Category:

Build your own event-sourced system using Cloud Spanner

Build your own event-sourced system using Cloud Spanner

When you're developing a set of apps or services that are coordinated by, or dependent on, an event, you can take an event-sourced approach to model that system in a thorough way. Event-sourced systems are great for solving a variety of very complex development...

Scan BigQuery for sensitive data using Cloud DLP

Scan BigQuery for sensitive data using Cloud DLP

3. Once a Cloud DLP scan is completed, you will receive an email with links to the scan details page where you can analyze findings and take further actions.You can also quickly scan your other cloud-based data repositories with the Data Loss Prevention (DLP) user...

How Hackers Use Social Media To Profile Targets

How Hackers Use Social Media To Profile Targets

As cybercrime is all about monetary gain, attackers know that the more intelligence they gather about their targets the easier it is to achieve a compromise. On the other hand, most people voluntarily share large amounts of personal information on social networks...

Reach Me

Request a Call Back by filling out and submitting the following form.

+1 408-568-3993

    What is 9 + 4 ? Refresh icon