<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GCP Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/gcp/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/gcp/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Sat, 25 Jan 2025 07:19:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>What is Google Cloud Security Command Center and Its Use Cases?</title>
		<link>https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/</link>
					<comments>https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/#respond</comments>
		
		<dc:creator><![CDATA[vijay]]></dc:creator>
		<pubDate>Sat, 25 Jan 2025 07:18:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CloudNativeSecurity]]></category>
		<category><![CDATA[CloudSecurity]]></category>
		<category><![CDATA[ComplianceManagement]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DataProtection]]></category>
		<category><![CDATA[GCP]]></category>
		<category><![CDATA[GoogleCloudSCC]]></category>
		<category><![CDATA[ThreatDetection]]></category>
		<guid isPermaLink="false">https://www.aiuniverse.xyz/?p=20782</guid>

					<description><![CDATA[<p>Google Cloud Security Command Center (SCC) is a centralized security management platform designed to help organizations detect, protect, and respond to security threats across their Google Cloud <a class="read-more-link" href="https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/">What is Google Cloud Security Command Center and Its Use Cases?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="572" src="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-228-1024x572.png" alt="" class="wp-image-20783" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-228-1024x572.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-228-300x168.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-228-768x429.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-228.png 1210w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Google Cloud Security Command Center (SCC) is a centralized security management platform designed to help organizations detect, protect, and respond to security threats across their Google Cloud Platform (GCP) resources. SCC provides real-time visibility into security vulnerabilities, threats, and misconfigurations in your cloud environment, enabling security teams to take proactive measures to protect critical assets and maintain compliance.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>What is Google Cloud Security Command Center?</strong></h2>



<p>Google Cloud Security Command Center is a cloud-native security and risk management solution built specifically for GCP environments. It acts as a single dashboard where users can monitor their cloud resources, identify vulnerabilities, and detect potential threats. By aggregating security data from various Google Cloud services and third-party tools, SCC offers actionable insights to improve security posture and reduce risk.</p>



<h3 class="wp-block-heading"><strong>Key Characteristics of SCC:</strong></h3>



<ul class="wp-block-list">
<li><strong>Centralized Visibility</strong>: Provides a unified view of security data across all GCP resources.</li>



<li><strong>Real-Time Threat Detection</strong>: Identifies and alerts on active threats and vulnerabilities.</li>



<li><strong>Compliance Monitoring</strong>: Tracks security posture against regulatory and industry standards.</li>



<li><strong>Automated Responses</strong>: Integrates with Google Cloud workflows to automate incident responses.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Top 10 Use Cases of Google Cloud Security Command Center</strong></h2>



<ol class="wp-block-list">
<li><strong>Threat Detection and Response</strong>
<ul class="wp-block-list">
<li>Identifies and responds to threats such as malware, phishing, and unauthorized access in real time.</li>
</ul>
</li>



<li><strong>Vulnerability Management</strong>
<ul class="wp-block-list">
<li>Scans workloads and applications for known vulnerabilities and misconfigurations.</li>
</ul>
</li>



<li><strong>Cloud Security Posture Management (CSPM)</strong>
<ul class="wp-block-list">
<li>Monitors your cloud environment for security best practices and compliance requirements.</li>
</ul>
</li>



<li><strong>Data Protection</strong>
<ul class="wp-block-list">
<li>Detects and prevents data exposure in cloud storage services like Google Cloud Storage.</li>
</ul>
</li>



<li><strong>Application Security</strong>
<ul class="wp-block-list">
<li>Protects containerized and serverless applications by identifying vulnerabilities in Kubernetes and Cloud Functions.</li>
</ul>
</li>



<li><strong>Compliance Management</strong>
<ul class="wp-block-list">
<li>Helps organizations meet regulatory requirements like PCI DSS, GDPR, and HIPAA by automating security audits.</li>
</ul>
</li>



<li><strong>User Behavior Monitoring</strong>
<ul class="wp-block-list">
<li>Tracks user activity to detect anomalies and prevent insider threats.</li>
</ul>
</li>



<li><strong>Risk Prioritization</strong>
<ul class="wp-block-list">
<li>Provides a risk-based view of vulnerabilities, helping teams focus on the most critical issues.</li>
</ul>
</li>



<li><strong>Integration with SIEM Tools</strong>
<ul class="wp-block-list">
<li>Connects with third-party SIEM platforms for advanced threat analytics and reporting.</li>
</ul>
</li>



<li><strong>Security Automation</strong>
<ul class="wp-block-list">
<li>Automates repetitive tasks, such as alerting and incident response, using Google Cloud workflows and automation tools.</li>
</ul>
</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Features of Google Cloud Security Command Center</strong></h2>



<ol class="wp-block-list">
<li><strong>Asset Inventory</strong> – Automatically discovers and lists all resources in your GCP environment.</li>



<li><strong>Threat Detection</strong> – Uses Google Cloud services like Event Threat Detection and Web Security Scanner to identify threats.</li>



<li><strong>Vulnerability Scanning</strong> – Identifies vulnerabilities in container images, virtual machines, and serverless environments.</li>



<li><strong>Compliance Management</strong> – Provides built-in compliance checks for standards like PCI DSS and CIS benchmarks.</li>



<li><strong>Real-Time Alerts</strong> – Generates alerts for high-severity security findings, allowing immediate action.</li>



<li><strong>Data Loss Prevention (DLP)</strong> – Monitors sensitive data and detects unauthorized exposure or access.</li>



<li><strong>Custom Security Policies</strong> – Allows creation of custom policies tailored to organizational needs.</li>



<li><strong>Integration with Google Cloud Tools</strong> – Seamlessly integrates with GCP services like Cloud Logging, BigQuery, and Cloud Monitoring.</li>



<li><strong>Access Insights</strong> – Tracks IAM policies and permissions to identify overly permissive access.</li>



<li><strong>Centralized Dashboard</strong> – Consolidates findings from multiple sources for streamlined management.</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-image size-full"><img decoding="async" width="842" height="422" src="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-229.png" alt="" class="wp-image-20784" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-229.png 842w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-229-300x150.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-229-768x385.png 768w" sizes="(max-width: 842px) 100vw, 842px" /></figure>



<h2 class="wp-block-heading"><strong>How Google Cloud Security Command Center Works and Architecture</strong></h2>



<h3 class="wp-block-heading"><strong>1. Data Aggregation</strong></h3>



<p>SCC collects security data from Google Cloud services, third-party tools, and custom integrations. It consolidates this data into a single dashboard for analysis.</p>



<h3 class="wp-block-heading"><strong>2. Threat and Vulnerability Analysis</strong></h3>



<p>SCC applies advanced analytics and machine learning models to identify risks, detect threats, and prioritize vulnerabilities.</p>



<h3 class="wp-block-heading"><strong>3. Real-Time Alerts and Notifications</strong></h3>



<p>The platform generates real-time alerts for high-priority security findings, enabling teams to respond quickly.</p>



<h3 class="wp-block-heading"><strong>4. Automation and Integration</strong></h3>



<p>SCC integrates with Google Cloud workflows and automation tools, such as Cloud Functions and Pub/Sub, to automate security responses and remediation.</p>



<h3 class="wp-block-heading"><strong>5. Continuous Monitoring</strong></h3>



<p>The platform continuously monitors resources, ensuring that security policies are enforced and risks are addressed promptly.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>How to Install Google Cloud Security Command Center</strong></h2>



<p><strong>Google Cloud Security Command Center (SCC)</strong> is a centralized security and risk management platform that helps organizations assess, manage, and respond to security vulnerabilities and risks in their Google Cloud environment. Installing and configuring <strong>Google Cloud SCC</strong> programmatically can be done using <strong>Google Cloud CLI</strong>, <strong>Cloud APIs</strong>, or <strong>Terraform</strong>.</p>



<p>Here’s a step-by-step guide on how to install and configure <strong>Google Cloud SCC</strong> programmatically using the <strong>Google Cloud CLI</strong> and APIs.</p>



<h3 class="wp-block-heading">1. <strong>Prerequisites</strong></h3>



<p>Before proceeding, ensure you meet the following prerequisites:</p>



<ul class="wp-block-list">
<li><strong>Google Cloud Project</strong>: Ensure you have a Google Cloud project set up.</li>



<li><strong>Permissions</strong>: You must have sufficient permissions, such as <strong>Owner</strong> or <strong>Security Admin</strong> roles, to enable APIs and configure SCC.</li>



<li><strong>Google Cloud SDK</strong>: You should have the <strong>Google Cloud SDK</strong> installed and authenticated. If not, you can install it by following the instructions <a href="https://cloud.google.com/sdk/docs/install">here</a>.</li>
</ul>



<h3 class="wp-block-heading">2. <strong>Enable Google Cloud Security Command Center (SCC) API</strong></h3>



<p>The first step is to enable the <strong>Security Command Center API</strong> for your Google Cloud project. This can be done using the <strong>Google Cloud CLI</strong>.</p>



<h4 class="wp-block-heading"><strong>Step 1: Install Google Cloud SDK (if not installed)</strong></h4>



<pre class="wp-block-code"><code># Install Google Cloud SDK
curl https://sdk.cloud.google.com | bash

# Restart the shell to ensure that the Google Cloud SDK is available
exec -l $SHELL
</code></pre>



<h4 class="wp-block-heading"><strong>Step 2: Authenticate with Google Cloud</strong></h4>



<p>Authenticate your Google Cloud account using:</p>



<pre class="wp-block-code"><code>gcloud auth login
</code></pre>



<h4 class="wp-block-heading"><strong>Step 3: Set Your Project</strong></h4>



<p>Set the active project in which you want to enable the <strong>Security Command Center</strong>:</p>



<pre class="wp-block-code"><code>gcloud config set project YOUR_PROJECT_ID
</code></pre>



<h4 class="wp-block-heading"><strong>Step 4: Enable the Security Command Center API</strong></h4>



<p>Run the following command to enable the <strong>Security Command Center API</strong>:</p>



<pre class="wp-block-code"><code>gcloud services enable securitycenter.googleapis.com
</code></pre>



<p>This command enables the <strong>Google Cloud Security Command Center</strong> service in your Google Cloud project.</p>



<h3 class="wp-block-heading">3. <strong>Enable Security Command Center and Configure Sources</strong></h3>



<p>Once the API is enabled, the next step is to enable <strong>Security Command Center</strong> and configure its sources.</p>



<h4 class="wp-block-heading"><strong>Step 1: Enable the Security Command Center in Your Project</strong></h4>



<p>To enable the <strong>Security Command Center</strong> in your project, use the following command:</p>



<pre class="wp-block-code"><code>gcloud beta securitycenter settings enable
</code></pre>



<p>This will enable the <strong>Security Command Center</strong> for your Google Cloud project.</p>



<h4 class="wp-block-heading"><strong>Step 2: Configure Data Sources</strong></h4>



<p>Next, configure various data sources that the <strong>Security Command Center</strong> will monitor. For example, you can enable integrations with <strong>Cloud Asset Inventory</strong>, <strong>Cloud Security Scanner</strong>, and <strong>Security Health Analytics</strong>.</p>



<h5 class="wp-block-heading"><strong>Enable Cloud Asset Inventory</strong></h5>



<pre class="wp-block-code"><code>gcloud services enable cloudasset.googleapis.com
</code></pre>



<h5 class="wp-block-heading"><strong>Enable Security Health Analytics</strong></h5>



<pre class="wp-block-code"><code>gcloud services enable securityhealthanalytics.googleapis.com
</code></pre>



<h5 class="wp-block-heading"><strong>Enable Google Cloud Security Scanner</strong></h5>



<pre class="wp-block-code"><code>gcloud services enable securityscanner.googleapis.com
</code></pre>



<p>These services will send relevant security information to the <strong>Security Command Center</strong>.</p>



<h3 class="wp-block-heading">4. <strong>Access Google Cloud Security Command Center</strong></h3>



<p>After enabling <strong>Google Cloud SCC</strong>, you can access the <strong>Security Command Center Console</strong> via the Google Cloud Console:</p>



<pre class="wp-block-code"><code>gcloud console open
</code></pre>



<p>Alternatively, navigate to the <strong>Security Command Center</strong> from the Google Cloud Console at:</p>



<p><a href="https://console.cloud.google.com/security-center">https://console.cloud.google.com/security-center</a></p>



<h3 class="wp-block-heading">5. <strong>Automate Configuration with APIs</strong></h3>



<p>Google Cloud SCC can be managed programmatically using REST APIs. You can interact with the <strong>SCC API</strong> to retrieve security findings, configure security sources, and manage the security configuration of your Google Cloud environment.</p>



<h4 class="wp-block-heading"><strong>Step 1: Get API Access</strong></h4>



<p>To interact with the <strong>Google Cloud SCC API</strong>, you need an OAuth2 token. Here&#8217;s how you can obtain a token using <strong>Google Cloud CLI</strong>:</p>



<pre class="wp-block-code"><code>gcloud auth application-default print-access-token
</code></pre>



<p>This command returns the access token needed to make API requests.</p>



<h4 class="wp-block-heading"><strong>Step 2: Example: List Findings Using Google Cloud SCC API</strong></h4>



<p>Here’s an example of using <strong>curl</strong> to list findings from <strong>Security Command Center</strong> using the API:</p>



<pre class="wp-block-code"><code>curl -X GET \
  "https://securitycenter.googleapis.com/v1p1beta1/projects/YOUR_PROJECT_ID/sources/-/findings" \
  -H "Authorization: Bearer $(gcloud auth application-default print-access-token)"
</code></pre>



<p>This request retrieves security findings for your project. Replace <code>YOUR_PROJECT_ID</code> with your Google Cloud project ID.</p>



<h4 class="wp-block-heading"><strong>Step 3: Example: Create a Custom Source Using API</strong></h4>



<p>You can create custom sources programmatically. Here&#8217;s an example using <strong>curl</strong> to create a source:</p>



<pre class="wp-block-code"><code>curl -X POST \
  "https://securitycenter.googleapis.com/v1p1beta1/projects/YOUR_PROJECT_ID/sources" \
  -H "Authorization: Bearer $(gcloud auth application-default print-access-token)" \
  -H "Content-Type: application/json" \
  -d '{
    "sourceProperties": {
      "displayName": "Custom Security Source",
      "description": "A custom source for security findings."
    }
  }'
</code></pre>



<p>This creates a custom security source in your project.</p>



<h3 class="wp-block-heading">6. <strong>Enable Integration with Google Cloud Services</strong></h3>



<p>You can integrate <strong>Security Command Center</strong> with various Google Cloud services such as <strong>Google Cloud Asset Inventory</strong>, <strong>Google Cloud Security Scanner</strong>, and <strong>Google Cloud Identity and Access Management (IAM)</strong>. These integrations allow Security Command Center to ingest data from multiple sources and provide centralized security visibility.</p>



<h4 class="wp-block-heading"><strong>Step 1: Enable IAM Integration</strong></h4>



<pre class="wp-block-code"><code>gcloud services enable iam.googleapis.com
</code></pre>



<h4 class="wp-block-heading"><strong>Step 2: Enable Vulnerability Scanning Integration</strong></h4>



<pre class="wp-block-code"><code>gcloud services enable containeranalysis.googleapis.com
</code></pre>



<h3 class="wp-block-heading">7. <strong>Monitoring and Responding to Findings</strong></h3>



<p>After setting up <strong>Security Command Center</strong>, you can monitor security findings using the <strong>Google Cloud Console</strong>, or you can use the API to retrieve findings and take actions. Use the API to query findings and integrate them into your security operations workflows.</p>



<h3 class="wp-block-heading">8. <strong>Automate with Terraform</strong></h3>



<p>If you prefer infrastructure-as-code, you can use <strong>Terraform</strong> to automate the deployment and configuration of <strong>Google Cloud SCC</strong>. Below is an example of a Terraform configuration to enable <strong>Security Command Center</strong>.</p>



<pre class="wp-block-code"><code>provider "google" {
  project = "YOUR_PROJECT_ID"
}

resource "google_project_service" "securitycenter" {
  project = "YOUR_PROJECT_ID"
  service = "securitycenter.googleapis.com"
}

resource "google_security_center_settings" "default" {
  security_center_settings {
    enable_security_center = true
  }
}
</code></pre>



<p>Run the following Terraform commands to deploy:</p>



<pre class="wp-block-code"><code>terraform init
terraform apply
</code></pre>



<p>This will automatically enable <strong>Google Cloud SCC</strong> in your project using <strong>Terraform</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Basic Tutorials of Google Cloud Security Command Center: Getting Started</strong></h2>



<h3 class="wp-block-heading"><strong>Step 1: Access the SCC Dashboard</strong></h3>



<ul class="wp-block-list">
<li>Log in to the Google Cloud Console and navigate to <strong>Security Command Center</strong>.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 2: Review Asset Inventory</strong></h3>



<ul class="wp-block-list">
<li>Use the <strong>Assets</strong> tab to view an inventory of your GCP resources and identify any security risks.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 3: Enable Threat Detection Services</strong></h3>



<ol class="wp-block-list">
<li>Go to the <strong>Settings</strong> tab in SCC.</li>



<li>Activate services like Event Threat Detection and Security Health Analytics.</li>
</ol>



<h3 class="wp-block-heading"><strong>Step 4: Monitor Security Findings</strong></h3>



<ul class="wp-block-list">
<li>Check the <strong>Findings</strong> tab to view and prioritize security issues across your environment.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 5: Configure Alerts</strong></h3>



<ul class="wp-block-list">
<li>Set up real-time alerts for critical findings to notify your security team of potential threats.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 6: Generate Compliance Reports</strong></h3>



<ul class="wp-block-list">
<li>Use the <strong>Compliance</strong> tab to monitor adherence to industry standards and generate reports for audits.</li>
</ul>
<p>The post <a href="https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/">What is Google Cloud Security Command Center and Its Use Cases?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/what-is-google-cloud-security-command-center-and-its-use-cases/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Plugs “What-If” into its AI Platform</title>
		<link>https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/</link>
					<comments>https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 12:23:45 +0000</pubDate>
				<category><![CDATA[Scikit Learn]]></category>
		<category><![CDATA[AI Platform]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[GCP]]></category>
		<category><![CDATA[Google Cloud Platform]]></category>
		<category><![CDATA[Google Plugs]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=4103</guid>

					<description><![CDATA[<p>Source: cbronline.com Google Cloud Platform (GCP) has integrated two of its AI-centric tools. The move connects the “What-If” tool, announced last year, with GCP’s AI Platform: the company’s code-based <a class="read-more-link" href="https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/">Google Plugs “What-If” into its AI Platform</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: cbronline.com</p>



<p>Google Cloud Platform (GCP) has integrated two of its AI-centric tools. The move connects the “What-If” tool, announced last year, with GCP’s AI Platform: the company’s code-based data science development environment.</p>



<p>What-If is an AI/ML model visualisation tool that lets data scientists and other users&nbsp;analyse how an ML model would perform if you tweaked various data points, without writing code. The integration lets users&nbsp;run What-If on TensorFlow, XGBoost and Scikit Learn models deployed on AI Platform.</p>



<p>With What-If users can test the performance of two different AI models simultaneously on the same dataset. This allows for a high degree of contrast and compare, in which individual datapoints or entire dataset slices can be examined.</p>



<p>With the visualisation tool and ‘Facets Dive’ function an AI model’s performance on a dataset can be contrasted against another model, or the user can inspect a single model’s performance by grouping inference results into scatterplots, histograms and confusion matrices.</p>



<p>The tool also allows you to edit a datapoint by adding or removing features so you can run robust tests on the AI model’s performance.</p>



<p>Sara Robinson Developer Advocate, Google Cloud Platform commented in a blog that: “You can slice your dataset by features and compare performance across those slices, identifying subsets of data on which your model performs best or worst, which can be very helpful for ML fairness investigations.”</p>



<h4 class="wp-block-heading">What-If AI Toolset Visualisation</h4>



<p>The visualisation aspect of the tool may be the biggest draw for users as it could potentially lend an extra hand in explaining what you are doing to investors or the boardroom in accessible, coloured datapoints.</p>



<p>Initially viewed through the Datapoint Editor, users can alter features to affect the dataset and the model as whole, these changes are then visualised in a panel on the right.</p>



<p>James Wexler Software Engineer at Google notes: “You can change anything about the datapoint and run it again through the model to see how the changes affect prediction. The main panel can be organized into custom visualizations (confusion matrices, scatter plots, histograms, and more) using the dropdown menus at the top.”</p>



<p>In addition to TensorFlow models, you can also use the What-If Tool for your XGBoost and Scikit Learn models deployed on AI Platform. The programme only works with AI models that have been deployed within Google’s Cloud AI Platform.</p>
<p>The post <a href="https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/">Google Plugs “What-If” into its AI Platform</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/google-plugs-what-if-into-its-ai-platform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
