Tag: telemetry
-
Cloud Blog: OpenTelemetry Protocol comes to Google Cloud Observability
Source URL: https://cloud.google.com/blog/products/management-tools/opentelemetry-now-in-google-cloud-observability/ Source: Cloud Blog Title: OpenTelemetry Protocol comes to Google Cloud Observability Feedly Summary: OpenTelemetry Protocol (OTLP) is a data exchange protocol designed to transport telemetry from a source to a destination in a vendor-agnostic fashion. Today, we’re pleased to announce that Cloud Trace, part of Google Cloud Observability, now supports users sending…
-
Cloud Blog: Tata Steel enhances equipment and operations monitoring with the Manufacturing Data Engine
Source URL: https://cloud.google.com/blog/topics/manufacturing/tata-steel-enhances-equipment-and-operations-monitoring-with-google-cloud/ Source: Cloud Blog Title: Tata Steel enhances equipment and operations monitoring with the Manufacturing Data Engine Feedly Summary: Tata Steel is one of the world’s largest steel producers, with an annual crude steel capacity exceeding 35 millions tons. With such a large and global output, we needed a way to improve asset…
-
Cloud Blog: Google named a Leader in IDC MarketScape: Worldwide Incident Response 2025 Vendor Assessment
Source URL: https://cloud.google.com/blog/products/identity-security/google-named-a-leader-in-idc-marketscape-worldwide-incident-response-2025-vendor-assessment/ Source: Cloud Blog Title: Google named a Leader in IDC MarketScape: Worldwide Incident Response 2025 Vendor Assessment Feedly Summary: Today’s cybersecurity landscape requires partners with expertise and resources to handle any incident. Mandiant, a core part of Google Cloud Security, can empower organizations to navigate critical moments, prepare for future threats, build…
-
Schneier on Security: Subverting AIOps Systems Through Poisoned Input Data
Source URL: https://www.schneier.com/blog/archives/2025/08/subverting-aiops-systems-through-poisoned-input-data.html Source: Schneier on Security Title: Subverting AIOps Systems Through Poisoned Input Data Feedly Summary: In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including system logs, performance metrics, traces, and alerts,…