♊️ GemiNews 🗞️
🏡
📰 Articles
🏷️ Tags
🧠 Queries
📈 Graphs
☁️ Stats
💁🏻 Assistant
Demo 1: Embeddings + Recommendation
Demo 2: Bella RAGa
Demo 3: NewRetriever
Demo 4: Assistant function calling
Editing article
Title
Summary
Content
<strong class="release-note-product-title">AlloyDB for PostgreSQL</strong> <h3>Feature</h3> <p>You can now use <a href="https://cloud.google.com/alloydb/docs/manage-iam-authn">Automatic IAM Authentication</a> with the <a href="https://cloud.google.com/alloydb/docs/language-connectors-overview">AlloyDB Language Connectors</a> (<a href="https://cloud.google.com/products#product-launch-stages">Preview</a>) to connect to your cluster. For more information, see <a href="https://cloud.google.com/alloydb/docs/connect-language-connectors">Connect using the AlloyDB Language Connectors</a>.</p> <strong class="release-note-product-title">BigQuery</strong> <h3>Feature</h3> <p>You can now use <a href="https://cloud.google.com/bigquery/docs/reference/standard-sql/time-series-functions">time series</a> and <a href="https://cloud.google.com/bigquery/docs/reference/standard-sql/range-functions">range</a> functions to support <a href="https://cloud.google.com/bigquery/docs/working-with-time-series">time series</a> analysis. This feature is in <a href="https://cloud.google.com/products#product-launch-stages">preview</a>.</p> <h3>Feature</h3> <p>You can now <a href="https://cloud.google.com/bigquery/docs/using-dml-with-partitioned-tables#using_dml_delete_to_delete_partitions">use data manipulation language (DML) statements to efficiently delete entire partitions</a>. If a <code>DELETE</code> statement targets all rows in a partition, then the entire partition is deleted without scanning bytes or consuming slots. This feature is now<a href="https://cloud.google.com/products/#product-launch-stages"> generally available (GA)</a>.</p> <strong class="release-note-product-title">Cloud Healthcare API</strong> <h3>Announcement</h3> <p>A new release is available. This release may include some or all of the following: general performance improvements, bug fixes, and updates to the API reference documentation.</p> <strong class="release-note-product-title">Colab Enterprise</strong> <h3>Feature</h3> <p>VPC Service Controls has <a href="https://cloud.google.com/products#product-launch-stages">general availability</a> support in Colab Enterprise.</p> <p>For more information, see <a href="https://cloud.google.com/colab/docs/service-controls">Use VPC Service Controls</a>.</p> <strong class="release-note-product-title">Container Optimized OS</strong> <h3>Changed</h3> <h3 id="cos-101-17162-386-33_">cos-101-17162-386-33 <a id="cos-arm64-101-17162-386-33"/></h3> <table class=pkg> <tr> <td>Kernel</td> <td>Docker</td> <td>Containerd</td> <td>GPU Drivers</td> </tr> <tr> <td><a href="https://cos.googlesource.com/third_party/kernel/+/951a0ac18786da8050990353bf06b4b4e2c6d64c ">COS-5.15.146</a></td> <td>v20.10.24</td> <td>v1.6.28</td> <td>v470.223.02 (default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td> </tr> </table> <h3>Changed</h3> <p>Updated app-emulation/containerd to 1.6.28.</p> <h3>Security</h3> <p>Upgraded net-misc/curl to version 8.6.0. This fixes CVE-2024-0853.</p> <h3>Security</h3> <p>Updated dev-libs/libxml2 to 2.11.7. This fixes CVE-2024-25062.</p> <h3>Security</h3> <p>Fixed CVE-2024-26581 in the Linux kernel.</p> <h3>Security</h3> <p>Fixed CVE-2022-3566 in the Linux kernel.</p> <h3>Security</h3> <p>Fixed CVE-2022-3567 in the Linux kernel.</p> <h3>Security</h3> <p>Fixed CVE-2024-1086 in the Linux kernel.</p> <h3>Changed</h3> <h3 id="cos-109-17800-147-22_">cos-109-17800-147-22 <a id="cos-arm64-109-17800-147-22"/></h3> <table class=pkg> <tr> <td>Kernel</td> <td>Docker</td> <td>Containerd</td> <td>GPU Drivers</td> </tr> <tr> <td><a href="https://cos.googlesource.com/third_party/kernel/+/f394f12169e7ba0dc7770794ea623e255028cb93 ">COS-6.1.75</a></td> <td>v24.0.9</td> <td>v1.7.13</td> <td>v535.154.05 (default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td> </tr> </table> <h3>Security</h3> <p>Upgraded Docker to v24.0.9. This fixes CVE-2024-24557.</p> <h3>Security</h3> <p>Fixed CVE-2024-0684 in sys-apps/coreutils.</p> <h3>Security</h3> <p>Fixed CVE-2024-26581 in the Linux kernel.</p> <h3>Changed</h3> <h3 id="cos-105-17412-294-34_">cos-105-17412-294-34 <a id="cos-arm64-105-17412-294-34"/></h3> <table class=pkg> <tr> <td>Kernel</td> <td>Docker</td> <td>Containerd</td> <td>GPU Drivers</td> </tr> <tr> <td><a href="https://cos.googlesource.com/third_party/kernel/+/22ab4f9e2983b524374643a79765d51a42e82e7e ">COS-5.15.146</a></td> <td>v23.0.3</td> <td>v1.7.10</td> <td>v470.223.02 (default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td> </tr> </table> <h3>Security</h3> <p>Fixed CVE-2024-26581 in the Linux kernel.</p> <strong class="release-note-product-title">Dataflow</strong> <h3>Feature</h3> <p>Dataflow now supports at-least-once streaming mode. You can use this mode to achieve lower latency and reduced costs for workloads that can tolerate duplicate records. This feature is <a href="https://cloud.google.com/products#product-launch-stages">generally available</a> (GA). For more information, see <a href="https://cloud.google.com/dataflow/docs/guides/streaming-modes">Set the pipeline streaming mode</a>. </p> <strong class="release-note-product-title">Google Cloud VMware Engine</strong> <h3>Feature</h3> <p><strong>Generally available:</strong> Purchasing commitments for VMware Engine nodes. For more information, see <a href="https://cloud.google.com/vmware-engine/docs/cud#purchasingcommitmentsfornodetypes">Purchasing commitments for node types</a>.</p> <strong class="release-note-product-title">Google Distributed Cloud Virtual for VMware</strong> <h3>Security</h3> <p>The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:</p> <ul> <li><p>CVE-2023-3776</p> <p>For more information, see the <a href="https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2024-014">GCP-2024-014 security bulletin</a>.</p></li> </ul> <h3>Announcement</h3> <p>GKE on VMware 1.15.9-gke.20 is now available. To upgrade, see <a href="https://cloud.google.com/anthos/clusters/docs/on-prem/1.15/how-to/upgrading">Upgrading GKE on VMware</a>. GKE on VMware 1.15.9-gke.20 runs on Kubernetes v1.26.10-gke.2000. </p> <p>If you are using a third-party storage vendor, check the <a href="https://cloud.google.com/anthos/docs/resources/partner-storage">GDCV Ready storage partners</a> document to make sure the storage vendor has already passed the qualification for this release of GKE on VMware.</p> <h3>Fixed</h3> <p>The following vulnerabilities are fixed in 1.15.9-gke.20:</p> <ul> <li><p>High-severity container vulnerabilities:</p> <ul> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517">CVE-2023-5517</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387">CVE-2023-50387</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408">CVE-2023-4408</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26147">CVE-2024-26147</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499">CVE-2023-29499</a></p></li> </ul></li> <li><p>Container-optimized OS vulnerabilities:</p> <ul> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567">CVE-2024-0567</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531">CVE-2023-6531</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085">CVE-2024-1085</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646">CVE-2024-0646</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915">CVE-2023-6915</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551">CVE-2023-40551</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838">CVE-2023-46838</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040">CVE-2023-6040</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553">CVE-2024-0553</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548">CVE-2023-40548</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547">CVE-2023-40547</a></p></li> </ul></li> <li><p>Ubuntu vulnerabilities:</p> <ul> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626">CVE-2024-21626</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040">CVE-2023-6040</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606">CVE-2023-6606</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817">CVE-2023-6817</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817">CVE-2023-6931</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932">CVE-2023-6932</a></p></li> <li><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193">CVE-2024-0193</a></p></li> </ul></li> </ul> <strong class="release-note-product-title">Sensitive Data Protection</strong> <h3>Feature</h3> <p>An improvement was made in the way Sensitive Data Protection calculates the predicted infoType of the data that it profiles. The service now considers correlations between the detected infoTypes, where one infoType is a subset of another. For more information, see <a href="https://cloud.google.com/sensitive-data-protection/docs/metrics-reference#predicted-infotype">Predicted infoType</a>.</p> <p>For more information about data profiling, see <a href="https://cloud.google.com/sensitive-data-protection/docs/data-profiles">Data profiles</a>.</p> <strong class="release-note-product-title">VPC Service Controls</strong> <h3>Feature</h3> <p><a href="https://cloud.google.com/products#product-launch-stages">General availability</a> support for the following integration:</p> <ul> <li><a href="https://cloud.google.com/colab/docs/service-controls">Colab Enterprise</a></li> </ul> <h3>Feature</h3> <p><a href="https://cloud.google.com/products#product-launch-stages">Preview stage</a> support for the following integration:</p> <ul> <li><a href="https://cloud.google.com/vpc-service-controls/docs/supported-products#table_earthengine">Earth Engine</a></li> </ul>
Author
Link
Published date
Image url
Feed url
Guid
Hidden blurb
--- !ruby/object:Feedjira::Parser::AtomEntry entry_id: tag:google.com,2016:gcp-release-notes#February_27_2024 content: "<strong class=\"release-note-product-title\">AlloyDB for PostgreSQL</strong>\n<h3>Feature</h3>\n<p>You can now use <a href=\"https://cloud.google.com/alloydb/docs/manage-iam-authn\">Automatic IAM Authentication</a> with the <a href=\"https://cloud.google.com/alloydb/docs/language-connectors-overview\">AlloyDB Language Connectors</a> (<a href=\"https://cloud.google.com/products#product-launch-stages\">Preview</a>) to connect to your cluster. For more information, see <a href=\"https://cloud.google.com/alloydb/docs/connect-language-connectors\">Connect using the AlloyDB Language Connectors</a>.</p>\n<strong class=\"release-note-product-title\">BigQuery</strong>\n<h3>Feature</h3>\n<p>You can now use <a href=\"https://cloud.google.com/bigquery/docs/reference/standard-sql/time-series-functions\">time series</a> and <a href=\"https://cloud.google.com/bigquery/docs/reference/standard-sql/range-functions\">range</a> functions to support <a href=\"https://cloud.google.com/bigquery/docs/working-with-time-series\">time series</a> analysis. This feature is in <a href=\"https://cloud.google.com/products#product-launch-stages\">preview</a>.</p>\n<h3>Feature</h3>\n<p>You can now <a href=\"https://cloud.google.com/bigquery/docs/using-dml-with-partitioned-tables#using_dml_delete_to_delete_partitions\">use data manipulation language (DML) statements to efficiently delete entire partitions</a>. If a <code>DELETE</code> statement targets all rows in a partition, then the entire partition is deleted without scanning bytes or consuming slots. This feature is now<a href=\"https://cloud.google.com/products/#product-launch-stages\"> generally available (GA)</a>.</p>\n<strong class=\"release-note-product-title\">Cloud Healthcare API</strong>\n<h3>Announcement</h3>\n<p>A new release is available. This release may include some or all of the following: general performance improvements, bug fixes, and updates to the API reference documentation.</p>\n<strong class=\"release-note-product-title\">Colab Enterprise</strong>\n<h3>Feature</h3>\n<p>VPC Service Controls has <a href=\"https://cloud.google.com/products#product-launch-stages\">general availability</a> support in Colab Enterprise.</p>\n\n<p>For more information, see <a href=\"https://cloud.google.com/colab/docs/service-controls\">Use VPC Service Controls</a>.</p>\n<strong class=\"release-note-product-title\">Container Optimized OS</strong>\n<h3>Changed</h3>\n<h3 id=\"cos-101-17162-386-33_\">cos-101-17162-386-33 <a id=\"cos-arm64-101-17162-386-33\"/></h3>\n\n<table class=pkg>\n <tr>\n <td>Kernel</td>\n \ <td>Docker</td>\n <td>Containerd</td>\n <td>GPU Drivers</td>\n </tr>\n \ <tr>\n <td><a href=\"https://cos.googlesource.com/third_party/kernel/+/951a0ac18786da8050990353bf06b4b4e2c6d64c\n\">COS-5.15.146</a></td>\n \ <td>v20.10.24</td>\n <td>v1.6.28</td>\n <td>v470.223.02\n(default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td>\n </tr>\n</table>\n<h3>Changed</h3>\n<p>Updated app-emulation/containerd to 1.6.28.</p>\n<h3>Security</h3>\n<p>Upgraded net-misc/curl to version 8.6.0. This fixes CVE-2024-0853.</p>\n<h3>Security</h3>\n<p>Updated dev-libs/libxml2 to 2.11.7. This fixes CVE-2024-25062.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2024-26581 in the Linux kernel.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2022-3566 in the Linux kernel.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2022-3567 in the Linux kernel.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2024-1086 in the Linux kernel.</p>\n<h3>Changed</h3>\n<h3 id=\"cos-109-17800-147-22_\">cos-109-17800-147-22 <a id=\"cos-arm64-109-17800-147-22\"/></h3>\n\n<table class=pkg>\n <tr>\n <td>Kernel</td>\n \ <td>Docker</td>\n <td>Containerd</td>\n <td>GPU Drivers</td>\n </tr>\n \ <tr>\n <td><a href=\"https://cos.googlesource.com/third_party/kernel/+/f394f12169e7ba0dc7770794ea623e255028cb93\n\">COS-6.1.75</a></td>\n \ <td>v24.0.9</td>\n <td>v1.7.13</td>\n <td>v535.154.05\n(default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td>\n </tr>\n</table>\n<h3>Security</h3>\n<p>Upgraded Docker to v24.0.9. This fixes CVE-2024-24557.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2024-0684 in sys-apps/coreutils.</p>\n<h3>Security</h3>\n<p>Fixed CVE-2024-26581 in the Linux kernel.</p>\n<h3>Changed</h3>\n<h3 id=\"cos-105-17412-294-34_\">cos-105-17412-294-34 <a id=\"cos-arm64-105-17412-294-34\"/></h3>\n\n<table class=pkg>\n <tr>\n <td>Kernel</td>\n \ <td>Docker</td>\n <td>Containerd</td>\n <td>GPU Drivers</td>\n </tr>\n \ <tr>\n <td><a href=\"https://cos.googlesource.com/third_party/kernel/+/22ab4f9e2983b524374643a79765d51a42e82e7e\n\">COS-5.15.146</a></td>\n \ <td>v23.0.3</td>\n <td>v1.7.10</td>\n <td>v470.223.02\n(default),v535.154.05(latest),v470.223.02(R470 for compatibility with K80 GPUs)</td>\n </tr>\n</table>\n<h3>Security</h3>\n<p>Fixed CVE-2024-26581 in the Linux kernel.</p>\n<strong class=\"release-note-product-title\">Dataflow</strong>\n<h3>Feature</h3>\n<p>Dataflow now supports at-least-once streaming mode. You can use this mode to achieve lower latency and reduced costs for workloads that can tolerate duplicate records. This feature is <a href=\"https://cloud.google.com/products#product-launch-stages\">generally available</a> (GA). For more information, see <a href=\"https://cloud.google.com/dataflow/docs/guides/streaming-modes\">Set the pipeline streaming mode</a>. </p>\n<strong class=\"release-note-product-title\">Google Cloud VMware Engine</strong>\n<h3>Feature</h3>\n<p><strong>Generally available:</strong> Purchasing commitments for VMware Engine nodes. For more information, see <a href=\"https://cloud.google.com/vmware-engine/docs/cud#purchasingcommitmentsfornodetypes\">Purchasing commitments for node types</a>.</p>\n<strong class=\"release-note-product-title\">Google Distributed Cloud Virtual for VMware</strong>\n<h3>Security</h3>\n<p>The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:</p>\n\n<ul>\n<li><p>CVE-2023-3776</p>\n\n<p>For more information, see the <a href=\"https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2024-014\">GCP-2024-014 security bulletin</a>.</p></li>\n</ul>\n<h3>Announcement</h3>\n<p>GKE on VMware 1.15.9-gke.20 is now available. To upgrade, see\n<a href=\"https://cloud.google.com/anthos/clusters/docs/on-prem/1.15/how-to/upgrading\">Upgrading GKE on VMware</a>.\nGKE on VMware 1.15.9-gke.20 runs on Kubernetes v1.26.10-gke.2000. \ </p>\n\n<p>If you are using a third-party storage vendor, check the\n<a href=\"https://cloud.google.com/anthos/docs/resources/partner-storage\">GDCV Ready storage partners</a>\ndocument to make sure the storage vendor has already passed the qualification\nfor this release of GKE on VMware.</p>\n<h3>Fixed</h3>\n<p>The following vulnerabilities are fixed in 1.15.9-gke.20:</p>\n\n<ul>\n<li><p>High-severity container vulnerabilities:</p>\n\n<ul>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517\">CVE-2023-5517</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387\">CVE-2023-50387</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408\">CVE-2023-4408</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26147\">CVE-2024-26147</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499\">CVE-2023-29499</a></p></li>\n</ul></li>\n<li><p>Container-optimized OS vulnerabilities:</p>\n\n<ul>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567\">CVE-2024-0567</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531\">CVE-2023-6531</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085\">CVE-2024-1085</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646\">CVE-2024-0646</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915\">CVE-2023-6915</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551\">CVE-2023-40551</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838\">CVE-2023-46838</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040\">CVE-2023-6040</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553\">CVE-2024-0553</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548\">CVE-2023-40548</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547\">CVE-2023-40547</a></p></li>\n</ul></li>\n<li><p>Ubuntu vulnerabilities:</p>\n\n<ul>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626\">CVE-2024-21626</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040\">CVE-2023-6040</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606\">CVE-2023-6606</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817\">CVE-2023-6817</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817\">CVE-2023-6931</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932\">CVE-2023-6932</a></p></li>\n<li><p><a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193\">CVE-2024-0193</a></p></li>\n</ul></li>\n</ul>\n<strong class=\"release-note-product-title\">Sensitive Data Protection</strong>\n<h3>Feature</h3>\n<p>An improvement was made in the way Sensitive Data Protection calculates the predicted infoType of the data that it profiles. The service now considers correlations between the detected infoTypes, where one infoType is a subset of another. For more information, see <a href=\"https://cloud.google.com/sensitive-data-protection/docs/metrics-reference#predicted-infotype\">Predicted infoType</a>.</p>\n\n<p>For more information about data profiling, see <a href=\"https://cloud.google.com/sensitive-data-protection/docs/data-profiles\">Data profiles</a>.</p>\n<strong class=\"release-note-product-title\">VPC Service Controls</strong>\n<h3>Feature</h3>\n<p><a href=\"https://cloud.google.com/products#product-launch-stages\">General availability</a> support for the following integration:</p>\n\n<ul>\n<li><a href=\"https://cloud.google.com/colab/docs/service-controls\">Colab Enterprise</a></li>\n</ul>\n<h3>Feature</h3>\n<p><a href=\"https://cloud.google.com/products#product-launch-stages\">Preview stage</a> support for the following integration:</p>\n\n<ul>\n<li><a href=\"https://cloud.google.com/vpc-service-controls/docs/supported-products#table_earthengine\">Earth Engine</a></li>\n</ul>\n\n " title_type: published: &1 2024-02-27 08:00:00.000000000 Z updated: *1 links: - https://cloud.google.com/release-notes#February_27_2024 title: February 27, 2024 carlessian_info: news_filer_version: 2 newspaper: GCP latest releases macro_region: Technology rss_fields: - entry_id - content - title_type - published - updated - links - title categories: [] url: https://cloud.google.com/release-notes#February_27_2024
Language
Active
Ricc internal notes
Imported via /Users/ricc/git/gemini-news-crawler/webapp/db/seeds.d/import-feedjira.rb on 2024-03-31 23:42:29 +0200. Content is EMPTY here. Entried: entry_id,content,title_type,published,updated,links,title. TODO add Newspaper: filename = /Users/ricc/git/gemini-news-crawler/webapp/db/seeds.d/../../../crawler/out/feedjira/Technology/GCP latest releases/2024-02-27-February_27,_2024-v2.yaml
Ricc source
Show this article
Back to articles