr New Certificate Authority Service CAS whitepaper “How to deploy a secure and reliable public key infrastructure with Google Cloud Certificate Authority Service written by Mark Cooper of PKI Solutions and Anoosh Saboori of Google Cloud covers security and architectural recommendations for the use of the Google Cloud CAS by organizations and describes critical concepts for securing and deploying a PKI based on CAS Learn more or read the whitepaper Active Assist s new feature predictive autoscaling helps improve response times for your applications When you enable predictive autoscaling Compute Engine forecasts future load based on your Managed Instance Group s MIG history and scales it out in advance of predicted load so that new instances are ready to serve when the load arrives Without predictive autoscaling an autoscaler can only scale a group reactively based on observed changes in load in real time With predictive autoscaling enabled the autoscaler works with real time data as well as with historical data to cover both the current and forecasted load That makes predictive autoscaling ideal for those apps with long initialization times and whose workloads vary predictably with daily or weekly cycles For more information see How predictive autoscaling works or check if predictive autoscaling is suitable for your workload and to learn more about other intelligent features check out Active Assist Introducing Dataprep BigQuery pushdown BigQuery pushdown gives you the flexibility to run jobs using either BigQuery or Dataflow If you select BigQuery then Dataprep can automatically determine if data pipelines can be partially or fully translated in a BigQuery SQL statement Any portions of the pipeline that cannot be run in BigQuery are executed in Dataflow Utilizing the power of BigQuery results in highly efficient data transformations especially for manipulations such as filters joins unions and aggregations This leads to better performance optimized costs and increased security with IAM and OAuth support Learn more Announcing the Google Cloud Retail amp Consumer Goods Summit The Google Cloud Retail amp Consumer Goods Summit brings together technology and business insights the key ingredients for any transformation Whether you re responsible for IT data analytics supply chains or marketing please join Building connections and sharing perspectives cross functionally is important to reimagining yourself your organization or the world Learn more or register for free New IDC whitepaper assesses multicloud as a risk mitigation strategy To better understand the benefits and challenges associated with a multicloud approach we supported IDC s new whitepaper that investigates how multicloud can help regulated organizations mitigate the risks of using a single cloud vendor The whitepaper looks at different approaches to multi vendor and hybrid clouds taken by European organizations and how these strategies can help organizations address concentration risk and vendor lock in improve their compliance posture and demonstrate an exit strategy Learn more or download the paper Introducing request priorities for Cloud Spanner APIs You can now specify request priorities for some Cloud Spanner APIs By assigning a HIGH MEDIUM or LOW priority to a specific request you can now convey the relative importance of workloads to better align resource usage with performance objectives Learn more How we re working with governments on climate goals Google Sustainability Officer Kate Brandt shares more on how we re partnering with governments around the world to provide our technology and insights to drive progress in sustainability efforts Learn more Related ArticleIn case you missed it All our free Google Cloud training opportunities from QSince January we ve introduced a number of no cost training opportunities to help you grow your cloud skills We ve brought them togethe Read ArticleWeek of Mar Apr Why Google Cloud is the ideal platform for Block one and other DLT companies Late last year Google Cloud joined the EOS community a leading open source platform for blockchain innovation and performance and is taking steps to support the EOS Public Blockchain by becoming a block producer BP At the time we outlined how our planned participation underscores the importance of blockchain to the future of business government and society We re sharing more on why Google Cloud is uniquely positioned to be an excellent partner for Block one and other distributed ledger technology DLT companies Learn more New whitepaper Scaling certificate management with Certificate Authority Service As Google Cloud s Certificate Authority Service CAS approaches general availability we want to help customers understand the service better Customers have asked us how CAS fits into our larger security story and how CAS works for various use cases Our new white paper answers these questions and more Learn more and download the paper Build a consistent approach for API consumers Learn the differences between REST and GraphQL as well as how to apply REST based practices to GraphQL No matter the approach discover how to manage and treat both options as API products here Apigee X makes it simple to apply Cloud CDN to APIs With Apigee X and Cloud CDN organizations can expand their API programs global reach Learn how to deploy APIs across regions and zones here Enabling data migration with Transfer Appliances in APACーWe re announcing the general availability of Transfer Appliances TA TA in Singapore Customers are looking for fast secure and easy to use options to migrate their workloads to Google Cloud and we are addressing their needs with Transfer Appliances globally in the US EU and APAC Learn more about Transfer Appliances TA and TA Windows Authentication is now supported on Cloud SQL for SQL Server in public previewーWe ve launched seamless integration with Google Cloud s Managed Service for Microsoft Active Directory AD This capability is a critical requirement to simplify identity management and streamline the migration of existing SQL Server workloads that rely on AD for access control Learn more or get started Using Cloud AI to whip up new treats with Mars MaltesersーMaltesers a popular British candy made by Mars teamed up with our own AI baker and ML engineer extraordinaire Sara Robinson to create a brand new dessert recipe with Google Cloud AI Find out what happened recipe included Simplifying data lake management with Dataproc Metastore now GAーDataproc Metastore a fully managed serverless technical metadata repository based on the Apache Hive metastore is now generally available Enterprises building and migrating open source data lakes to Google Cloud now have a central and persistent metastore for their open source data analytics frameworks Learn more Introducing the Echo subsea cableーWe announced our investment in Echo the first ever cable to directly connect the U S to Singapore with direct fiber pairs over an express route Echo will run from Eureka California to Singapore with a stop over in Guam and plans to also land in Indonesia Additional landings are possible in the future Learn more Related Article quick tips for making the most of Gmail Meet Calendar and more in Google WorkspaceWhether you re looking to stay on top of your inbox or make the most of virtual meetings most of us can benefit from quick productivity Read ArticleWeek of Mar Mar new videos bring Google Cloud to lifeーThe Google Cloud Tech YouTube channel s latest video series explains cloud tools for technical practitioners in about minutes each Learn more BigQuery named a Leader in the Forrester Wave Cloud Data Warehouse Q reportーForrester gave BigQuery a score of out of across different criteria Learn more in our blog post or download the report Charting the future of custom compute at GoogleーTo meet users performance needs at low power we re doubling down on custom chips that use System on a Chip SoC designs Learn more Introducing Network Connectivity CenterーWe announced Network Connectivity Center which provides a single management experience to easily create connect and manage heterogeneous on prem and cloud networks leveraging Google s global infrastructure Network Connectivity Center serves as a vantage point to seamlessly connect VPNs partner and dedicated interconnects as well as third party routers and Software Defined WANs helping you optimize connectivity reduce operational burden and lower costsーwherever your applications or users may be Learn more Making it easier to get Compute Engine resources for batch processingーWe announced a new method of obtaining Compute Engine instances for batch processing that accounts for availability of resources in zones of a region Now available in preview for regional managed instance groups you can do this simply by specifying the ANY value in the API Learn more Next gen virtual automotive showrooms are here thanks to Google Cloud Unreal Engine and NVIDIAーWe teamed up with Unreal Engine the open and advanced real time D creation game engine and NVIDIA inventor of the GPU to launch new virtual showroom experiences for automakers Taking advantage of the NVIDIA RTX platform on Google Cloud these showrooms provide interactive D experiences photorealistic materials and environments and up to K cloud streaming on mobile and connected devices Today in collaboration with MHP the Porsche IT consulting firm and MONKEYWAY a real time D streaming solution provider you can see our first virtual showroom the Pagani Immersive Experience Platform Learn more Troubleshoot network connectivity with Dynamic Verification public preview ーYou can now check packet loss rate and one way network latency between two VMs on GCP This capability is an addition to existing Network Intelligence Center Connectivity Tests which verify reachability by analyzing network configuration in your VPCs See more in our documentation Helping U S states get the COVID vaccine to more peopleーIn February we announced our Intelligent Vaccine Impact solution IVIs to help communities rise to the challenge of getting vaccines to more people quickly and effectively Many states have deployed IVIs and have found it able to meet demand and easily integrate with their existing technology infrastructures Google Cloud is proud to partner with a number of states across the U S including Arizona the Commonwealth of Massachusetts North Carolina Oregon and the Commonwealth of Virginia to support vaccination efforts at scale Learn more Related Article Google Cloud tools each explained in under minutesNeed a quick overview of Google Cloud core technologies Quickly learn these Google Cloud productsーeach explained in under two minutes Read ArticleWeek of Mar Mar A VMs now GA The largest GPU cloud instances with NVIDIA A GPUsーWe re announcing the general availability of A VMs based on the NVIDIA Ampere A Tensor Core GPUs in Compute Engine This means customers around the world can now run their NVIDIA CUDA enabled machine learning ML and high performance computing HPC scale out and scale up workloads more efficiently and at a lower cost Learn more Earn the new Google Kubernetes Engine skill badge for freeーWe ve added a new skill badge this month Optimize Costs for Google Kubernetes Engine GKE which you can earn for free when you sign up for the Kubernetes track of the skills challenge The skills challenge provides days free access to Google Cloud labs and gives you the opportunity to earn skill badges to showcase different cloud competencies to employers Learn more Now available carbon free energy percentages for our Google Cloud regionsーGoogle first achieved carbon neutrality in and since we ve purchased enough solar and wind energy to match of our global electricity consumption Now we re building on that progress to target a new sustainability goal running our business on carbon free energy everywhere by Beginning this week we re sharing data about how we are performing against that objective so our customers can select Google Cloud regions based on the carbon free energy supplying them Learn more Increasing bandwidth to C and N VMsーWe announced the public preview of and Gbps high bandwidth network configurations for General Purpose N and Compute Optimized C Compute Engine VM families as part of continuous efforts to optimize our Andromeda host networking stack This means we can now offer higher bandwidth options on existing VM families when using the Google Virtual NIC gVNIC These VMs were previously limited to Gbps Learn more New research on how COVID changed the nature of ITーTo learn more about the impact of COVID and the resulting implications to IT Google commissioned a study by IDG to better understand how organizations are shifting their priorities in the wake of the pandemic Learn more and download the report New in API securityーGoogle Cloud Apigee API management platform s latest release Apigee X works with Cloud Armor to protect your APIs with advanced security technology including DDoS protection geo fencing OAuth and API keys Learn more about our integrated security enhancements here Troubleshoot errors more quickly with Cloud LoggingーThe Logs Explorer now automatically breaks down your log results by severity making it easy to spot spikes in errors at specific times Learn more about our new histogram functionality here The Logs Explorer histogramWeek of Mar Mar Introducing AskGoogleCloud on Twitter and YouTubeーOur first segment on March th features Developer Advocates Stephanie Wong Martin Omander and James Ward to answer questions on the best workloads for serverless the differences between “serverless and “cloud native how to accurately estimate costs for using Cloud Run and much more Learn more Learn about the value of no code hackathonsーGoogle Cloud s no code application development platform AppSheet helps to facilitate hackathons for “non technical employees with no coding necessary to compete Learn about Globe Telecom s no code hackathon as well as their winning AppSheet app here Introducing Cloud Code Secret Manager IntegrationーSecret Manager provides a central place and single source of truth to manage access and audit secrets across Google Cloud Integrating Cloud Code with Secret Manager brings the powerful capabilities of both these tools together so you can create and manage your secrets right from within your preferred IDE whether that be VS Code IntelliJ or Cloud Shell Editor Learn more Flexible instance configurations in Cloud SQLーCloud SQL for MySQL now supports flexible instance configurations which offer you the extra freedom to configure your instance with the specific number of vCPUs and GB of RAM that fits your workload To set up a new instance with a flexible instance configuration see our documentation here The Cloud Healthcare Consent Management API is now generally availableーThe Healthcare Consent Management API is now GA giving customers the ability to greatly scale the management of consents to meet increasing need particularly amidst the emerging task of managing health data for new care and research scenarios Learn more Related ArticlePicture this whiteboard sketch videos that bring Google Cloud to lifeIf you re looking for a visual way to learn Google Cloud products we ve got you covered The Google Cloud Tech YouTube channel has a ser Read ArticleWeek of Mar Mar Cloud Run is now available in all Google Cloud regions Learn more Introducing Apache Spark Structured Streaming connector for Pub Sub LiteーWe re announcing the release of an open source connector to read streams of messages from Pub Sub Lite into Apache Spark The connector works in all Apache Spark X distributions including Dataproc Databricks or manual Spark installations Learn more Google Cloud Next is October ーJoin us and learn how the most successful companies have transformed their businesses with Google Cloud Sign up at g co cloudnext for updates Learn more Hierarchical firewall policies now GAーHierarchical firewalls provide a means to enforce firewall rules at the organization and folder levels in the GCP Resource Hierarchy This allows security administrators at different levels in the hierarchy to define and deploy consistent firewall rules across a number of projects so they re applied to all VMs in currently existing and yet to be created projects Learn more Announcing the Google Cloud Born Digital SummitーOver this half day event we ll highlight proven best practice approaches to data architecture diversity amp inclusion and growth with Google Cloud solutions Learn more and register for free Google Cloud products in words or less edition ーOur popular “ words or less Google Cloud developer s cheat sheet is back and updated for Learn more Gartner names Google a leader in its Magic Quadrant for Cloud AI Developer Services reportーWe believe this recognition is based on Gartner s evaluation of Google Cloud s language vision conversational and structured data services and solutions for developers Learn more Announcing the Risk Protection ProgramーThe Risk Protection Program offers customers peace of mind through the technology to secure their data the tools to monitor the security of that data and an industry first cyber policy offered by leading insurers Learn more Building the future of workーWe re introducing new innovations in Google Workspace to help people collaborate and find more time and focus wherever and however they work Learn more Assured Controls and expanded Data RegionsーWe ve added new information governance features in Google Workspace to help customers control their data based on their business goals Learn more Week of Feb Feb Google Cloud tools explained in minutesーNeed a quick overview of Google Cloud core technologies Quickly learn these Google Cloud productsーeach explained in under two minutes Learn more BigQuery materialized views now GAーMaterialized views MV s are precomputed views that periodically cache results of a query to provide customers increased performance and efficiency Learn more New in BigQuery BI EngineーWe re extending BigQuery BI Engine to work with any BI or custom dashboarding applications that require sub second query response times In this preview BI Engine will work seamlessly with Looker and other popular BI tools such as Tableau and Power BI without requiring any change to the BI tools Learn more Dataproc now supports Shielded VMsーAll Dataproc clusters created using Debian or Ubuntu operating systems now use Shielded VMs by default and customers can provide their own configurations for secure boot vTPM and Integrity Monitoring This feature is just one of the many ways customers that have migrated their Hadoop and Spark clusters to GCP experience continued improvements to their security postures without any additional cost New Cloud Security Podcast by GoogleーOur new podcast brings you stories and insights on security in the cloud delivering security from the cloud and of course on what we re doing at Google Cloud to help keep customer data safe and workloads secure Learn more New in Conversational AI and Apigee technologyーAustralian retailer Woolworths provides seamless customer experiences with their virtual agent Olive Apigee API Management and Dialogflow technology allows customers to talk to Olive through voice and chat Learn more Introducing GKE AutopilotーGKE already offers an industry leading level of automation that makes setting up and operating a Kubernetes cluster easier and more cost effective than do it yourself and other managed offerings Autopilot represents a significant leap forward In addition to the fully managed control plane that GKE has always provided using the Autopilot mode of operation automatically applies industry best practices and can eliminate all node management operations maximizing your cluster efficiency and helping to provide a stronger security posture Learn more Partnering with Intel to accelerate cloud native GーAs we continue to grow cloud native services for the telecommunications industry we re excited to announce a collaboration with Intel to develop reference architectures and integrated solutions for communications service providers to accelerate their deployment of G and edge network solutions Learn more Veeam Backup for Google Cloud now availableーVeeam Backup for Google Cloud automates Google native snapshots to securely protect VMs across projects and regions with ultra low RPOs and RTOs and store backups in Google Object Storage to enhance data protection while ensuring lower costs for long term retention Migrate for Anthos GAーWithMigrate for Anthos customers and partners can automatically migrate and modernize traditional application workloads running in VMs into containers running on Anthos or GKE Included in this new release In place modernization for Anthos on AWS Public Preview to help customers accelerate on boarding to Anthos AWS while leveraging their existing investment in AWS data sources projects VPCs and IAM controls Additional Docker registries and artifacts repositories support GA including AWS ECR basic auth docker registries and AWS S storage to provide further flexibility for customers using Anthos Anywhere on prem AWS etc HTTPS Proxy support GA to enable MA functionality access to external image repos and other services where a proxy is used to control external access Week of Feb Feb Introducing Cloud Domains in previewーCloud Domains simplify domain registration and management within Google Cloud improve the custom domain experience for developers increase security and support stronger integrations around DNS and SSL Learn more Announcing Databricks on Google CloudーOur partnership with Databricks enables customers to accelerate Databricks implementations by simplifying their data access by jointly giving them powerful ways to analyze their data and by leveraging our combined AI and ML capabilities to impact business outcomes Learn more Service Directory is GAーAs the number and diversity of services grows it becomes increasingly challenging to maintain an inventory of all of the services across an organization Last year we launched Service Directory to help simplify the problem of service management Today it s generally available Learn more Week of Feb Feb Introducing Bare Metal Solution for SAP workloadsーWe ve expanded our Bare Metal Solutionーdedicated single tenant systems designed specifically to run workloads that are too large or otherwise unsuitable for standard virtualized environmentsーto include SAP certified hardware options giving SAP customers great options for modernizing their biggest and most challenging workloads Learn more TB SSDs bring ultimate IOPS to Compute Engine VMsーYou can now attach TB and TB Local SSD to second generation general purpose N Compute Engine VMs for great IOPS per dollar Learn more Supporting the Python ecosystemーAs part of our longstanding support for the Python ecosystem we are happy to increase our support for the Python Software Foundation the non profit behind the Python programming language ecosystem and community Learn more Migrate to regional backend services for Network Load BalancingーWe now support backend services with Network Load Balancingーa significant enhancement over the prior approach target pools providing a common unified data model for all our load balancing family members and accelerating the delivery of exciting features on Network Load Balancing Learn more Week of Feb Feb Apigee launches Apigee XーApigee celebrates its year anniversary with Apigee X a new release of the Apigee API management platform Apigee X harnesses the best of Google technologies to accelerate and globalize your API powered digital initiatives Learn more about Apigee X and digital excellence here Celebrating the success of Black founders with Google Cloud during Black History MonthーFebruary is Black History Month a time for us to come together to celebrate and remember the important people and history of the African heritage Over the next four weeks we will highlight four Black led startups and how they use Google Cloud to grow their businesses Our first featurehighlights TQIntelligence and its founder Yared Week of Jan Jan BeyondCorp Enterprise now generally availableーBeyondCorp Enterprise is a zero trust solution built on Google s global network which provides customers with simple and secure access to applications and cloud resources and offers integrated threat and data protection To learn more read the blog post visit our product homepage and register for our upcoming webinar Week of Jan Jan Cloud Operations Sandbox now availableーCloud Operations Sandbox is an open source tool that helps you learn SRE practices from Google and apply them on cloud services using Google Cloud s operations suite formerly Stackdriver with everything you need to get started in one click You can read our blog post or get started by visiting cloud ops sandbox dev exploring the project repo and following along in the user guide New data security strategy whitepaperーOur new whitepaper shares our best practices for how to deploy a modern and effective data security program in the cloud Read the blog post or download the paper WebSockets HTTP and gRPC bidirectional streams come to Cloud RunーWith these capabilities you can deploy new kinds of applications to Cloud Run that were not previously supported while taking advantage of serverless infrastructure These features are now available in public preview for all Cloud Run locations Read the blog post or check out the WebSockets demo app or the sample hc server app New tutorial Build a no code workout app in stepsーLooking to crush your new year s resolutions Using AppSheet Google Cloud s no code app development platform you can build a custom fitness app that can do things like record your sets reps and weights log your workouts and show you how you re progressing Learn how Week of Jan Jan State of API Economy Report now availableーGoogle Cloud details the changing role of APIs in amidst the COVID pandemic informed by a comprehensive study of Apigee API usage behavior across industry geography enterprise size and more Discover these trends along with a projection of what to expect from APIs in Read our blog post here or download and read the report here New in the state of no codeーGoogle Cloud s AppSheet looks back at the key no code application development themes of AppSheet contends the rising number of citizen developer app creators will ultimately change the state of no code in Read more here Week of Jan Jan Last year s most popular API postsーIn an arduous year thoughtful API design and strategy is critical to empowering developers and companies to use technology for global good Google Cloud looks back at the must read API posts in Read it here Week of Dec Dec A look back at the year across Google CloudーLooking for some holiday reading We ve published recaps of our year across databases serverless data analytics and no code development Or take a look at our most popular posts of Week of Dec Dec Memorystore for Redis enables TLS encryption support Preview ーWith this release you can now use Memorystore for applications requiring sensitive data to be encrypted between the client and the Memorystore instance Read more here Monitoring Query Language MQL for Cloud Monitoring is now generally availableーMonitoring Query language provides developers and operators on IT and development teams powerful metric querying analysis charting and alerting capabilities This functionality is needed for Monitoring use cases that include troubleshooting outages root cause analysis custom SLI SLO creation reporting and analytics complex alert logic and more Learn more Week of Dec Dec Memorystore for Redis now supports Redis AUTHーWith this release you can now use OSS Redis AUTH feature with Memorystore for Redis instances Read more here New in serverless computingーGoogle Cloud API Gateway and its service first approach to developing serverless APIs helps organizations accelerate innovation by eliminating scalability and security bottlenecks for their APIs Discover more benefits here Environmental Dynamics Inc makes a big move to no codeーThe environmental consulting company EDI built and deployed business apps with no coding skills necessary with Google Cloud s AppSheet This no code effort not only empowered field workers but also saved employees over hours a year Get the full story here Introducing Google Workspace for GovernmentーGoogle Workspace for Government is an offering that brings the best of Google Cloud s collaboration and communication tools to the government with pricing that meets the needs of the public sector Whether it s powering social care visits employment support or virtual courts Google Workspace helps governments meet the unique challenges they face as they work to provide better services in an increasingly virtual world Learn more Week of Nov Dec Google enters agreement to acquire ActifioーActifio a leader in backup and disaster recovery DR offers customers the opportunity to protect virtual copies of data in their native format manage these copies throughout their entire lifecycle and use these copies for scenarios like development and test This planned acquisition further demonstrates Google Cloud s commitment to helping enterprises protect workloads on premises and in the cloud Learn more Traffic Director can now send traffic to services and gateways hosted outside of Google CloudーTraffic Director support for Hybrid Connectivity Network Endpoint Groups NEGs now generally available enables services in your VPC network to interoperate more seamlessly with services in other environments It also enables you to build advanced solutions based on Google Cloud s portfolio of networking products such as Cloud Armor protection for your private on prem services Learn more Google Cloud launches the Healthcare Interoperability Readiness ProgramーThis program powered by APIs and Google Cloud s Apigee helps patients doctors researchers and healthcare technologists alike by making patient data and healthcare data more accessible and secure Learn more here Container Threat Detection in Security Command CenterーWe announced the general availability of Container Threat Detection a built in service in Security Command Center This release includes multiple detection capabilities to help you monitor and secure your container deployments in Google Cloud Read more here Anthos on bare metal now GAーAnthos on bare metal opens up new possibilities for how you run your workloads and where You can run Anthos on your existing virtualized infrastructure or eliminate the dependency on a hypervisor layer to modernize applications while reducing costs Learn more Week of Nov Tuning control support in Cloud SQL for MySQLーWe ve made all flags that were previously in preview now generally available GA empowering you with the controls you need to optimize your databases See the full list here New in BigQuery MLーWe announced the general availability of boosted trees using XGBoost deep neural networks DNNs using TensorFlow and model export for online prediction Learn more New AI ML in retail reportーWe recently commissioned a survey of global retail executives to better understand which AI ML use cases across the retail value chain drive the highest value and returns in retail and what retailers need to keep in mind when going after these opportunities Learn more or read the report Week of Nov New whitepaper on how AI helps the patent industryーOur new paper outlines a methodology to train a BERT bidirectional encoder representation from transformers model on over million patent publications from the U S and other countries using open source tooling Learn more or read the whitepaper Google Cloud support for NET ーLearn more about our support of NET as well as how to deploy it to Cloud Run NET Core now on Cloud FunctionsーWith this integration you can write cloud functions using your favorite NET Core runtime with our Functions Framework for NET for an idiomatic developer experience Learn more Filestore Backups in previewーWe announced the availability of the Filestore Backups preview in all regions making it easier to migrate your business continuity disaster recovery and backup strategy for your file systems in Google Cloud Learn more Introducing Voucher a service to help secure the container supply chainーDeveloped by the Software Supply Chain Security team at Shopify to work with Google Cloud tools Voucher evaluates container images created by CI CD pipelines and signs those images if they meet certain predefined security criteria Binary Authorization then validates these signatures at deploy time ensuring that only explicitly authorized code that meets your organizational policy and compliance requirements can be deployed to production Learn more most watched from Google Cloud Next OnAirーTake a stroll through the sessions that were most popular from Next OnAir covering everything from data analytics to cloud migration to no code development Read the blog Artifact Registry is now GAーWith support for container images Maven npm packages and additional formats coming soon Artifact Registry helps your organization benefit from scale security and standardization across your software supply chain Read the blog Week of Nov Introducing the Anthos Developer SandboxーThe Anthos Developer Sandbox gives you an easy way to learn to develop on Anthos at no cost available to anyone with a Google account Read the blog Database Migration Service now available in previewーDatabase Migration Service DMS makes migrations to Cloud SQL simple and reliable DMS supports migrations of self hosted MySQL databasesーeither on premises or in the cloud as well as managed databases from other cloudsーto Cloud SQL for MySQL Support for PostgreSQL is currently available for limited customers in preview with SQL Server coming soon Learn more Troubleshoot deployments or production issues more quickly with new logs tailingーWe ve added support for a new API to tail logs with low latency Using gcloud it allows you the convenience of tail f with the powerful query language and centralized logging solution of Cloud Logging Learn more about this preview feature Regionalized log storage now available in new regions in previewーYou can now select where your logs are stored from one of five regions in addition to globalーasia east europe west us central us east and us west When you create a logs bucket you can set the region in which you want to store your logs data Get started with this guide Week of Nov Cloud SQL adds support for PostgreSQL ーShortly after its community GA Cloud SQL has added support for PostgreSQL You get access to the latest features of PostgreSQL while Cloud SQL handles the heavy operational lifting so your team can focus on accelerating application delivery Read more here Apigee creates value for businesses running on SAPーGoogle Cloud s API Management platform Apigee is optimized for data insights and data monetization helping businesses running on SAP innovate faster without fear of SAP specific challenges to modernization Read more here Document AI platform is liveーThe new Document AI DocAI platform a unified console for document processing is now available in preview You can quickly access all parsers tools and solutions e g Lending DocAI Procurement DocAI with a unified API enabling an end to end document solution from evaluation to deployment Read the full story here or check it out in your Google Cloudconsole Accelerating data migration with Transfer Appliances TA and TAーWe re announcing the general availability of new Transfer Appliances Customers are looking for fast secure and easy to use options to migrate their workloads to Google Cloud and we are addressing their needs with next generation Transfer Appliances Learn more about Transfer Appliances TA and TA Week of Oct B H Inc accelerates digital transformationーThe Utah based contracting and construction company BHI eliminated IT backlog when non technical employees were empowered to build equipment inspection productivity and other custom apps by choosing Google Workspace and the no code app development platform AppSheet Read the full story here Globe Telecom embraces no code developmentーGoogle Cloud s AppSheet empowers Globe Telecom employees to do more innovating with less code The global communications company kickstarted their no code journey by combining the power of AppSheet with a unique adoption strategy As a result AppSheet helped Globe Telecom employees build business apps in just weeks Get the full story Cloud Logging now allows you to control access to logs via Log ViewsーBuilding on the control offered via Log Buckets blog post you can now configure who has access to logs based on the source project resource type or log name all using standard IAM controls Logs views currently in Preview can help you build a system using the principle of least privilege limiting sensitive logs to only users who need this information Learn more about Log Views Document AI is HIPAA compliantーDocument AI now enables HIPAA compliance Now Healthcare and Life Science customers such as health care providers health plans and life science organizations can unlock insights by quickly extracting structured data from medical documents while safeguarding individuals protected health information PHI Learn more about Google Cloud s nearly products that support HIPAA compliance Week of Oct Improved security and governance in Cloud SQL for PostgreSQLーCloud SQL for PostgreSQL now integrates with Cloud IAM preview to provide simplified and consistent authentication and authorization Cloud SQL has also enabled PostgreSQL Audit Extension preview for more granular audit logging Read the blog Announcing the AI in Financial Crime Compliance webinarーOur executive digital forum will feature industry executives academics and former regulators who will discuss how AI is transforming financial crime compliance on November Register now Transforming retail with AI MLーNew research provides insights on high value AI ML use cases for food drug mass merchant and speciality retail that can drive significant value and build resilience for your business Learn what the top use cases are for your sub segment and read real world success stories Download the ebook here and view this companion webinar which also features insights from Zulily New release of Migrate for AnthosーWe re introducing two important new capabilities in the release of Migrate for Anthos Google Cloud s solution to easily migrate and modernize applications currently running on VMs so that they instead run on containers in Google Kubernetes Engine or Anthos The first is GA support for modernizing IIS apps running on Windows Server VMs The second is a new utility that helps you identify which VMs in your existing environment are the best targets for modernization to containers Start migrating or check out the assessment tool documentation Linux Windows New Compute Engine autoscaler controlsーNew scale in controls in Compute Engine let you limit the VM deletion rate by preventing the autoscaler from reducing a MIG s size by more VM instances than your workload can tolerate to lose Read the blog Lending DocAI in previewーLending DocAI is a specialized solution in our Document AI portfolio for the mortgage industry that processes borrowers income and asset documents to speed up loan applications Read the blog or check out the product demo Week of Oct New maintenance controls for Cloud SQLーCloud SQL now offers maintenance deny period controls which allow you to prevent automatic maintenance from occurring during a day time period Read the blog Trends in volumetric DDoS attacksーThis week we published a deep dive into DDoS threats detailing the trends we re seeing and giving you a closer look at how we prepare for multi terabit attacks so your sites stay up and running Read the blog New in BigQueryーWe shared a number of updates this week including new SQL capabilities more granular control over your partitions with time unit partitioning the general availability of Table ACLs and BigQuery System Tables Reports a solution that aims to help you monitor BigQuery flat rate slot and reservation utilization by leveraging BigQuery s underlying INFORMATION SCHEMA views Read the blog Cloud Code makes YAML easy for hundreds of popular Kubernetes CRDsーWe announced authoring support for more than popular Kubernetes CRDs out of the box any existing CRDs in your Kubernetes cluster and any CRDs you add from your local machine or a URL Read the blog Google Cloud s data privacy commitments for the AI eraーWe ve outlined how our AI ML Privacy Commitment reflects our belief that customers should have both the highest level of security and the highest level of control over data stored in the cloud Read the blog New lower pricing for Cloud CDNーWe ve reduced the price of cache fill content fetched from your origin charges across the board by up to along with our recent introduction of a new set of flexible caching capabilities to make it even easier to use Cloud CDN to optimize the performance of your applications Read the blog Expanding the BeyondCorp AllianceーLast year we announced our BeyondCorp Alliance with partners that share our Zero Trust vision Today we re announcing new partners to this alliance Read the blog New data analytics training opportunitiesーThroughout October and November we re offering a number of no cost ways to learn data analytics with trainings for beginners to advanced users Learn more New BigQuery blog seriesーBigQuery Explained provides overviews on storage data ingestion queries joins and more Read the series Week of Oct Introducing the Google Cloud Healthcare Consent Management APIーThis API gives healthcare application developers and clinical researchers a simple way to manage individuals consent of their health data particularly important given the new and emerging virtual care and research scenarios related to COVID Read the blog Announcing Google Cloud buildpacksーBased on the CNCF buildpacks v specification these buildpacks produce container images that follow best practices and are suitable for running on all of our container platforms Cloud Run fully managed Anthos and Google Kubernetes Engine GKE Read the blog Providing open access to the Genome Aggregation Database gnomAD ーOur collaboration with Broad Institute of MIT and Harvard provides free access to one of the world s most comprehensive public genomic datasets Read the blog Introducing HTTP gRPC server streaming for Cloud RunーServer side HTTP streaming for your serverless applications running on Cloud Run fully managed is now available This means your Cloud Run services can serve larger responses or stream partial responses to clients during the span of a single request enabling quicker server response times for your applications Read the blog New security and privacy features in Google WorkspaceーAlongside the announcement of Google Workspace we also shared more information on new security features that help facilitate safe communication and give admins increased visibility and control for their organizations Read the blog Introducing Google WorkspaceーGoogle Workspace includes all of the productivity apps you know and use at home at work or in the classroomーGmail Calendar Drive Docs Sheets Slides Meet Chat and moreーnow more thoughtfully connected Read the blog New in Cloud Functions languages availability portability and moreーWe extended Cloud Functionsーour scalable pay as you go Functions as a Service FaaS platform that runs your code with zero server managementーso you can now use it to build end to end solutions for several key use cases Read the blog Announcing the Google Cloud Public Sector Summit Dec ーOur upcoming two day virtual event will offer thought provoking panels keynotes customer stories and more on the future of digital service in the public sector Register at no cost |
2021-05-10 23:00:00 |
コメント
コメントを投稿