Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Google Cloud is launching an exclusive AI management platform

Image Description

Artificial intelligence is becoming ever more ubiquitous among businesses, but a new platform available via Google Cloud promises to further accelerate this growth.

Prevision.io, a new pay-as-you-go solution, claims to allow companies outside of the Fortune 500, which lack extensive data science knowledge, to build, deploy, and manage AI projects in the cloud. 

The Paris-based start-up behind the platform, founded in 2016 and led by chief executive Tuncay Isik, says its customers include delivery company La Poste, French banking group BPCE Group, and pharmaceutical company MLOps.

The solution has been built on Google Cloud itself and is now available on Google Cloud Marketplace.

How does it work?

Prevision.io says users can start building and deploying models immediately after subscribing via Google Cloud Marketplace, with no long-term contracts, licensing, or per-user fees.

Once historical data is imported, whether it exists in buckets or in an SQL data source like BigQuery, users can start applying their own models inside Prevision.io, or use the platform to build their own model.

Customers can use Prevision.io to experiment with new machine learning models, automate training and prediction tasks, and deploy scalable working models, as well as to monitor infrastructure and model behavior to understand changes in resource utilization and underlying data.

Prevision.io claims its use cases include allowing utilities companies to better forecast their energy consumption, as well as enabling transportation companies to build machine learning models that can inform logistical operations based on fluctuating supply and demand.

User spending on Prevision.io's platform will be added to their overall spending on Google Cloud. 

Google Cloud has continued to expand the range of products it offers over the past year. Earlier this month, the company announced it is expanding into the data lake storage business through a new product called BigLake, which is based on its BigQuery service.

Date

20 Apr 2022

Sources


Share


Other Blog

  • Amazon website, app in India adds more regional languages - focus on the south

    Amazon is looking for growth outside tier-1 cities in India and its latest effort with more regional languages after launching in Hindi is aimed at getting more festival season shoppers

    Read More
  • Libra project undergoes rebrand, distancing itself from Facebook

    The Libra Association is now the Diem Association and its new digital currency will be called the Diem dollar instead of Libra.

    Read More
  • Nasty new malware strain creeps quietly past Windows defenses

    Security researchers have identified a new malware campaign that leverages code signing certificates and other techniques to help it avoid detection by antivirus software.

    According to a new blog post from Elastic Security, the cybersecurity firm's researchers identified a cluster of malicious activity after reviewing its threat prevention telemetry.

    The cybercriminals behind this new campaign are using valid code signing certificates to sign malware to help them remain under the radar of the security community. However, Elastic Security also discovered a new malware loader used in the campaign that it has named Blister.

    Due to the use of valid code signing certificates and other measures taken to avoid detection, the cybercriminals responsible have been running this new campaign for at least three months.

    Blister malware

    The cybercriminals are using a code signing certificate issued by the digital identity firm Sectigo for a company called Blist LLC which is why Elastic Security gave their malware loader the name Blister. They may also be operating out of Russia as they are using Mail.Ru as their email service.

    In addition to using a valid code signing certificate, the cybercriminals also relied on other techniques to remain undetected including embedding the Blister malware into a legitimate library. After being executed with elevated privileges by using the rundll32 command, the malware decodes bootstrapping code that is heavily obfuscated and stored in the resource section. From here, the code remains dormant for ten minutes to evade sandbox analysis.

    Once enough time has passed, the malware starts up and begins decrypting embedded payloads that allow it to access a Windows system remotely and move laterally across a victim's network. Blister also achieves persistence on an infected machine by storing a copy in the ProgramData folder as well as another posing as rundll32.exe. To make matters worse, the malware is added to a system's startup location so it launches every time a machine boots.

    Elastic Security has notified Sectigo to have Blister's code signing certificate revoked though the firm has also created a Yara rule to help organization's identify the new malware.

    We've also featured the best malware removal software, best antivirus and best endpoint protection software

    Via Bleeping Computer

    Read More
  • You can still save big with this Asus ROG Zephyrus Cyber Monday deal

    Save $200 on the Asus ROG Zephyrus gaming laptop with this Cyber Monday deal at Best Buy.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us