News > Google

Cloud Identity: Manage users, devices and apps in one location

Category: Google | Mar 22, 2018

Whether we’re collaborating with teammates in different parts of the world, troubleshooting client issues on location, or checking email on the way to the airport, cloud apps and mobile devices have fundamentally changed the way we work. But they’ve also changed the way businesses need to approach security.

Today, the average user works on three or more devices, and needs quick access to the business apps they rely on so they can work wherever, and whenever, they need to. At the same time, IT administrators are challenged to stay on top of an ever-evolving ecosystem of users, apps and devices.

At Google we’ve faced these challenges firsthand, and have applied what we learned from our experience managing billions of consumer and enterprise identities to bring you Cloud Identity. With Cloud Identity, employees get simple, secure access to their business-critical apps and devices, while administrators get the tools they need to manage it all in one unified location.


Simple access for users, simple control for administrators

Cloud Identity gives people simple, one-click access to the apps they need so they can work from anywhere, on any device. This means employees can focus on their work, while admins can manage identities, associated apps and devices at scale from one integrated console as people join, move within, and leave an organization.

Cloud Identity’s single sign-on supports SAML 2.0 and OpenID, and works with hundreds of applications out of the box, including Salesforce, SAP SuccessFactors and Box as well as G Suite apps like Docs or Drive. And for organizations using GCP resources, Cloud Identity provides additional controls for managing users and groups across their hybrid on-premises and cloud infrastructures.

Work anywhere, secure everywhere

Gone are the days when employees worked from one computer at their office to get the job done. Today, they need the freedom to work from anywhere, and understanding that context—what they need to do, where, and with what device—is what should guide enterprise access. Having the right mobile device and application management posture for this is paramount.

Cloud Identity includes robust mobile device management for Android and iOS with many features like account wipe and passcode enforcement automatically enabled for users. Admins can use one integrated console to implement screen locks, find devices , enforce two-step verification and phishing-resistant security keys, and manage Chrome Browser usage. They also get security reports and analytics for things like suspicious logins, user activity reports and audits, and logins to third-party apps, sites and extensions.

Integration partners like Salesforce have told us they’ve benefited from these additional security postures. “With the combination of the Salesforce Platform and Cloud Identity’s robust support for Security Keys and Chrome management, companies can focus on delivering customer success with confidence that they’re providing the right service, to the right user, at the right time,” says Chuck Mortimore, SVP of Identity & Security Product Management at Salesforce.

Open standards, open ecosystem

Because of Google’s commitment to open standards in the security space, Cloud Identity was built to be open. It’s easy for customers to seamlessly integrate other cloud and on-premises directories with Cloud Identity. We’re also continuing to work with our strong ecosystem of identity partners so that customers can choose the best solutions to meet their requirements across hybrid-deployments.

We’re a team of six, but Cloud Identity helps us manage our identity lifecycle management at scale. Daniel Tehrani
VP of Information Technology at HealthChannels

All the functionality you need in one license

Cloud Identity was built to give enterprises all the functionality they need right out of the box. That means businesses have the right tools to protect their users, devices and data all in one place—without needing to add other solutions or licenses.

Over the past few months, we’ve worked with a broad range of customers, such as ExtraHop Networks and HealthChannels, to help them meet their identity needs.

“At HealthChannels, we help dynamically staff 15,000+ medical scribes at hospitals and doctor’s offices,” says Daniel Tehrani, Vice President of Information Technology at HealthChannels. “That means onboarding, moving and offboarding hundreds of people in a given month, while maintaining visibility and control over the applications they have access to. We’re a team of six, but Cloud Identity helps us manage our identity lifecycle management at scale.”

Cloud Identity is available today. If you’re interested in learning more, read our docs and solutions, or visit and sign up for a 14-day trial.


Now the Google Assistant can take care of your IOUs

Category: Google | Mar 22, 2018

When the weekend’s over, chances are someone owes you (or you owe someone) money for something—Friday night’s concert tickets, Saturday afternoon’s barbecue supplies, or Sunday’s matinee at the movies. Starting today, you can ask your Google Assistant to pay your friends back with Google Pay, so you can spend more time having fun and less time dealing with the hassle of paying each other back.

You can easily send or request money from your contacts—for free—using the Assistant on Android and iOS phones in the U.S. In the coming months, you’ll be able to send money on voice-activated speakers like Google Home.

No worries if you haven’t already signed up for Google Pay—you’ll be prompted to set up your account as soon as you ask the Assistant to send money to your contacts. Funds are transferred almost instantaneously, even if the recipient doesn’t have a Google Pay account. Your friends and family will receive an email, text message, or notification if they’re already have the Google Pay app installed, so they can cash out.

Assistant Google Pay

To get started, just say “Hey Google, request $20 from Sam for the show tonight” or “Hey Google, send Jane $15 for lunch today” and let your Google Assistant do the rest.


A smarter search for files on your phone with Files Go

Category: Google | Mar 22, 2018

We built Files Go to help Android users free up space, find files quickly and share them offline with people nearby. Today, based on feedback we’ve heard over the last three months, we’re introducing three more features to the app to make it even more useful:

  • File search: You should be able to search for files on your phone just like you search the internet. Files Go is now bringing Google’s expertise at search—including instant results, search history, autocomplete and filters—to file management. Now, when you open the Files tab, you can tap the search icon and find all of your files on your phone in a split second. And best of all, it works offline.
  • Show the location of duplicates: From the start, Files Go has made it easy to free up space by removing duplicate files, but people have told us that they’d like to see where these files are located on the phone before they get deleted. So now when Files Go suggests duplicate files for removal, you can long press on the thumbnail, tap the “i” icon and see the location of the file.
  • Remove backed up photos and videos: Files Go now works seamlessly with Google Photos. Once your photos and videos are safely backed up in Google Photos, Files Go can detect that and prompt you to delete those files so you free up more space.

We’re excited for you to try these new features, and if you have any thoughts, please leave us feedback in the app.


The Android Security 2017 Year in Review has good news for enterprises

Category: Google | Mar 22, 2018

Device security is of paramount importance to enterprises. It’s why the Android Security team (and many other teams at Google) continuously work to improve protections across more than 2 billion active Android devices.

To ensure customers, partners, and Android users are up to date on our ongoing work, we recently published the fourth annual Android Security Year in Review. This document details improvements to Google’s security offerings in Android, updated platform features, and key metrics that inform our initiatives.

While the report provides a broad view of the breadth of the security work across the ecosystem, there are important highlights for our enterprise users.

Enterprise-grade security in Android

In 2017 we launched Google Play Protect, Android’s built-in device, data, and apps security scanning technology. Google Play Protect protects users from potentially harmful apps (PHAs) in real-time and uses cloud-based services for analyzing device and app data to identify possible security concerns.

Every day, Google Play Protect automatically reviews more than 50 billion apps, other potential sources of PHAs, and checks devices, warning users about potential harm. These automatic reviews enabled us to remove nearly 39 million PHAs last year.

PGA install rates
The installation of potentially harmful apps (PHAs) from outside the Google Play store saw a significant drop in 2016.

Enterprises can leverage Google Play Protect with managed Google Play, a curated Google Play Store for enterprise customers. By using managed Google Play, an organization can ensure that team members are selecting prescribed apps for work that are secured through Google Play Protect. Last year, the number of 30-day active devices running managed Google Play increased by 2,000 percent.

We also introduced a bundle of new security features in Android Oreo, making it safer to get apps, dropping insecure network protocols, providing more user control over identifiers, and hardening the kernel.

In its second year, the Android Security Rewards program paid researchers $1.28 million in 2017 for work identifying potential vulnerabilities in Android. We also introduced the Google Play Security Rewards Program for developers that discover and disclose select critical vulnerabilities in apps hosted on Play.

Additionally we launched zero-touch enrollment, a fast and secure method for simplified provisioning of corporate-distributed devices. Our focus on security starts from the moment a device is powered on, through deployment, and during daily interaction with apps and services.

Looking ahead

Our efforts continue into 2018. We recently launched the Android Enterprise Recommended program for OEMs, which addresses the pain point that many organizations face when choosing devices for large deployments. Our program features a curated selection of devices that meet common requirements for security (including which devices are getting regular security patches), and supported features, all validated by Google.

For a more detailed look at all of the Android security improvements during the last year, see the dedicated Security Blog or read the full security report at


The fight against illegal deforestation with TensorFlow

Category: Google | Mar 21, 2018

Editor’s Note: Rainforest Connection is using technology to protect the rainforest. Founder and CEO Topher White shares how TensorFlow, Google’s open-source machine learning framework, aids in their efforts.

For me, growing up in the 80s and 90s, the phrase “Save the Rainforest” was a directive that barely progressed over the years. The appeal was clear, but the threat was abstract and distant. And the solution (if there was one) seemed difficult to grasp. Since then, other worries—even harder to grasp in their immediacy and scope—have come to dominate our conversations: climate change, as an example.

So many of us believe that technology has a crucial role to play in fighting climate change, but few are as aware that “Saving the Rainforest” and fighting climate change are nearly one and the same. By the numbers, destruction of forests accounts for nearly one-fifth of all greenhouse gas emissions every year. And in the tropical rainforest deforestation accelerated on the heels of rampant logging—up to 90 percent of which is done illegally and under the radar.

Stopping illegal logging and protecting the world’s rainforests may be the fastest, cheapest way for humanity to slow climate change. And who’s best suited to protect the rainforest? The locals and the indigenous tribes that have lived there for generations.

Rainforest Connection is a group of engineers and developers focused on building technology to help locals—like the Tembé tribe from central Amazon—protect their land, and in the process, protect the rest of us from the effects of climate change. Chief Naldo Tembé reached out to me a couple years ago seeking to collaborate on ways technology could help stop illegal loggers from destroying their land. Together, we embarked on an ambitious plan to address this issue using recycled cell phones and machine learning.

Our team has built the world’s first scalable, real-time detection and alert system for logging and environmental conservation in the rainforest. Building hardware that will survive in the rainforest is challenging, but we’re using what’s already there: the trees. We’ve hidden modified smartphones powered with solar panels—called “Guardian” devices—in trees in threatened areas, and continuously monitor the sounds of the forest, sending all audio up to our cloud-based servers over the standard, local cell-­phone network.

  • GuardianDevice.jpg
    A recycled Android phone is transformed into a solar-powered acoustic monitoring device that listens to sounds of illegal logging in the area.
  • SearchOn_Brazil_2258.jpg
    Topher and a Tembé tribesman hide a solar-powered acoustic monitoring device high up on a tree.
  • TopherGraceInstallsGuardianInTree1.jpg

    A member of the Tembé tribe climbs down, having just installed another acoustic monitoring device that listens for sounds of chainsaws and logging trucks.

  • Tembe_Story1201170101.jpg
    Topher works with the Tembé tribe to analyze the sound data captured by the hidden cell phone devices using TensorFlow.

Once the audio is in the cloud, we use TensorFlow, Google’s machine learning framework, to analyze all the auditory data in real-time and listen for chainsaws, logging trucks and other sounds of illegal activity that can help us pinpoint problems in the forest. Audio pours in constantly from every phone, 24 hours a day, every day, and the stakes of missed detections are high.

That’s why we’ve come to use TensorFlow, due to its ability to analyze every layer of our data heavy detection process. The versatility of the machine learning framework empowers us to use a wide range of AI techniques with Deep Learning on one unified platform. This allows us to tweak our audio inputs and improve detection quality. Without the help of machine learning, this process is impossible. When fighting deforestation, every improvement can mean one more saved tree.

The next step is to involve those who will inherit the planet from us: kids. Today, we’re launching the “Planet Guardians” program with hundreds of students from Los Angeles STEM science programs. These students will speak with the local Tembé Tribe through Google Hangouts, and build their own Guardian devices to be sent to the Amazon. We expect that the Guardian devices built by these LA students will protect nearly 100,000 acres through the year 2020.

With technology, and the possibilities that TensorFlow opens up for us, Rainforest Connection will continue to do our part in the fight against climate change. And programs like “Planet Guardians” will ensure that the next generation is a part of this fight, too.


#LetsGuide: Someone out there needs a guide like you

Category: Google | Mar 21, 2018

There are at least seven kinds of Local Guides who share their knowledge on Google Maps. And there are many more reasons that people in the Local Guides community help others discover the right places in cities around the world. Our #LetsGuide campaign shows what our Local Guides are into, from the dog parks they photograph to every coffee shop they obsessively review. Even if you’re not a Local Guide (and you can be one, too), you can put topics that matter to you on the Map.

One of the best ways? Make lists.

Just check out this Barcelonian with a “furry friend” who keeps an eye out for pet-friendly places. Or there are lists like Iconic Theatres in Buenos Aires, Places to Watch Cricket in Delhi, and this irresistible round-up of Tacos de Carnitas in Mexico City. Here are five tips for creating a Google Maps list that you’ll want the world to see:

  1. Give your list a clear title, so people know what it’s about. Feel free to add a little flair: “Jazz Clubs” are fun, but what about “Jazz Clubs with the Best Sax Solos in Lisbon”? 
  2. Say more about your list in the “Description” to let your personality shine through. For example: “Check out these spots in Barcelona if you’re a backpacker on a budget.” And don’t forget to add #LetsGuide!
  3. Include at least five local places that fit your theme.
  4. Use the Comments field (on desktop and Android) to add details like your favorite item on the menu or a can’t-miss exhibit.
  5. Make the list public by going to Sharing options, and post it on social with #LetsGuide

For first-timers, there are two ways to get started. You can either search for a place you want to put on your the list, open it, and tap “SAVE.” Or start with your title, by going to the Google Maps menu, tapping “Your places,” then “SAVED,” and the + sign at the bottom right of your screen.


We’ll be featuring our favorite lists on our Twitter, Facebook, and Google+ pages, so make sure to use #LetsGuide when you share your lists on social and we might feature yours. Need a little inspiration to get started? Check out our #LetsGuide wheel for some ideas of the types of people you can help.


New ways to secure businesses in the cloud

Category: Google | Mar 21, 2018

From collaboration tools that accelerate productivity, to platforms that spur innovation, to AI-powered tools that drive better customer insights, the cloud is increasingly where we turn to transform businesses. It’s also where an increasing number of enterprises are turning to help protect their data and stay secure.

As Urs shared earlier this week, it’s been our belief from the beginning that if you put security first, everything else will follow. We continue to develop new ways to give our customers the capabilities they need to keep up with today’s ever-evolving security challenges. That’s why today we’re announcing more than 20 enhancements aimed to deepen and expand the control businesses have over their security environment. You can read all of our announcements in more detail on our posts covering Google Cloud Platform, G Suite and Chrome Enterprise updates. Here, we’d like to highlight three unique examples of our security functionality.

Unprecedented control to better protect your data

Google Cloud was designed, built, and is operated with security top of mind—from our custom hardware like our Titan chip, to data encryption both at rest and in transit by default. On top of this foundation, our customers have the freedom to deploy their own security controls based on their unique needs and the level of assurance they require. Today, we’re announcing VPC Service Controls to add to our broad set of protections.

Currently in alpha, VPC Service Controls help enterprises keep their sensitive data private while using GCP’s fully managed storage and data processing capabilities. Imagine constructing an invisible border around everything in an app that prevents its data from escaping, and having the power to set up, reconfigure and tear down these virtual perimeters at will. You can think of it like a firewall for API-based services on GCP. Well-defined VPC service controls can give admins a greater level of control to prevent data exfiltration from cloud services as a result of breaches or insider threats.

With this managed service, enterprises can configure private communication between cloud resources and hybrid VPC networks. By expanding perimeter security from on-premise networks to data stored in GCP services, enterprises can feel confident running sensitive data workloads in the cloud.

VPC Service Controls give admins even more precise control over which users can access GCP resources with Access Context Manager. Enterprises can create policies to grant access based on contextual attributes like user location, IP address and endpoint security status. These policies help ensure the appropriate level of protection is in place when allowing access to data in cloud resources from the internet.

Google Cloud is the first cloud provider to offer virtual security perimeters for API-based services with simplicity, speed and flexibility that far exceeds what organizations can achieve in a physical, on-premises environment.

Visibility into data risks, with actionable security insights

As use of cloud services continues to grow, clear visibility into an organization’s cloud footprint and the security status of its infrastructure is more important than ever. Businesses need the right data and actionable insights to stop threats before security incidents turn into damaging breaches. To that end, we’re announcing Cloud Security Command Center, currently in alpha.

Cloud Security Command Center is a security and data risk platform for GCP that helps enterprises gather data, identify threats and act on them before they result in business damage or loss. First, Cloud Security Command Center gives enterprises consolidated visibility into their cloud assets across App Engine, Compute Engine, Cloud Storage and Cloud Datastore. People can quickly understand the number of projects they have, what resources are deployed, where sensitive data is located, and how firewall rules are configured. With ongoing discovery scans, enterprises can view the history of their cloud assets to understand exactly what changed in their environment and act on unauthorized modifications.

Cloud Security Command Center also provides powerful security insights into cloud resources. For example, security teams can determine things like whether a cloud storage bucket is open to the internet or contains personally identifiable information, or whether cloud applications are vulnerable to cross-site scripting (XSS) vulnerabilities—to name just a few.

Finally, Cloud Security Command Center helps enterprises leverage and act on intelligence from Google and other leading security vendors. Administrators can identify threats like botnets, cryptocurrency mining and suspicious network traffic with built-in anomaly detection developed by the Google Security team, as well as integrate insights from vendors such as Cloudflare, CrowdStrike, Dome9, RedLock, Palo Alto Networks, and Qualys to help detect DDoS attacks, compromised endpoints, compliance policy violations, network intrusions and instance vulnerabilities and threats. With ongoing security analytics and threat intelligence, enterprises can better assess their overall security health in a central dashboard or through APIs, and immediately act on risks.

This is just one example of how we’re providing enterprises more visibility. Earlier this year, we announced the security center for G Suite, which provides security analytics and recommendations for our G Suite customers. Today we’re introducing additions to security center, including new charts which highlight phishing threats and suspicious device activity. You can read more about these improvements in our G Suite and GCP posts.

Transparency into how we interact with your data

Trust is paramount when choosing a cloud provider. We want to be as open and transparent as possible, allowing customers to see everything that happens to their data. Cloud Audit Logging helps answer the question of which administrators did what, where, when and why on your GCP projects.

And now, Access Transparency offers an immutable audit trail of actions taken by Google engineers and support whenever they interact with your content on GCP. Access Transparency builds on our already robust controls that restrict Google administrator activity to actions only with valid business justifications, such as responding to a specific ticket our customers have initiated or recovering from an outage.

Together, Cloud Audit Logs and Access Transparency Logs provide a more comprehensive view of admin activity in your cloud environment. We believe that trust is created through transparency, which is why we’re proud that GCP is the first to offer this level of visibility into cloud provider administrative activity.

What cloud security means for businesses

Today’s updates are just a few examples of how we’re making it easier and more secure for businesses to build and grow in the cloud—with many more still to come.

“Businesses’ path to cloud adoption relies heavily on trust; CEOs and CIOs need to feel comfortable that they are gaining significant benefit from the cloud without giving up control,” says Doug Cahill, Senior Analyst, ESG. “With these announcements, Google Cloud is continuing to provide more control and insight to customers—and commendable visibility into administrative activity within their cloud environments through Access Transparency—while offering them the peace of mind that many of the fundamental aspects of security are taken care of and constantly evolving along with the threat landscape.”

Customers like Credit Karma, Lahey Health, and Sanmina Manufacturing are working with Google Cloud to help secure their data.

“A strong security posture plays a critical role in helping us fulfill our mission of helping our members navigate the complex personal finance landscape through a predictive, data-driven recommendation system,” says Credit Karma Chief Technology Officer Ryan Graciano. “User trust is crucial to our business so security was hugely important when selecting a cloud provider. Google Cloud’s end-to-end approach met our high standards. This enables us to spend more time focusing on building the best products for our customers.”

We believe a more secure business landscape is better for everyone, and we’ll continue to develop ways to help businesses be more secure. For a closer look at all our security-related announcements today, read our in-depth posts on GCP, G Suite and Chrome Enterprise.


Helping G Suite customers stay secure with new proactive phishing protections and management controls

Category: Google | Mar 21, 2018

Security tools are only effective at stopping threats if they are deployed and managed at scale, but getting everyone in your organization to adopt these tools ultimately hinges on how easy they are to use. It’s for this reason that G Suite has always aimed to give IT admins simpler ways to manage access, control devices, ensure compliance and keep data secure.

Today we announced more than 20 updates to deepen and expand Google Cloud customers’ control over their security. Many of these features will be turned on by default for G Suite so that you can be sure the right protections are in place for your organization. And, even better, in most cases your users won’t have to do a thing. Here’s the break down.

1. Helping to protect your users and organization with new advanced anti-phishing capabilities

We’re applying machine learning (ML) to billions of threat indicators and evolving our models to quickly identify what could be a phishing attack in the making. Information from these self-learning ML models helps us flag suspicious content. At the same time, updated phishing security controls can be configured to automatically switch on the latest Google-recommended defenses.

These new default-on protections can:

  • Automatically flag emails from untrusted senders that have encrypted attachments or embedded scripts.
  • Warn against email that tries to spoof employee names or that comes from a domain that looks similar to your own domain.
  • Offer enhanced protections against spear phishing attacks by flagging unauthenticated email.
  • Scan images for phishing indicators and expand shortened URLs to uncover malicious links.

With the protections we have in place, more than 99.9% of Business Email Compromise (BEC) scenarios—or when someone impersonates an executive to get sensitive information—are either automatically moved to the spam folder or flagged with anomaly warnings to users.

GIF 1: Project POM G Suite

2. Giving you more control over mobile devices with default-on mobile management

Securing endpoints like mobile devices is one of the best ways for businesses to keep data safe. More than 7 million devices are already managed with G Suite’s enterprise-grade mobile management solution. With new proactive security settings, basic device management is automatically enabled for your mobile devices that access G Suite.

This means employees don’t have to install profiles on iOS and Android devices. It also means admins get added security management controls to help them:

  • See which devices access corporate data in a single dashboard.
  • Enforce pass codes and erase confidential data with selective account wipe for Android and iOS.
  • Automatically protect Android and iOS devices, with no user intervention or device profile required.

And you may have noticed we launched updates to Cloud Identity—a way for enterprises to manage users, apps and devices centrally. Cloud Identity includes user lifecycle management, account security, SSO, robust device and app management and unified reporting. Check it out.

Gif 2: Project POM G Suite

3. Offering you more visibility and insights to stay ahead of potential threats

IT admins who operate in the cloud seek tools, visibility and assistive insights to stop threats or gaps in operations before they become security incidents. This is why we introduced the security center for G Suite earlier this year. The security center is a tool that brings together security analytics, actionable insights and best practice recommendations from Google to help you protect your organization, data and users.

Today, we’re introducing additions to the security center for G Suite including:

  • New security charts to show OAuth activity and Business Email Compromise (BEC) scam threats that are specifically focused on phishing emails that may not have links.
  • New mobile management charts to help IT admins examine activity analytics and show when devices have been hijacked, rooted or jailbroken, as well as when other suspicious device activity has been detected.
  • Ways to reorganize the dashboard to focus on what is most important to your organization.
  • Ways to analyze your organization’s security health and get custom advice on security key deployment and protection against phishing scams.
Gif 3: Project POM G Suite

If you’re new to using the G Suite security center, check out these instructions to get started.

4. Providing built-in protections and controls for Team Drives

Enterprises share and store an enormous amount of content, which means admins need more controls to keep this data protected. That’s why we’re enhancing Team Drives with new security controls to give you more ways to safeguard highly-sensitive content. Now, your data can be protected by Information Rights Management (IRM) controls so you can feel confident that your company’s ideas stay “yours.”

Gif 4: Project POM G Suite

Specific updates include the ability to modify settings for Team Drives to:

  • Limit file access privilegesto Team Drives members, or only to users within your domain.
  • Add IRM controls to prevent users from printing, downloading and copying files within Team Drives.

These new security features for Team Drives will roll out over the next few weeks.

Get started

Phishing and mobile management controls are available now across all G Suite versions, and you’ll be able to use Team Drives controls in the coming weeks. If you’re a G Suite Enterprise customer, you can access the security center in the Admin console.


Supporting the growth of an Intelligent Taiwan

Category: Google | Mar 20, 2018

In 2006, we set up our first office in Taiwan with just one employee. I had the honor of being that first employee. In the 12 years since then, we have grown our team to more than 2,000 employees, built a data center and opened a Google Cloud region. Our most rewarding expansion has been in growing our talent. Following the closure of our deal with HTC this year, Taiwan has become our largest engineering site in Asia.

As we’ve grown, so too has Taiwan’s importance to us as a research and innovation hub. World-class engineers in Taiwan have helped improve products like Android and Chrome, making them work better for the whole world. Taiwanese engineers have also researched, designed and built beautiful, high-end Android devices, like the Pixel 2.

More great products and experiences are still waiting to be created by Taiwan’s amazing talent, and we want to keep working with them. So today, at the “Intelligent Taiwan” event, we announced the next steps of our commitment to invest in Taiwanese talent.

This year, we will grow our team by more than 300 people, provide digital marketing training to more than 50,000 businesses and students, and train more than 5,000 Taiwanese students in artificial intelligence (AI) programing.

First, many of our 300 new hires will be engineers working on hardware and software, helping us create beautiful devices with the best technology and building on our decade long history of cooperating with incredible Taiwanese talent in this area. (Check out our jobs site for open roles.)

Of course, we plan to do a lot more than just hire people. We want to help all Taiwanese master the technology of the future.

So we are also empowering Taiwanese to participate in the digital economy. We will train 50,000 Taiwanese businesses and students in digital marketing over the next year through a combination of online and offline initiatives. Our Digital Garage program will provide a free and convenient online platform for digital marketing training, while offline facilities will soon be opened in Tainan and Taichung to cater to those who prefer face-to-face training.

Finally, we will help Taiwanese prepare for an AI-first future. We are holding a train-the-trainers program for teachers in locations across Taiwan. They will be given in-depth instruction and taken through our Machine Learning Crash Course initiative. The goal is for them to go on to educate a new generation of Taiwanese students in AI, starting with 5,000 students this year.


Early explorations with ARCore 1.0

Category: Google | Mar 20, 2018

We recently launched ARCore 1.0 to give developers the ability to build powerful augmented reality apps that make your phone’s camera smarter. It works on over 100 million Android devices, on more than a dozen different device models, so now more people can use AR to interact with the world in inspiring new ways.
While it’s only been a few weeks since launch, developers are already publishing new ARCore experiences on Google Play, across gaming, shopping and home, and creativity.


For gaming, AR weaves the action right into the world around you, making the experience more immersive and unlocking a whole new way to play. Here are new titles built with ARCore:

giphy (3).gif

My Tamagotchi Forever

BANDAI NAMCO has released “My Tamagotchi Forever,” an experience in which players can raise Tamagotchi characters while building Tamatown, a virtual town you can play with in the real world.

TWDOW_KeyArt_4K_February2018 (1).jpg

Walking Dead Our World

Immerse yourself in the zombie apocalypse! Your mission, should you choose to accept it, is to defend your surroundings by fighting zombies in real-world environments. Walking Dead Our World is a great example of how to use Google Maps APIsand ARCore together to build a location-based AR game. It’s currently in pre-registration on Google Play, with a broader release planned soon.

TendARLandscape1 (2).png


Tender Claws created TendAR, a game that features Guppy, a virtual fish that responds to users’ facial expressions and survives by “eating” other people’s emotions. The game was created by combining ARCore with Google Cloud APIs, which provides computer vision and object recognition. You can read more about how they created the experience in this case study. TendAR will be available to download starting in July 2018.

Shopping & Home

Augmented reality can bring anything into your space, which helps when you’re trying to understand the size and scale of things before you buy or ship them. Here are a few experiences built by our retail partners to aid you in making smarter decisions:


Pottery Barn 360 Room View

With Pottery Barn’s AR app, you can view furniture in your room to see how it pairs with your existing pieces, change the color and fabric of furniture before deciding which looks best, and can purchase what you’ve picked out directly from the app.

giphy (4).gif

eBay is using AR to solve a specific challenge facing their community of sellers: what size shipping container is needed to send that product? With the “Which Box” feature in eBay’s app, sellers can visualize shipping boxes to determine which container size they need to send any product.

Curate by Sotheby’s International Realty, Streem
If you’re shopping for a new home or need help maintaining yours, AR can also come in handy. With ARCore, Sotheby’s International Realty is changing the way people stage furniture in the real estate world, and the Streem app connects customers with professionals to solve household maintenance requests.


Over the last few months, we’ve been tinkering with experiments that show how AR can be used as a new creative medium for self-expression. We’ve worked with creators across different disciplines to explore what happens when AR is used by illustrators, choreographers, animators and more.

Now, we’re inviting more people to experiment with this technology through an app that lets you make simple drawings in AR, and then share your creation with a short video. The caveat: it’s “Just a Line.”

Make simple drawings in AR with Just a Line

We’re open sourcing the core code of the app so developers can use it as a starting point for their own ARCore projects, and we’re excited to see what people create with Just a Line. Download it on Google Play.

Anyone with an ARCore-enabled phone can jump into most of these experiences from the Play Store right now, and developers can get started building their own apps today.