aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Cloud-Native

179 posts
View Post
  • 4 min
  • Cloud-Native
  • Software Engineering

The Intersection Of Terraform And Kubernetes

Regardless of the industry or market, enterprises around the globe are at some stage on their cloud journey – with digital transformation as the destination. The use of cloud computing…
View Post
Share
View Post
  • 5 min
  • Cloud-Native
  • Software Engineering

Secrets Management: Essential When Using Kubernetes

In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these secrets. Sebastiaan…
View Post
Share
View Post
  • 9 min
  • Cloud-Native
  • Programming
  • Software Engineering

How To Monitor Endpoints In Kubernetes Using Blackbox Exporter

Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring in Kubernetes…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Programming

How To Run Kubernetes Without Docker

In late 2020, the Kubernetes team deprecated Docker and announced that support will be completely removed at the end of 2021.‌ ‌This deprecation has brought multiple changes, creating a little…
View Post
Share
View Post
  • 9 min
  • Cloud-Native
  • Gears
  • Technology

HP Introduces Durable Devices For Blended Learning Environments

HP Inc. introduced HP Fortis laptops, a new portfolio of PCs built to withstand the rigors of education environments. Teaching and learning has forever changed. Before the pandemic, student PCs…
View Post
Share
View Post
  • 3 min
  • Cloud-Native
  • Software Engineering

Application Service Adapter For VMware Tanzu Application Platform: Now In Beta

When it comes to developing and deploying your mission-critical apps, VMware Tanzu Application Service continues to offer enterprise organizations an unparalleled combination of developer convenience, operational stability, comprehensive security, and multi-cloud consistency.…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Software Engineering
  • Technology

EdgeX Foundry On K3s – The Inception

Why emphasize on the Edge? As we start using the edge computing in its true sense, I think we are approaching the edge of the technological renaissance. The Edge is…
View Post
Share
View Post
  • 5 min
  • Cloud-Native

Strengthening Supply Chain Security With Zero Trust Architecture

The December 2020 “supply chain attack” against SolarWinds® is considered a landmark event in cybersecurity circles. This attack, resulting from security gaps in SolarWinds’ Orion software, allowed hackers to compromise…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Public Cloud

Cloud CISO Perspectives: December 2021

This is our last Cloud CISO Perspectives of 2021. It’s been an eventful year for the cybersecurity industry, both good and bad, and I welcome the opportunities and challenges we…
View Post
Share
View Post
  • 4 min
  • Cloud-Native

Protect Cloud Native Applications From Log4Shell With VMware Tanzu Service Mesh

VMware has published a detailed analysis of the Log4Shell exploitation, explaining how VMware security products are helping in multiple ways to detect and contain the exploit. Source: Swiss Government Computer Emergency Response Team…
View Post
Share

Posts pagination

Previous 1 … 13 14 15 16 17 18 Next

Stay Connected!
LATEST
  • 1
    The Summer Adventures : Hiking and Nature Walks Essentials
    • June 2, 2025
  • 2
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 3
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 6
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 8
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 9
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 10
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.