Let Kubernetes Automate Your Configs and Policies with Anthos Config Management
With the widespread adoption of containers among organizations, Kubernetes has become the de facto standard to deploy and operate containerized applications. As you expand your Kubernetes footprint, creating and enforcing consistent configurations and security policies across your growing fleet can create friction. Anthos Config Management (ACM) tackles…
Use Your Favorite DevOps and Security Solutions with GKE Autopilot Out of The Box
Organizations that are modernizing with the cloud are increasingly looking for ways to simplify and automate container orchestration with high levels of security, reliability and scalability. GKE Autopilot, which became generally available earlier this year, is a revolutionary mode of operations for managed Kubernetes that makes this…
5 Do’s and Don’ts CSPs Should Know About Going Cloud-Native
As communication service providers (CSPs) continue to focus on capitalizing on the promise of 5G, We’ve been having more conversations with operators and network equipment providers on why and how it may make sense to adopt cloud-native approaches. More specifically, we often discuss best practices…
A Simple Framework for Plotting Your Cloud Migration
In times of significant disruption, organizations are faced with three choices: Retrench within legacy solutions, pause and do nothing while waiting for more data or different circumstances, or press ahead, potentially even accelerating to realize the desired outcome. In such an environment, it is critical…
A Year in Review: Advancements in Infrastructure at Google Cloud
This past year brought both new challenges and successes for our Google Cloud users around the world. We thought life was going to return to normal… and then it didn’t. Despite the uncertainty, it was exciting to see that they are make huge transformations in…
Apigee 2021: A Year of Innovations
Apigee is committed to continually innovating new capabilities and solutions for our customers, and 2021 saw new product launches, partnerships, and best practices for managing your expanding range of business-critical use cases. Here are some of our favorite stories from 2021. Spotting the trends in APIs…
Improve Online-to-Offline Experiences with Google Maps Platform Retail Solutions
We all experienced, first hand, how Covid-19 has impacted the world and our communities. Last year, store closures, reduced hours, and social-distancing requirements drove people to adopt more e-commerce options, which, according to eMarketer, grew 27.6% worldwide in 2020. Meanwhile, consumer desires to shop locally also…
Behind the Scenes: WebGL-Powered Maps Demos for Google I/O
In preparation for the announcement of the beta release of WebGL-powered Maps features at Google I/O 2021, the Google Maps Platform team worked with Ubilabs, a Google Cloud partner since 2012, to show developers what’s possible when 3D rendering comes to the map. The first of these demos,…
Location Intelligence: The New Frontier for Data-Driven Success
At Google, GMP spent more than 15 years mapping the world and exploring the ways it can help businesses of all kinds do more, from tailoring customer experiences to optimizing processes across the enterprise. Its applications are endless, spanning marketing, workforce management, logistics, and even…
A New Way to Explore What’s Possible with Google Maps Platform
For more than 15 years, developers have used Google Maps Platform to deliver location-based experiences to their end users and used location intelligence to optimize their businesses. Along this journey, Google Maps made a variety of changes to better support our community as needs have…
Meet the Next Generation of Mobile-Optimized Maps
A customized map can be key to delivering a frictionless experience that engages users and sets you apart in users’ minds–whether you’re a real estate company fine-tuning points of interest (POIs) on a map to help buyers decide where to live, or a regional pharmacy…
Best Practices for Mitigating Ransomware Attacks using Google Cloud
Code that was created by a third party to infiltrate your systems to hijack, encrypt, and steal data is referred to as ransomware. To protect your enterprise resources and data from ransomware attacks, you must put multi-layered controls in place across your on-premises and cloud…