aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Posts by tag

Security

223 posts
View Post
  • 2 min
  • Hybrid Cloud

AIB Signs Three-Year €65m Agreement With IBM To Accelerate Hybrid Cloud Digital Transformation

AIB, an Irish bank with market leading positions across key segments, and IBM (NYSE: IBM) today announced a €65m three-year agreement designed to help deliver the bank’s 2023 strategy by accelerating…
View Post
Share
View Post
  • 4 min
  • Engineering
  • Solutions
  • Technology

How Vuclip Safeguards Its Cloud Environment Across 100+ Projects With Security Command Center

  Entertainment has never been more accessible. As our phones are now an inextricable part of our lives, there’s an increasing appetite for mobile video content, and that is what…
View Post
Share
View Post
  • 4 min
  • Design
  • Engineering

Cloud Security Podcast By Google Turns 46 – Reflections And Lessons!

Time flies when you’re having fun! We’ve produced 46 episodes of the Cloud Security Podcast by Google since our launch in February 2021. Looking back, we’d like to share some…
View Post
Share
View Post
  • 3 min
  • Big Data
  • People
  • Tech

A Billion People Have No Legal Identity – But A New App Plans To Change That

A billion people in the world have no legal identity. Without an ID they can’t open a bank account, get a loan, or even vote. Now a tech entrepreneur has…
View Post
Share
View Post
  • 5 min
  • Engineering
  • Practices

Cloud CISO Perspectives: November 2021

We’re coming up on the end of the year, yet many of the most pressing security themes from 2021 remain the same, from securing open source software, to enabling zero…
View Post
Share
View Post
  • 2 min
  • Tech

Join Us For Google Cloud Security Talks: Zero Trust Edition

    Join us for our final Google Cloud Security Talks of 2021, a live online event on December 15th, where we’ll focus on all things zero trust. During this…
View Post
Share
Cryptocurrency
View Post
  • 3 min
  • Engineering

Illicit Coin Mining, Ransomware, APTs Target Cloud Users In First Google Cybersecurity Action Team Threat Horizons Report

At Google we have an immense aperture into the global cybersecurity threat landscape and the means to mitigate risks that stem from those threats. With our recently launched Google Cybersecurity…
View Post
Share
View Post
  • 5 min
  • Data
  • Engineering
  • Practices
  • Programming
  • Solutions
  • Technology

How To Hack Ethically

Ethical hacking’s main goal is to find a system’s flaws or vulnerabilities and secure it against hackers. Hackers are always attempting to get unauthorized access to an organization’s resources to…
View Post
Share
View Post
  • 4 min
  • Big Data
  • Computing
  • Programming
  • Technology

Digging Your Own Digital Grave: How Should You Manage The Data You Leave Behind?

Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without…
View Post
Share
View Post
  • 10 min
  • Data
  • People
  • Technology

How To Detect If Someone’s Stealing Your WiFi

Everywhere you go these days, data is whizzing through the airwaves. While we use 4G and 5G data on our smartphones as we’re driving or walking, WiFi still dominates in the home. And in coffee shops. And…
View Post
Share

Posts pagination

Previous 1 … 17 18 19 20 21 … 23 Next

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.