Google Cloud - gettectonic.com - Page 2
AI Services and Models Security Shortcomings

AI Services and Models Security Shortcomings

Orca Report: AI Services and Models Show Security Shortcomings Recent research by Orca Security reveals significant security vulnerabilities in AI services and models deployed in the cloud. The “2024 State of AI Security Report,” released in 2024, underscores the urgent need for improved security practices as AI technologies advance rapidly. AI Services and Models Security Shortcomings. AI usage is exploding. Gartner predicts that the AI software market will grow19.1% annually, reaching 8 billion by 2027. In many ways, AI is now inthe stage reminiscent of where cloud computing was over a decade ago. Orca’s analysis of cloud assets across major platforms—AWS, Azure, Google Cloud, Oracle Cloud, and Alibaba Cloud—has highlighted troubling risks associated with AI tools and models. Despite the surge in AI adoption, many organizations are neglecting fundamental security measures, potentially exposing themselves to significant threats. The report indicates that while 56% of organizations use their own AI models for various purposes, a substantial portion of these deployments contain at least one known vulnerability. Orca’s findings suggest that although most vulnerabilities are currently classified as low to medium risk, they still pose a serious threat. Notably, 62% of organizations have implemented AI packages with vulnerabilities, which have an average CVSS score of 6.9. Only 0.2% of these vulnerabilities have known public exploits, compared to the industry average of 2.5%. Insecure Configurations and Controls Orca’s research reveals concerning security practices among widely used AI services. For instance, Azure OpenAI, a popular choice for building custom applications, was found to be improperly configured in 27% of cases. This lapse could allow attackers to access or manipulate data transmitted between cloud resources and AI services. The report also criticizes default settings in Amazon SageMaker, a prominent machine learning service. It highlights that 45% of SageMaker buckets use non-randomized default names, and 98% of organizations have not disabled default root access for SageMaker notebook instances. These defaults create vulnerabilities that attackers could exploit to gain unauthorized access and perform actions on the assets. Additionally, the report points out a lack of self-managed encryption keys and encryption protection. For instance, 98% of organizations using Google Vertex have not enabled encryption at rest for their self-managed keys, potentially exposing sensitive data to unauthorized access or alteration. Exposed Access Keys and Platform Risks Security issues extend to popular AI platforms like OpenAI and Hugging Face. Orca’s report found that 20% of organizations using OpenAI and 35% using Hugging Face have exposed access keys, heightening the risk of unauthorized access. This follows recent research by Wiz, which demonstrated vulnerabilities in Hugging Face during Black Hat USA 2024, where sensitive data was compromised. Addressing the Security Challenge Orca co-founder and CEO Gil Geron emphasizes the need for clear roles and responsibilities in managing AI security. He stresses that security practitioners must recognize and address these risks by setting policies and boundaries. According to Geron, while the challenges are not new, the rapid development of AI tools makes it crucial to address security from both engineering and practitioner perspectives. Geron also highlights the importance of reviewing and adjusting default settings to enhance security, advocating for rigorous permission management and network hygiene. As AI technology continues to evolve, organizations must remain vigilant and proactive in safeguarding their systems and data. In conclusion, the Orca report serves as a critical reminder of the security risks associated with AI services and models. Organizations must take concerted action to secure their AI deployments and protect against potential vulnerabilities. Balance Innovation and Security in AI Tectonic notes Salesforce was not included in the sampling. Content updated September 2024. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Understanding AI Agents

Understanding AI Agents

Understanding AI Agents: A Comprehensive Guide Artificial Intelligence (AI) has come a long way, offering systems that automate tasks and provide intelligent, responsive solutions. One key concept within AI is the AI agent—an autonomous system capable of perceiving its environment and taking actions to achieve specific goals. This guide explores AI agents, their types, working mechanisms, and how to build them using platforms like Microsoft Autogen and Google Vertex AI Agent Builder. It also highlights how companies like LeewayHertz and Markovate can assist in the development of AI agents. What is an AI Agent? AI agents are systems designed to interact with their environment autonomously. They process inputs, make decisions, and execute actions based on predefined rules or learned experiences. These agents range from simple rule-based systems to complex machine learning models that adapt over time. Types of AI Agents AI agents can be classified based on complexity and functionality: How AI Agents Work The working mechanism of an AI agent involves four key components: Architectural Blocks of an Autonomous AI Agent An autonomous AI agent typically includes: Building an AI Agent: The Basics Building an AI agent involves several essential steps: Microsoft Autogen: A Platform Overview Microsoft Autogen is a powerful tool for building AI agents, offering a range of features that simplify the development, training, and deployment process. Its user-friendly interface allows developers to create custom agents quickly. Key Steps to Building AI Agents with Autogen: Benefits of Autogen: Vertex AI Agent Builder: Enabling No-Code AI Development Google’s Vertex AI Agent Builder simplifies AI agent development through a no-code platform, making it accessible to users without extensive programming experience. Its drag-and-drop functionality allows for quick and efficient AI agent creation. Key Features of Vertex AI Agent Builder: Conclusion AI agents play a critical role in automating decision-making and performing tasks independently. Platforms like Microsoft Autogen and Google Vertex AI Agent Builder make the development of these agents more accessible, providing powerful tools for both novice and experienced developers. By leveraging these technologies and partnering with companies like LeewayHertz and Markovate, businesses can build custom AI agents that enhance automation, decision-making, and operational efficiency. Whether you’re starting from scratch or looking to integrate AI capabilities into your existing systems, the right tools can make the process seamless and effective. How do you think these tools stack up next to Salesforce AI Agents? Comment below. Content updated October 2024. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Leeds and Other Heatmap Solutions

Leeds and Other Heatmap Solutions

With over 80% of people shopping online – and the numbers are bound to rise – it’s important to know how your would-be customers behave on your website: where they click, how they scroll, and what motivates them to take specific actions. Heatmap analytics does it, allowing you to dominate CRO and UX through effective behavior data interpretation. This insight will look at Leeds and Other Heatmap Solutions. Powered by heatmap software and heatmap tools, heatmap analytics can help you convert customers at scale by optimizing their on-site and mobile experience. Make no mistake: the quality of user behavior tracking can make a difference between a closed sale and a bounce. Leads Heatmap Software is an innovative tool that transforms complex lead data into easy-to-understand, color-coded heatmaps within Salesforce CRM. This solution uses advanced data visualization techniques, enabling users to quickly identify high-potential leads. Interactive Heatmaps Leverage dynamic, real-time heatmaps to visualize lead density and quality, making it easier to pinpoint high-potential areas. Real-Time Updates Stay up-to-date with the latest information as heatmaps automatically refresh with new leads or changes to existing data, ensuring you always have the most current view. Enhanced Analytics Dive deeper into lead behavior and trends with comprehensive analytics tools that provide detailed reports and predictive insights. Detailed Lead Profiles Access in-depth lead profiles directly from the heatmap, including contact details, engagement history, and quick shortcuts for a complete view of each lead. Online Chat Integration Interact with leads instantly using integrated online chat, facilitating immediate and personalized communication. All website pages have a purpose, whether that purpose is to drive further clicks, qualify visitors, provide a solution, or even a mix of all of those things. Heatmaps and recorded user sessions allow you to see if your page is serving that purpose or going against it. What Is a Heatmap? Generally speaking, heatmaps are graphical representations of data that highlight value with color. On a website heatmap, the most popular areas are showcased in red (hot) and the least popular are in blue (cold). The colors range on a scale from red to blue. Heatmaps are an excellent method of collecting user behavior data and converting it into a deep analysis of how visitors engage with your website pages. It can analyze: That information will help you identify user trends and key into what should be optimized to up engagement. Setting up website heatmapping software is a great start to refining your website design process and understanding your users. When to Use Heatmaps The truth is that heatmaps can actually be invaluable when testing and optimizing user experiences and conversion opportunities. There are many times you should be using them. Redesigning Your Website Updating, or even upgrading, your website isn’t just a task on your to do list. Careful thought, attention, and creativity should be put into the revamp if you want it to be worth the time and resources. Heatmaps can help with studying your current design to identify what your visitors are engaging with and what they’re ignoring. You’ll be tapped into what makes your visitors tick so that you can build a site meant specifically for your unique audience. Analyzing Webpage Conversions Trying to figure out why certain pages aren’t converting the way you thought they would? Use a heatmap. You’ll be able to identify exactly what’s attracting attention and deduce why. The same goes for buttons and pages that are showing a higher rate of conversion than anticipated. By keying into the design, copy, and other elements that are working for you, you’ll know exactly how to optimize your under-performing webpages. Testing New Updates As your business grows and you develop new ideas, naturally you’ll want to test them. A/B testing allows you to measure and analyze visitor response to a project or design, but you can take it a step further with heatmapping. Leverage the data graph by examining exactly what captures your visitors’ attention. At the end of the testing period, you may be able to pull designs or elements that received high levels of engagement from the page that didn’t perform as well into the successful one. How To Analyze Visually Using the color-coded visualizations, you can read your webpage for engagement levels and attention “hot spots.” Where the map reads red, that’s where visitors are showing the highest points of interactivity. Blue reflects low numbers. You can spot design issues or opportunities to move buttons, forms, and the like with a visual read. Data Points Reviewing raw data tables will give you more specific insights into your page’s performance. You can examine HTML elements and pixel locations of clicks to really understand what’s drawing people in. You can even filter your clicks and views in order of popularity with certain software. This takes the guessing out of your redesign and testing efforts. Tableau has instant, real-time reporting in place for users looking for actionable insights. With smart dashboards and a drag and drop interface, navigating the product is easy. Their cloud storage means omni-channel data access from anywhere. You can perform ad hoc analyses whenever it’s convenient for you. You can also share your reports with anyone to boost business impact. With built in A/B testing and consolidated heatmaps, Freshmarketer puts in the extra effort to plot out visitor interactions. Recorded in real time, you can analyze heatmaps based by device, which the software automatically detects. Offering scrollmaps and click maps, Freshmarketer strives to “go beyond traditional heatmaps.” Looker offers similar services to the other software options listed, but they also supply a unique security management feature to protect your data. Also partnered with Google Cloud, you’ll have access to reporting from anywhere in the world. Primarily a data analysis solution, you’ll have access to other data intelligence and visualization features as well. Hotjar is one of the most popular website analytics software suites, offering free heatmaps for desktop, mobile, and tablet within its basic subscription plan. You can create heatmaps and synergize them with other free features like user session recordings, surveys, and

Read More
Google Wiz and Cybersecurity

Google Wiz and Cybersecurity

Google is reportedly in advanced talks to acquire Israeli cybersecurity firm Wiz for up to $23 billion, according to The Wall Street Journal. While the sum is substantial, some have expressed surprising discontent, viewing it as “very good, but not great.” This sentiment revolves around the missed opportunity for an IPO and the loss of an Israeli giant that will no longer grow locally. Additionally, if Wiz had been registered in Israel, the transaction would have generated higher revenues for the state treasury. Google Wiz and Cybersecurity certainly aren’t hard to fathom. Founded by Assaf Rappaport, a former officer from Israel’s elite 8200 intelligence unit, Wiz has quickly risen in value. The unit has a track record of producing tech entrepreneurs, significantly contributing to Israel’s robust tech industry. The potential deal underscores the resilience of Israel’s tech sector, which accounts for about 20% of the country’s output and 15% of jobs, even as the war in Gaza pressures the economy. However, with today’s massive cyber attack inadvertently caused by a cybersecurity company, some may hesitate to make such an investment. The attack, linked to a faulty system update from CrowdStrike, a U.S. firm used by over half of Fortune 500 companies, resulted in widespread disruptions. These included grounding flights, hampering public transit systems, and affecting operations at banks and hospitals globally. CrowdStrike’s CEO, George Kurtz, apologized for the disruptions and noted that the issue had been identified and resolved. The incident, not a security breach or cyberattack, caused Microsoft Windows systems to crash, affecting public transit systems, stock exchanges, and various institutions worldwide. Google Wiz and Cybersecurity Despite this, Google’s acquisition of Wiz appears strategically sound, aiming to enhance its cloud security capabilities and position Google Cloud as a major competitor to Microsoft Azure and Amazon Web Services. The advanced technology from Wiz will help Google close the gap in the fiercely competitive cloud security market. Cybersecurity expert Chuck Brooks sees the acquisition as a game-changer, enhancing Google’s ability to conduct comprehensive threat assessments on IT infrastructure and improving DevOps processes. By integrating Wiz’s framework, Google aims to streamline development jobs and make them more secure. However, such bold mergers are not without risk. Tech advisor Vaclav Vincalek cautions that mega transactions can be dangerous for both companies, citing historical examples like Microsoft’s acquisitions of Skype and Nokia, and Google’s purchase of Motorola. Pierre Bourgeix, CEO and Founder of ESI Convergint, believes the acquisition could position Google to compete head-to-head with Amazon, especially given Microsoft Azure’s recent security breaches. Omri Weinberg, Co-Founder and CRO of DoControl, views the deal as a significant statement about the importance of cloud security. In summary, Google’s potential $23 billion acquisition of Wiz not only highlights the value of Israel’s tech talent but also represents a strategic move to enhance its cloud security capabilities. This positions Google as a major force in the cybersecurity market, with the potential to set new standards for cloud security and influence industry best practices. More on today’s outage Public transit systems in the U.S. reported impacts. The Washington Metropolitan Area Transit Authority in Washington, D.C., said its “website and some of our internal systems are currently down,” but that trains and buses were running as scheduled. In New York City, the Metropolitan Transportation Authority also said its buses and trains were unaffected but that “some MTA customer information systems are temporarily offline due to a worldwide technical outage.” Around the world, the outages disrupted London’s Stock Exchange, caused major train delays in the U.K., sent British broadcaster Sky News off air, forced medical facilities in Europe and the U.S. to cancel some services and caused disruptions at airports in Europe, Singapore, Hong Kong and India. Some U.S. border crossings saw impacts amid the outage: Traffic stalled on the Ambassador Bridge, which connects Detroit with Windsor, Ontario, Canada, as well as at the Detroit-Windsor Tunnel, the Detroit Free Press reported. CBP One, the Customs and Border Patrol app, and the agency’s border wait times website, each appeared to experience outages. On a sweeter note, Krispy Kreme is giving away free doughnuts Friday due to the global tech outage. Dubai International Airport said on X it is operating normally following “a global system outage that affected the check-in process for some airlines.” It added the affected airlines “promptly switched to an alternate system, allowing normal check-in operations to resume swiftly.” Portland, Oregon, Mayor Ted Wheeler issued an emergency declaration Friday over the tech outage, with a statement noting the outages are affecting city servers, employee computers and emergency communications. Meanwhile, the Maryland Department of Emergency Management increased its state activation level from “normal” to “partial,” citing the tech outage. A post on X says a “partial” activation is for incidents that require “significant monitoring or resources,” with additional emergency operations staffing from other agencies, functions and supporting organizations. CrowdStrike is a popular cybersecurity software company created in 2012 by CEO George Kurtz, along with Dmitri Alperovitch, and Gregg Marston. According to its website, CrowdStrike has the “world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise.” According to an alert sent by CrowdStrike to its clients and reviewed by Reuters, the company’s “Falcon Sensor” software caused Microsoft Windows to crash and display a blue screen, known informally as the “Blue Screen of Death.” Kurtz said “there was an issue with a Falcon content update for Windows Hosts” but customers “remain fully protected,” according to Kurtz’s post on X. The CrowdStrike outage crashed some computers at colleges Friday and hampered a popular software for enrolling students in K-12 schools for the fall. The University of Rochester, a private school in New York, told students to keep rebooting their systems until the problem was fixed. The University of Alabama’s technology office said its campus computers using Microsoft Windows crashed. Rutgers University and the University of Kentucky also reported disruptions. State and local law enforcement agencies across the country reported disruptions to 911 services after

Read More
Hubspot Hacked

Hubspot Hacked

HubSpot recently disclosed a “security incident” where unauthorized access was attempted on several customer accounts. HubSpot is an American software company that provides tools for inbound marketing, sales, and customer service. It was founded in 2006 by Brian Halligan and Dharmesh Shah, and is today best-known for its all-in-one growth platform that helps businesses attract visitors, convert leads, and close customers.. The CRM company detected the incident on June 22, though it was publicly acknowledged six days later by Alyssa Robinson, Chief Information Security Officer at HubSpot. HubSpot seems to have suffered a data breach, but claims to have everything in hand – for now. Robinson stated that the incident involved bad actors targeting a limited number of HubSpot customers, aiming to gain unauthorized access to their accounts. Upon detection, HubSpot promptly activated its incident response procedures and has since been in contact with affected customers, taking necessary steps to revoke unauthorized access and safeguard customer data. HubSpot Hacked With how the statement was worded, it would seem that the attackers, whoever they are, tried to break into the account – but not necessarily succeeded. Still, the company proceeded with the usual practice in case of a cyberattack: “HubSpot triggered our incident response procedures, and since June 22 we have been contacting impacted customers and taking necessary steps to revoke the unauthorized access and protect our customers and their data,” said Robinson. As of Friday, June 28, HubSpot has not disclosed any communication from the hacking group, nor has it specified the full scope of the incident or the exact number of impacted customers. Despite having over 100,000 paying customers and achieving significant financial milestones, such as breaking the $1 billion annual recurring revenue (ARR) mark, HubSpot’s stock price remained stable amid the news, which surfaced through TechCrunch. Ironically, this incident follows HubSpot’s recent announcement of new data protection capabilities for its Smart CRM users. However, it underscores the ongoing challenges faced by major enterprise tech providers regarding cybersecurity. HubSpot says fewer than 50 customer accounts were victims of a breach in late June, all impacted customers were notified and all has been quiet since the initial incident. As of May 2024, HubSpot had more than 216,000 customers, so an incident that impacts fewer than 50 doesn’t seem like a big deal, unless of course you’re one of the accounts involved. What we know:  The company is not releasing many details about the incident other than the basic facts. The company said in a June 28 release that it detected a security incident on June 22, 2004, where bad actors were attempting to gain access to customer accounts without authorization. HubSpot’s detection of the breach triggered its incident response procedures and the company notified impacted accounts. On June 28 and again on July 1, 2024, the company reported no further signs of a problem. What’s not known at this time is whether the attack was targeting a specific group of HubSpot customers. Back in March 2022, fewer than 30 HubSpot customers were impacted by a data breach, but all of the impacted customers were in the cryptocurrency business. HubSpot joins a growing list of enterprise tech firms experiencing cybersecurity incidents. While recent arrests, such as that of the alleged ringleader behind attacks on Twilio, LastPass, and Mailchimp, offer some hope, cybersecurity threats continue to evolve with the proliferation of digital devices and AI accessibility. This trend poses new risks, including the misuse of AI technologies like deepfakes, as highlighted by concerns raised by organizations like OpenAI. As businesses expand their digital presence and adopt new technologies, they must remain vigilant against evolving cybersecurity threats to protect sensitive information and maintain customer trust. HubSpot is an American software company that provides tools for inbound marketing, sales, and customer service. It was founded in 2006 and is today best-known for its all-in-one growth platform that helps businesses attract visitors, convert leads, and close customers. Impact for Marketers As marketers, our martech stacks are heavily reliant on cloud-based SaaS applications (like HubSpot) and cloud-based data storage from vendors like Amazon’s AWS and Google Cloud. Even on-premise applications and data are a security risk. The applications running in the cloud and the data stored there are at arm’s length from your data security professionals. More than 80% of the data breaches recorded in 2023 involved data stored in the cloud, according to the Harvard Business Review. Big breaches impacting millions of consumers get a great deal of attention, like those that struck Sony or Target in years past. But smaller, targeted attacks can be devastating to the businesses that have their data exposed, though they fly under the radar of the national press. The number of reported data breaches increased 78% from 2022 to 2023. The cost of the average breach surpassed $4 million in 2023 and is up 15% since 2020. How secure is HubSpot? Is my data secure with HubSpot? All communications between a web client and HubSpot servers are protected using TLS (1.0, 1.1, 1.2) protocol encryption using 2048 bit keys. We also provide customers with the ability to enable Two-Phase Authentication (2FA) to prevent unauthorized use of their portals. Another July Hack One of the most significant data leaks in recent history is reported to have occurred on July 4. The leak, dubbed RockYou2024 by the original poster, “ObamaCare”, on a leading hacking forum, compiled 9,948,575,739 unique passwords into plain text. This means close to ten billion passwords were leaked. That said, the RockYou2024 is primarily a compilation of all previous password leaks and is built on a prior RockYou2021 compilation of 8.4 billion passwords. That means between RockYou2021 and RockYou2024, about 1.5 billion passwords were added to the list. Further, according to the hacker, at least a few of these passwords were cracked using RTX 4090, a tactic that was warned about earlier. According to Cybernews researchers, “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world. Revealing that

Read More
Gemma 2 Available

Gemma 2 is now available to researchers and developers

News from Google – Gemma 2 is now available! Introducing Gemma 2: Advanced AI for Everyone Expanding Access to AI AI has the potential to solve some of humanity’s most pressing issues, but this can only happen if everyone has the tools to build with it. Earlier this year, Google introduced Gemma, a family of lightweight, state-of-the-art open models based on the same research and technology used to create the Gemini models. They’ve since expanded the Gemma family with CodeGemma, RecurrentGemma, and PaliGemma, each offering unique capabilities for various AI tasks. These models are easily accessible through integrations with partners like Hugging Face, NVIDIA, and Ollama. Launching Gemma 2 Google is now officially releasing Gemma 2 to researchers and developers worldwide. Available in both 9 billion (9B) and 27 billion (27B) parameter sizes, Gemma 2 offers higher performance and greater efficiency than its predecessor, along with significant safety enhancements. The 27B model provides competitive alternatives to models more than twice its size, achieving performance levels that were only possible with proprietary models as recently as last December. This performance is now achievable on a single NVIDIA H100 Tensor Core GPU or TPU host, significantly reducing deployment costs. Setting a New Standard for Efficiency and Performance Gemma 2 is built on a redesigned architecture, engineered for exceptional performance and inference efficiency. Here’s what sets it apart: Designed for Developers and Researchers Gemma 2 is not only more powerful but also easier to integrate into your workflows: Supporting Responsible AI Development Google is committed to providing resources for responsible AI development, including their Responsible Generative AI Toolkit. The recently open-sourced LLM Comparator helps with in-depth evaluation of language models. You can now use its companion Python library to run comparative evaluations and visualize the results. Additionally, we are working on open-sourcing our text watermarking technology, SynthID, for Gemma models. When training Gemma 2, Google followed rigorous safety processes, filtering pre-training data and performing extensive testing and evaluation to identify and mitigate potential biases and risks. They publish their results on public benchmarks related to safety and representational harms. Projects Built with Gemma The first Gemma launch led to over 10 million downloads and numerous inspiring projects. For instance, Navarasa used Gemma to create a model rooted in India’s linguistic diversity. Looking Ahead Gemma 2 will enable even more ambitious projects, unlocking new levels of performance and potential in AI creations. We will continue to explore new architectures and develop specialized Gemma variants for a broader range of AI tasks and challenges, including an upcoming 2.6B parameter model designed to bridge the gap between lightweight accessibility and powerful performance. Getting Started Gemma 2 is now available in Google AI Studio, allowing you to test its full performance capabilities at 27B without hardware requirements. You can also download Gemma 2’s model weights from Kaggle and Hugging Face Models, with Vertex AI Model Garden coming soon. To support research and development, Gemma 2 is acessable free of charge through Kaggle or a free tier for Colab notebooks. First-time Google Cloud customers may be eligible for $300 in credits. Academic researchers can apply for the Gemma 2 Academic Research Program to receive Google Cloud credits to accelerate their research with Gemma 2. Applications are open now through August 9. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more Top Ten Reasons Why Tectonic Loves the Cloud The Cloud is Good for Everyone – Why Tectonic loves the cloud You don’t need to worry about tracking licenses. Read more

Read More
Zero ETL

Zero ETL

What is Zero-ETL? Zero-ETL represents a transformative approach to data integration and analytics by bypassing the traditional ETL (Extract, Transform, Load) pipeline. Unlike conventional ETL processes, which involve extracting data from various sources, transforming it to fit specific formats, and then loading it into a data repository, Zero-ETL eliminates these steps. Instead, it enables direct querying and analysis of data from its original source, facilitating real-time insights without the need for intermediate data storage or extensive preprocessing. This innovative method simplifies data management, reducing latency and operational costs while enhancing the efficiency of data pipelines. As the demand for real-time analytics and the volume of data continue to grow, ZETL offers a more agile and effective solution for modern data needs. Challenges Addressed by Zero-ETL Benefits of ZETL Use Cases for ZETL In Summary ZETL transforms data management by directly querying and leveraging data in its original format, addressing many limitations of traditional ETL processes. It enhances data quality, streamlines analytics, and boosts productivity, making it a compelling choice for modern organizations facing increasing data complexity and volume. Embracing Zero-ETL can lead to more efficient data processes and faster, more actionable insights, positioning businesses for success in a data-driven world. Components of Zero-ETL ZETL involves various components and services tailored to specific analytics needs and resources: Advantages and Disadvantages of ZETL Comparison: Z-ETL vs. Traditional ETL Feature Zero-ETL Traditional ETL Data Virtualization Seamless data duplication through virtualization May face challenges with data virtualization due to discrete stages Data Quality Monitoring Automated approach may lead to quality issues Better monitoring due to discrete ETL stages Data Type Diversity Supports diverse data types with cloud-based data lakes Requires additional engineering for diverse data types Real-Time Deployment Near real-time analysis with minimal latency Batch processing limits real-time capabilities Cost and Maintenance More cost-effective with fewer components More expensive due to higher computational and engineering needs Scale Scales faster and more economically Scaling can be slow and costly Data Movement Minimal or no data movement required Requires data movement to the loading stage Comparison: Zero-ETL vs. Other Data Integration Techniques Top Zero-ETL Tools Conclusion Transitioning to Zero-ETL represents a significant advancement in data engineering. While it offers increased speed, enhanced security, and scalability, it also introduces new challenges, such as the need for updated skills and cloud dependency. Zero-ETL addresses the limitations of traditional ETL and provides a more agile, cost-effective, and efficient solution for modern data needs, reshaping the landscape of data management and analytics. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
AI Training Options

AI Training Options

As AI adoption accelerates, AI certifications and courses have proliferated, providing deeper knowledge of this rapidly evolving technology. AI Training Options. Numerous AI certifications cover the basics, so we’ve narrowed the field to 10 of the most diverse and comprehensive programs. AI Training Options Artificial intelligence is poised to become the key technology that drives business transformation and gives companies a competitive edge. According to a recent forecast by the International Data Corporation, global spending on AI—including AI-enabled applications, infrastructure, and related services—will more than double to $632 billion by 2028, growing at a compound annual rate of 29% between 2024 and 2028. AI helps businesses boost productivity by automating processes such as robotics and autonomous vehicles, while also supporting existing workforces with technologies like assisted and augmented intelligence. Companies are integrating AI across various sectors, including finance, healthcare, retail, smart home devices, fraud detection, and security surveillance. Why AI certifications are important: 10 of the best AI certifications and courses: Each certification offers unique benefits, whether you’re a beginner or an experienced professional aiming to stay ahead in AI-driven industries. Content updated September 2024. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Exploring Google Vertex AI

Vertex AI

Exploring Google Vertex AI Conversation — Dialogflow CX with Generative AI, Data Stores, and Generators Vertex AI Conversation, built on Dialogflow and Vertex AI, introduces generative conversational features that utilize large language models (LLMs) for natural language understanding, crafting responses, and managing conversation flow. These advancements streamline agent design and enhance the quality of interactions. With Vertex AI Conversation, you can employ a state machine approach to develop sophisticated, generative AI-powered agents for dynamic conversation design and automation. In this insight, we’ll delve into the cutting-edge Dialogflow CX Generative AI technology, focusing on Data Stores and Generators. Data Stores: The Library of Information for Conversations Imagine Data Stores as an extensive library. When a question is asked, the virtual assistant acts as a librarian, locating relevant information. Dialogflow CX’s Data Store feature makes it easy to create conversations around stored information from various sources: For data preparation guidance, visit Google’s official documentation. Generators: LLM-Enhanced Dynamic Responses Dialogflow CX also enables Generators to use an LLM directly in Dialogflow CX without webhooks. Generators can perform tasks like summarization, parameter extraction, and data manipulation. Sourced from Vertex AI, they create real-time responses based on your prompts. For example, a Generator can be customized to summarize lengthy answers—an invaluable feature for simplifying conversations in chat or voice applications. You can find common Generator configurations in Google Cloud Platform (GCP) documentation. Creating a Chat Application with Vertex AI To start building, go to the Search and Conversation page in Google Cloud, agree to the terms, activate the API, and select “Chat.” Setting Up Your Agent After naming your agent and configuring data sources, like a Cloud Storage bucket with PDF documents, you’ll see your new chat app under Search & Conversation | Apps. Navigate to Dialogflow CX, where you can use your data store by setting up parameters for the agent and configuring responses. Once your agent is ready, you can test it in the Agent simulator. Adding a Generator for Summarization Using the Generator feature, you can further refine responses. Set parameters to target the Generator’s summarization feature, and link it to a specific page for summarized responses. This improves chat flow, providing concise answers for faster interactions. Integrating with Discord If you want to deploy your agent on platforms like Discord, follow Google’s integration guide for Dialogflow and adjust your code as needed. With the integration, responses will include hyperlinks for easy reference. Conclusion Vertex AI Conversation, with Dialogflow CX, enables powerful, human-like chat experiences by combining LLMs, Data Stores, and Generators. Ready to build your own dynamic conversational experiences? Now is the perfect time to experiment with this technology and see where it can take you. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Salesforce Success Story

Case Study: Google Cloud and Tableau Ecommerce Success

An industry leader in lifesciences research and ecommerce, is tasked with integrating recent acquisitions, standardizing processes, and improving marketing return-on-investment. Ecommerce company moves to the cloud and adopts Google Cloud and Tableau to improve sales and operational efficiency. Google Cloud and Tableau Ecommerce Success to the rescue. Industry: Lifesciences and Biotechnology Research Problem: Leadership requested help driving an improved culture of proactive decision-making, rather than reactive. Implemented : Our solution? Results: Salesforce offers customized solutions for the ecommerce industry, assisting companies in this field to provide outstanding customer experiences, optimize workflows, and spur growth and brand loyalty. Salesforce offers digital transformation technology for life sciences, ecommerce, and biotechnology research industries. If you are considering a Salesforce health and life sciences implementation, contact Tectonic today. Like2 Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Google Analytics and Salesforce Integration

Google Analytics and Salesforce Integration

Syncing Google Analytics Data to CRM Analytics To integrate Google Analytics and Salesforce Integration using the Google Analytics connector, follow these steps: Important Note: As of July 1, 2023, the main product Google Analytics has been decommissioned and replaced with the new product Google Analytics 4 (GA4). The Salesforce announcement GA4 Set to Replace Universal Analytics gives an overview on this. Creating a Connection Required Settings: Google Analytics 4 Integration To sync Google Analytics 4 data to Salesforce Data Pipelines: Connector Considerations: Google Analytics Salesforce Sales Cloud Integration User Identification Analytics provides two methods to identify users: Required Salesforce Sales Cloud Objects and Fields: Integration Steps: Testing and Viewing Imported Data: Notes: Google Data Studio and Salesforce Integration Connecting Salesforce with Google Data Studio allows for powerful visualizations that combine sales and marketing data. This integration helps in understanding which channels generate the most leads and income. Google Analytics 4 Connection Setup: Connection Details: Advanced Properties: Considerations: By following these steps, you can seamlessly integrate Google Analytics data into your CRM Analytics and Salesforce Data Pipelines, ensuring robust data analysis and informed decision-making. Decide How to Identify Your Users: Analytics offers two ways to programmatically identify your users: Client ID and User-ID. To support Data Import for Salesforce Sales Cloud, you must implement Client ID. You may optionally choose to also implement User-ID. Client ID pseudonymously identifies a browser instance and is best suited for businesses focused on lead generation and new customer acquisition. User-ID enables the analysis of groups of sessions, across devices, using a unique, persistent, and non-personally identifiable ID string representing a user. This option is best for businesses with high rates of logged-in users. How to Import CRM/ERP Data with Google Analytics 4 Using a CSV File: Transitioning to Google Analytics 4: As of March 2023, Google has automatically created GA4 properties for users unless they opt-out. Until July 1, 2023, you can continue to use and collect new data in your Universal Analytics properties. After this date, you must export your historical reports as Universal Analytics will be phased out. How Does Google Help Salesforce Marketing Cloud Users? Google Analytics provides invaluable insights into user behavior, helping Salesforce Marketing Cloud users optimize campaigns and understand customer journeys. Integration with the Google platform allows businesses to combine offline sales data with digital analytics, optimizing digital marketing strategies and improving campaign effectiveness. Additional Integration: Using datasets from Google Analytics and Google BigQuery, businesses can create interactive Tableau CRM dashboards to visualize campaign activities and performance metrics. By following these guidelines, organizations can leverage Google Analytics data effectively within their Salesforce ecosystem, enhancing decision-making and strategic planning. Content updated July 2024. Like1 Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Salesforce Success Story

Case Study: Salesforce Innovation for Hospitality

Major hospitality management firm, moves to the cloud and adopts Google Cloud and Salesforce to improve operational insights and decision-making. Tectonic assisted them to move to the cloud and obtatin quicker, actionable insights with business intelligence. Salesforce Innovation for Hospitality.

Read More
Sensitive Information De-identification

Sensitive Information De-identification

Using Google Cloud Data Loss Prevention with Salesforce for Sensitive Data Handling This insight discusses the transition from detecting and classifying sensitive data to preventing data loss using Google Cloud Data Loss Prevention (DLP). Sensitive Information De-identification for Salesforce is used as the data source to demonstrate how personal, health, credential, and financial information can be de-identified in unstructured data in near real-time. Overview of Google Cloud DLP Google Cloud DLP is a fully managed service designed to help discover, classify, and protect sensitive data. It easily transitions from detection to prevention by offering services that mask sensitive information and measure re-identification risk. Objective The goal was to demonstrate the ability to redact sensitive information in unstructured data at scale. Specifically, it aimed to determine whether sensitive data, such as credit card numbers, tax file numbers, and health care numbers, entered into Salesforce communications (Emails, Files, and Chatter) could be detected and redacted. Constraints Tested De-identifying Data with Google Cloud DLP API Instead of detailing the setup, this section focuses on the key areas of design. Google Design Decisions Supporting Disparate Data Sources with Multiple Integration Patterns and Redundant Design Salesforce Data Source De-identification targets include email addresses, Australian Medicare card numbers, GCP API keys, passwords, and credit card numbers. Credit card numbers are masked with asterisks, while other sensitive data is replaced with information types for readability (e.g., [email protected] becomes [redacted-email-address]). Sample Requests to Google De-identification Service JSON Structure to De-identify Text Using Google Cloud DLP API jsonCopy code{ // JSON structure } JSON Structure to De-identify Images Using Google Cloud DLP API jsonCopy code{ // JSON structure } Salesforce Design Decisions Redundancy and Batch Processing A scheduled batch job allows for recovery by polling unprocessed records. To handle large data volumes (e.g., 360,000 records over 5 days), the Salesforce BULK API is used to process queries and updates in large batch sizes, reducing the number of API calls. Sensitive Information De-identification Google Cloud Data Loss Prevention allows detecting and protecting assets with sensitive information, supporting a wide range of use cases across an enterprise. Proven Capabilities: Considerations and Lessons Learned Enhanced Email: Redacting tasks and EmailMessage records, handling read-only EmailMessage records by deleting and recreating them. Files: The architecture assumes files with sensitive data can be deleted and replaced with redacted versions. Audit Fields: Ensure setting CreatedDate and LastModifiedDate fields using original record dates. Field History Tracking: Avoid tracking fields intended for de-identification, tracking shadow fields instead. Image De-identification: Limited to JPEG, BMP, and PNG formats, with DOCX and PDF not yet supported. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
  • 1
  • 2
gettectonic.com