Duet AI in Looker

The future of Looker is powered by AI

Today, we are introducing the preview of Duet AI in Looker, tapping into the full power of Google and our years-long leadership in generative AI to reinvent how you work with and present your data. It’s time to reimagine what business intelligence truly means and go beyond traditional limits that have slowed you down, kept …

SayTap2520hero 1

SayTap: Language to quadrupedal locomotion

Posted by Yujin Tang and Wenhao Yu, Research Scientists, Google Simple and effective interaction between human and quadrupedal robots paves the way towards creating intelligent and capable helper robots, forging a future where technology enhances our lives in ways beyond our imagination. Key to such human-robot interaction systems is enabling quadrupedal robots to respond to …

Identifying AI-generated images with SynthID

Today, in partnership with Google Cloud, we’re beta launching SynthID, a new tool for watermarking and identifying AI-generated images. It’s being released to a limited number of Vertex AI customers using Imagen, one of our latest text-to-image models that uses input text to create photorealistic images. This technology embeds a digital watermark directly into the …

Zero Configuration Service Mesh with On-Demand Cluster Discovery

by David Vroom, James Mulcahy, Ling Yuan, Rob Gulewich In this post we discuss Netflix’s adoption of service mesh: some history, motivations, and how we worked with Kinvolk and the Envoy community on a feature that streamlines service mesh adoption in complex microservice environments: on-demand cluster discovery. A brief history of IPC at Netflix Netflix was early …

Top 8 APM metrics that IT teams use to monitor their apps

A superior customer experience (CX) is built on accurate and timely application performance monitoring (APM) metrics. You can’t fine-tune your apps or system to improve CX until you know what the problem is or where the opportunities are. APM solutions typically provide a centralized dashboard to aggregate real-time performance metrics and insights to be analyzed …

SayTap2520hero

SayTap: Language to quadrupedal locomotion

Posted by Yujin Tang and Wenhao Yu, Research Scientists, Google Simple and effective interaction between human and quadrupedal robots paves the way towards creating intelligent and capable helper robots, forging a future where technology enhances our lives in ways beyond our imagination. Key to such human-robot interaction systems is enabling quadrupedal robots to respond to …

ML10695 image001

MLOps for batch inference with model monitoring and retraining using Amazon SageMaker, HashiCorp Terraform, and GitLab CI/CD

Maintaining machine learning (ML) workflows in production is a challenging task because it requires creating continuous integration and continuous delivery (CI/CD) pipelines for ML code and models, model versioning, monitoring for data and concept drift, model retraining, and a manual approval process to ensure new versions of the model satisfy both performance and compliance requirements. …

Google Cloud deepens investment to activate partner ecosystem around generative AI

Partners have made it clear that they are eager to create generative AI offerings that drive value for their customers as quickly as possible. Google Cloud is committed to enabling our partners by fueling the most open and innovative AI ecosystem. To do this, we’re building on the many investments we are making to infuse …

Rapid and Scalable Bayesian AB Testing

AB testing aids business operators with their decision making, and is considered the gold standard method for learning from data to improve digital user experiences. However, there is usually a gap between the requirements of practitioners, and the constraints imposed by the statistical hypothesis testing methodologies commonly used for analysis of AB tests. These include …

SIEM and threat intelligence: Stay current on trending threats

With the average cost of a data breach soaring to an all-time high at USD $4.45 million dollars in 2023, organizations face an ever-increasing array of cybersecurity threats. These threats can range from ransomware attacks to phishing campaigns and insider threats, potentially resulting in data breaches. As cybercriminals become more sophisticated and their tactics more …