Issue link: https://resources.mouser.com/i/1442802
we continue adding and scaling zones and regions to meet customers' preferences and policy requirements. The scale of our infrastructure allows us to absorb many Denial of Service (DoS) attacks, and we have multiple layers of protection that further reduce the risk of any DoS impact. Finally, our operations teams detect threats and respond to incidents 24 × 7 × 365. • Unlock data and accelerate development: Analytics and machine intelligence at web scale have been core to GCP since the beginning. Google BigQuery, Google Cloud Datalab, and Google Cloud Dataproc—all based on the same distributed data services that are used at Google—are changing how customers analyze and use data. Google is also known as a world leader in Artificial Intelligence (AI), with our ability to provide modern machine learning and pre-trained models for rich application development. We also have APIs for computer vision (video and still image), speech recognition (audio to text), natural language processing (gain context from words), translation, and more. These services can be used by developers with little to no experience using machine learning; they just need to be know how to use the API. This allows customers to add machine learning technology to solve challenges in their business or provide new features to their customers. • Open, enterprise-friendly: We think cloud customers need a flexible and responsive relationship with their providers. The best way to keep open source at the forefront is to build active communities around the technology. We are committed to building communities around two of the most important innovations in the world: Containers and machine learning. Kubernetes and Tensorflow are quickly becoming industry and developer standards, and we continue to invest in technology that allows you to build the way you want. We believe, over time, you'll value our investments in custom hardware, elastic compute, and truly no-ops services, but we aren't going to hold you hostage with locked down/proprietary APIs. In fact, the latest release of Kubernetes is great for running federated clusters across zones, regions, or even across on-premises and cloud providers. Again, you choose the optimal architecture. These three fundamental principles also make GCP an ideal cloud computing environment for the Internet of Things (IoT). Enterprises that rely on industrial devices such as sensors, conveyor belts, farming equipment, medical equipment, and pumps—particularly, globally distributed ones—are struggling to monitor and manage these devices for several reasons, including operational cost and complexity, patchwork security, and data fragmentation. With Cloud IoT Core on GCP, customers can easily connect and centrally manage millions of globally dispersed connected devices. When used as part of the broader Google Cloud IoT solution, you can ingest all your IoT data and connect to our state-of-the-art analytics and machine learning services to gain actionable insights. What about Security? In too many IoT implementations, Transport Layer Security (TLS) encryption is believed to provide sufficient security. But, just as you would not publish a list of social security numbers in a newspaper, you would not list private keys to all the websites using a network on a public web page. To provide the best possible security, a device's identity needs to be unique, protected, trusted, and verifiable. A connected device's private key is the most critical element in the authentication process. If a hacker owns your private key, he essentially becomes you. The computing industry has been relying on trusted platform modules for security, while the phone industry has been using SIM cards to protect keys and credentials. However, in today's IoT devices, private keys often reside in the Flash memory of a microcontroller where they can be accessed very easily. Private keys can also be maliciously manipulated during the manufacturing of end products such as thermostats and heating, ventilating, and air conditioning (HVAC) systems, but also in more costly assets such as industrial equipment that is used to control major manufacturing plants. When the most critical source of security—the private key—is maliciously attacked, the identity of the IoT device is corrupted beyond the capabilities of any encryption scheme to protect it. As security is one of the core principles of GCP, Microchip has partnered with the Cloud IoT Core to strengthen the authentication security level between the IoT hardware and GCP. In a recent "Hardware Root of Trust with Google Cloud IoT Core and Microchip" webinar, representatives from Google Cloud Platform and Microchip discussed how to implement hardware- based security to meet the challenges of implementing an IoT solution. Our joint offering offers impressive benefits to the IoT developer including: • Speeds up development time to reduce costs and accelerate time to market • Easy-to-use solution reduces barriers and makes cloud technology accessible • Global and proven robustness, elasticity, and scalability; you pay for the way you use it when you use it. | 7 | s