aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Cloud-Native

179 posts
View Post
  • 4 min
  • Cloud-Native
  • Software Engineering

The Intersection Of Terraform And Kubernetes

Regardless of the industry or market, enterprises around the globe are at some stage on their cloud journey – with digital transformation as the destination. The use of cloud computing…
View Post
Share
View Post
  • 5 min
  • Cloud-Native
  • Software Engineering

Secrets Management: Essential When Using Kubernetes

In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these secrets. Sebastiaan…
View Post
Share
View Post
  • 9 min
  • Cloud-Native
  • Programming
  • Software Engineering

How To Monitor Endpoints In Kubernetes Using Blackbox Exporter

Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring in Kubernetes…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Programming

How To Run Kubernetes Without Docker

In late 2020, the Kubernetes team deprecated Docker and announced that support will be completely removed at the end of 2021.‌ ‌This deprecation has brought multiple changes, creating a little…
View Post
Share
View Post
  • 9 min
  • Cloud-Native
  • Gears
  • Technology

HP Introduces Durable Devices For Blended Learning Environments

HP Inc. introduced HP Fortis laptops, a new portfolio of PCs built to withstand the rigors of education environments. Teaching and learning has forever changed. Before the pandemic, student PCs…
View Post
Share
View Post
  • 3 min
  • Cloud-Native
  • Software Engineering

Application Service Adapter For VMware Tanzu Application Platform: Now In Beta

When it comes to developing and deploying your mission-critical apps, VMware Tanzu Application Service continues to offer enterprise organizations an unparalleled combination of developer convenience, operational stability, comprehensive security, and multi-cloud consistency.…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Software Engineering
  • Technology

EdgeX Foundry On K3s – The Inception

Why emphasize on the Edge? As we start using the edge computing in its true sense, I think we are approaching the edge of the technological renaissance. The Edge is…
View Post
Share
View Post
  • 5 min
  • Cloud-Native

Strengthening Supply Chain Security With Zero Trust Architecture

The December 2020 “supply chain attack” against SolarWinds® is considered a landmark event in cybersecurity circles. This attack, resulting from security gaps in SolarWinds’ Orion software, allowed hackers to compromise…
View Post
Share
View Post
  • 6 min
  • Cloud-Native
  • Public Cloud

Cloud CISO Perspectives: December 2021

This is our last Cloud CISO Perspectives of 2021. It’s been an eventful year for the cybersecurity industry, both good and bad, and I welcome the opportunities and challenges we…
View Post
Share
View Post
  • 4 min
  • Cloud-Native

Protect Cloud Native Applications From Log4Shell With VMware Tanzu Service Mesh

VMware has published a detailed analysis of the Log4Shell exploitation, explaining how VMware security products are helping in multiple ways to detect and contain the exploit. Source: Swiss Government Computer Emergency Response Team…
View Post
Share

Posts pagination

Previous 1 … 13 14 15 16 17 18 Next

Stay Connected!
LATEST
  • What is an SBOM (software bill of materials)?
    • July 2, 2025
  • Send SMS texts with Amazon’s SNS simple notification service
    • July 1, 2025
  • Camping 3
    The Summer Adventures : Camping Essentials
    • June 27, 2025
  • Host a static website on AWS with Amazon S3 and Route 53
    • June 27, 2025
  • Prioritize security from the edge to the cloud
    • June 25, 2025
  • 6 edge monitoring best practices in the cloud
    • June 25, 2025
  • Genome 7
    AlphaGenome: AI for better understanding the genome
    • June 25, 2025
  • 8
    Pure Accelerate 2025: All the news and updates live from Las Vegas
    • June 18, 2025
  • 9
    ‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management
    • June 18, 2025
  • What is cloud bursting?
    • June 18, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • What is confidential computing?
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.