Tag: Uber
-
Cloud Blog: Simplify the developer experience on Kubernetes with KRO
Source URL: https://cloud.google.com/blog/products/containers-kubernetes/introducing-kube-resource-orchestrator/ Source: Cloud Blog Title: Simplify the developer experience on Kubernetes with KRO Feedly Summary: We are thrilled to announce the collaboration between Google Cloud, AWS, and Azure on Kube Resource Orchestrator, or kro (pronounced “crow”). kro introduces a Kubernetes-native, cloud-agnostic way to define groupings of Kubernetes resources. With kro, you can group…
-
Hacker News: MySQL at Uber (2025)
Source URL: https://www.uber.com/blog/mysql-at-uber/ Source: Hacker News Title: MySQL at Uber (2025) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides detailed insights into Uber’s extensive MySQL fleet architecture and operation controls, focusing on system availability, control plane redesign, and automation processes that enhance security and resilience at scale. This is particularly relevant…
-
Cloud Blog: Cloud migrations made easy: a guide to migrating from AWS to Google Cloud
Source URL: https://cloud.google.com/blog/products/infrastructure-modernization/aws-to-google-cloud-migration-guides/ Source: Cloud Blog Title: Cloud migrations made easy: a guide to migrating from AWS to Google Cloud Feedly Summary: More and more customers deploy their workloads on Google Cloud. But what if your workloads are sitting in another cloud? Planning, designing, and implementing a migration of your workloads, data, and processes is…
-
Cloud Blog: Privacy-preserving Confidential Computing now on even more machines and services
Source URL: https://cloud.google.com/blog/products/identity-security/privacy-preserving-confidential-computing-now-on-even-more-machines/ Source: Cloud Blog Title: Privacy-preserving Confidential Computing now on even more machines and services Feedly Summary: Organizations are increasingly using Confidential Computing to help protect their sensitive data in use as part of their data protection efforts. Today, we are excited to highlight new Confidential Computing capabilities that make it easier for…
-
Slashdot: Bad Week for Unoccupied Waymo Cars: One Hit in Fatal Collision, One Vandalized by Mob
Source URL: https://tech.slashdot.org/story/25/01/26/2150209/bad-week-for-unoccupied-waymo-cars-one-hit-in-fatal-collision-one-vandalized-by-mob?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Bad Week for Unoccupied Waymo Cars: One Hit in Fatal Collision, One Vandalized by Mob Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant incident involving a self-driving car from Waymo that was involved in a fatal accident, marking a historic event in the realm…
-
Hacker News: So you wanna write Kubernetes controllers?
Source URL: https://ahmet.im/blog/controller-pitfalls/ Source: Hacker News Title: So you wanna write Kubernetes controllers? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides detailed insights into the development of Kubernetes custom controllers, emphasizing best practices and common pitfalls. For security and compliance professionals in the cloud and infrastructure sectors, understanding these practices is…