Tzu Hsi Yang
Учасник із 2023
Срібна ліга
Кількість балів: 4730
Учасник із 2023
Cloud technology can bring great value to an organization, and combining the power of cloud technology with data has the potential to unlock even more value and create new customer experiences. “Exploring Data Transformation with Google Cloud” explores the value data can bring to an organization and ways Google Cloud can make data useful and accessible. Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
There's much excitement about cloud technology and digital transformation, but often many unanswered questions. For example: What is cloud technology? What does digital transformation mean? How can cloud technology help your organization? Where do you even begin? If you've asked yourself any of these questions, you're in the right place. This course provides an overview of the types of opportunities and challenges that companies often encounter in their digital transformation journey. If you want to learn about cloud technology so you can excel in your role and help build the future of your business, then this introductory course on digital transformation is for you. This course is part of the Cloud Digital Leader learning path.
Щоб отримати кваліфікаційний значок, пройдіть курс Налаштування середовища для розробки додатка в Google Cloud. У ньому ви навчитеся створювати й підключати хмарну інфраструктуру, спрямовану на зберігання даних, за допомогою базових можливостей таких технологій, як Cloud Storage, система керування ідентифікацією і доступом, Cloud Functions та Pub/Sub.
The Cloud Foundations Customer Onboarding: Best Practices course enables partners to onboard customers on Google Cloud efficiently and in minimum time, by imparting knowledge, IP, and best practices from the Technical Onboarding Center (TOC) team at Global Delivery Center (GDC). The course explores Cloud Identity and organization, users and groups, administrative access, and resource hierarchy. It also examines network configuration, hybrid connectivity, logging and monitoring, and organizational security.