Welcome to above the clouds
AWS – VPC DNS Query Logging Now Available in the Asia Pacific (Jakarta) Region
Today, we are announcing the availability of Route 53 Resolver Query Logging in the Asia Pacific (Jakarta) Region. Route 53 Resolver Query Logging enables you log DNS queries that originate in your Amazon Virtual Private Clouds (Amazon VPCs). With query logging enabled, you can see which domain names have been queried, the AWS resources from […]
AWS – AWS CloudFormation language extensions transform is now available in 5 additional AWS Regions
Today, AWS CloudFormation has expanded the availability of language Transform called ‘AWS::LanguageExtensions‘ to Asia Pacific (Hyderabad), Asia Pacific (Melbourne), Europe (Spain), Europe (Zurich), and Middle East (UAE) Regions. When declared in a template, the transform enables extensions to the template language in AWS CloudFormation. The language extensions transform expands the functionality of the base CloudFormation JSON/YAML […]
Azure – General availability: Reserved namespaces for subdomains
Azure Traffic Manager now enables reserving domain labels across all traffic manager profiles. Read More for the details.
GCP – Boost your development on Cloud Spanner change streams with a new tail tool
Cloud Spanner change streams is a flexible, scalable mechanism to collect and stream out change data from Spanner databases. It allows you to integrate with downstream systems such as BigQuery and Pub/Sub to process the incremental data changes happening in Spanner databases for analytics, event triggering, and many other use cases. Today, we’re excited to […]
GCP – Meet our Data Champions: Jan Riehle, at the intersection of beauty and data with Beauty for All (B4A)
Editor’s note: This blog is part of a series called Meet the Google Cloud Data Champions, a series celebrating the people behind data- and AI-driven transformations. Each blog features a champion’s career journey, lessons learned, advice they would give other leaders, and more. This story features Jan Riehle, Principal at Brazilian investment firm Rising Venture […]
GCP – How SHAREit Group leverages Google’s Data Cloud to maximize the values of DataCake for cross cloud data analytics
Fully unleashing the power of data is an integral part of many companies’ goals of digitalization. At SHAREit Group, we heavily rely on data analytics to continue optimizing our services and operations. Over the past years, our mobile app products, notably the file sharing platform SHAREit, which aims to make content equally accessible by everyone, […]
GCP – 2022 State of DevOps Report data deep dive: good team culture
Editor’s note: Every year, Google Cloud’s DevOps Research and Assessment (DORA) team seeks to gain a better understanding of the software delivery and organizational performance through the annual Accelerate State of DevOps reports. This series will take a deeper dive into the research and explore some interesting findings that we couldn’t fit into the 2022 […]
GCP – Getting started with JAX multi-node applications with NVIDIA GPUs on Google Kubernetes Engine
JAX is a rapidly growing Python library for high-performance numerical computing and machine learning (ML) research. With applications in large language models, drug discovery, physics ML, reinforcement learning, and neural graphics, JAX has seen incredible adoption in the past few years. JAX offers numerous benefits for developers and researchers, including an easy-to-use NumPy API, auto […]
GCP – Expanding Cloud Armor DDoS protection to Network Load Balancing and VMs with Public IP addresses
Over the past few years, Google has observed that distributed denial-of-service (DDoS) attacks are increasing in frequency and growing exponentially in size. Google Cloud customers have been using Cloud Armor and leveraging the scale and capacity of Google’s network edge to protect their environment from some of the largest DDoS attacks ever seen. We are […]
GCP – How Project Shield helped protect U.S. midterm elections from DDoS attacks
Modern elections rely on public access to a vast array of online information, including political candidate stances, elections monitoring, and directions to polling sites. Public websites can be taken offline by an attacker with no special access, through the use of a Distributed Denial of Service (DDoS) attack. These DDoS attacks are often used to […]
