Operations | Monitoring | ITSM | DevOps | Cloud

September 2024

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).

The waiting game is over. 5G is coming to the edge.

Cédric Gégout (VP of Product at Canonical) reflects on a recent research report that Canonical published in collaboration with Omdia. The report uncovered that despite the lack of widespread 5G standalone infrastructure, enterprises, industrial actors and service providers are preparing for 5G edge computing to produce returns within two years.

How to deploy AI workloads at the edge using open source solutions

AI is driving a new wave of opportunities in all kinds of edge settings—from predictive maintenance in manufacturing, to virtual assistants in healthcare, to telco router optimisation in the most remote locations. But to support these AI workloads running virtually everywhere, companies need edge infrastructure that’s fast, secure and highly scalable.

AI in Healthcare: 5 Use Cases and 1 challenge

The accelerated developments in machine learning and artificial intelligence in healthcare have set the stage for some interesting transformations. By enabling better care for patients, optimizing processes, and generating new opportunities for medical research and treatment, these technologies are indeed going to change the healthcare industry radically.

5G mobile networks: A driver for edge computing

Recently, a striking report published by Omdia and Canonical highlighted that 86% of communication service providers (CSPs) are optimistic about the future of edge computing on telco networks. This is a market that is expected to grow substantially in the coming years, with our report shedding light on the motivation that CPSs are drawing from the enhancements that 5G networks will bring.

Introducing Charmed OpenSearch

Introducing Charmed OpenSearch – an enterprise solution for OpenSearch with advanced automation features, multi-cloud capabilities, and comprehensive support. OpenSearch is an open source search and analytics suite that developers use to build solutions for search, observability, security analytics, generative AI projects, and more. Charmed OpenSearch builds on this foundation with additional enterprise-grade capabilities that can help you spend less time on operational tasks and more time on high-value data and analytics projects.

Canonical and OpenAirInterface to collaborate on open source telecom network infrastructure

Canonical is excited to announce that we are collaborating with OpenAirInterface (OAI) to drive the development and promotion of open source software for open radio access networks (Open RAN). Canonical will bring automation in software lifecycle management to OAI’s RAN stack, alongside additional infrastructure capabilities. This will better enable telcos to adopt open source software as the telecom industry transitions to Open RAN running on COTS hardware.

What is the 5G Edge and Multi-Access Edge Computing?

The 5G Edge is revolutionising the telecommunications industry by significantly enhancing network performance, bringing computing power closer to users, and dramatically reducing latency, enabling faster and more efficient services. This advancement is crucial for a variety of applications across different sectors, including smart cities, autonomous vehicles, healthcare, and industrial automation.

Introducing Data Science Stack: set up an ML environment with 3 commands on Ubuntu

Canonical, the publisher of Ubuntu, today announced the general availability of Data Science Stack (DSS), an out-of-the-box solution for data science that enables ML environments on your AI workstation. It is fully open source, free to use and native to Ubuntu. It is also accessible on other Linux distributions, on Windows using Windows Subsystem Linux (WSL), and on macOS with Multipass.

Announcing Authd: OIDC authentication for Ubuntu Desktop and Server

Today we are announcing the general availability of Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. Authd is available free of charge on Ubuntu 24.04 LTS. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory) identity provider, with additional providers, including a white label OIDC provider, to be introduced in the future.

Understand how the Cyber Resilience Act will impact device manufacturers

The Cyber Resilience Act (CRA) is a European Union legislation that will enter into force in 2027. Its overall goal is to make devices safer by implementing more rigorous cybersecurity, documentation, and vulnerability reporting requirements for the IT industry. The CRA is especially relevant for device manufacturers, who will need to ensure devices are secure throughout the product lifecycle.

Ubuntu Community | 20 years of Ubuntu

A lot has changed in the past two decades. A lot of new releases, new platforms and even a few new logos along the way. One thing stayed the same: the heart of Ubuntu. A global community of users, enthusiasts and contributors all helping to spread the mission of changing the world through open-source software. We couldn't have done it without you.

Ubuntu Community | 20 years of Ubuntu

A lot has changed in the past two decades. A lot of new releases, new platforms and even a few new logos along the way. One thing stayed the same: the heart of Ubuntu. A global community of users, enthusiasts and contributors all helping to spread the mission of changing the world through open-source software. We couldn't have done it without you.

Create an EKS Cluster with Ubuntu Pro Using eksctl

Setting up an EKS cluster with Ubuntu Pro has never been easier, thanks to eksctl. In this brief tutorial, we'll walk you through the simplest way to create an EKS cluster with Ubuntu Pro, using the latest version of eksctl. Why choose Ubuntu Pro? Ubuntu Pro on EKS provides enhanced security features tailored for your enterprise needs. From Kernel Livepatch, which keeps your kernel secure without requiring node reboots, to ESM-Apps, ensuring your containers run with fully supported open-source software from Ubuntu's repositories—all backed by Canonical's active security maintenance.

What is the Cyber Resilience Act?

The Cyber Resilience Act is an upcoming European Union legislation that aims to implement more rigorous cybersecurity commitments, documentation, and vulnerability reporting requirements for the IT industry. The legislation would apply to developers, distributors, manufacturers and retailers of hardware, devices, software, applications, and other “products with digitally connected elements” sold within the EU. The requirements you need to meet depend on the CRA classification of products.