Operations | Monitoring | ITSM | DevOps | Cloud

October 2024

Imagining the future of Cybersecurity

October 2024 marks the 20th anniversary of Ubuntu. The cybersecurity landscape has significantly shifted since 2004. If you have been following the Ubuntu Security Team’s special three-part series podcast that we put out to mark Cybersecurity Awareness Month, you will have listened to us talk about significant moments that have shaped the industry, as well as what our recommendations to stay safe are.

Unleash new ways of working with flexible, cost-effective VDI

For years, virtual desktop infrastructure (VDI) has helped power the most complex IT environments—and the technology is still relevant today. After all, VDI allows employees to access their work applications and data across any device, anywhere. And the growth of 5G networked edge computing means that VDI workloads can soon be optimised for even greater flexibility, security and cost savings. But what’s the right way to deploy VDI in the cloud era?

What is Ubuntu used for?

The launch of Ubuntu in 2004 was a step-change for everyday users and developers everywhere. Nicknamed “Ubuntu Linux” in its early days, to differentiate it from its various cousins in the Linux world, it has since lost the need for its surname and grown to become a powerful force. Besides being used by millions of home users, Ubuntu is widely used in the development and business world. As developers have become a driving force of innovation, so has Ubuntu.

Creating a Secure Cyber Environment | Ubuntu Security Podcast

Software supply chain knowledge is crucial for cybersecurity. It's essential to understand not only what's running but also its provenance and reliability. In episode two of our 3-part Month podcast series, Eduardo Barretto and Luci Stanescu join Alex Murray to discuss some of the best cybersecurity practices for everyone.

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.

20 years of partnership: how our partners help us take Ubuntu across industries, markets and devices

As we celebrate 20 years of Ubuntu, we wanted to take a moment to reflect on the value of partnership. The idea that software should be open source and accessible to all gave birth to a vibrant community of users and a partner ecosystem who help us take Ubuntu across industries. So who do we work with? We are fortunate to count over 100 partners, all of whom have a different relationship with Ubuntu.

Valkey is now included in Ubuntu

In pursuit of open source sustainability, Canonical is a committed contributor to the development of Valkey. Following our mission to amplify the impact of open source and enable a broad diversity of open source communities to collaborate under the Ubuntu umbrella, we’re pleased to announce that Valkey is now included in Ubuntu. Valkey is included in Ubuntu 24.10 (Oracular Oriole) and Ubuntu 24.04 LTS (Noble Nombat) and will be included in future releases.

Unleashing Android Automotive development with Anbox Cloud

Developing a system based on Automotive Android OS (AAOS) comes with challenges like hardware dependencies, logistical delays and the need for vehicle and OEM specific customisation. Join us for an exclusive webinar where we explore how Anbox Cloud is solving these challenges and transforming the world of Android Automotive development. Designed to streamline and enhance the development process, Anbox Cloud enables developers to efficiently deploy, test, and scale Android apps across various configurations, eliminating the traditional hardware dependencies that slow down the development process.

Ubuntu 24.10 Oracular Oriole

Ubuntu 24.10, codenamed, is now available to download and install. “Oracular Oriole sets a new pace for delivering the latest upstream kernel and toolchains. Experimental new security features demonstrate our commitment to continually elevate the Linux desktop experience in conversation with the community for the next 20 years and beyond.” Mark Shuttleworth, CEO of Canonical. Soar into the future of open source with.

What is SysOps? Learn more about key SysOps responsibilities and how Landscape can help

What is SysOps and what role do systems management tools play in SysOps responsibilities? Canonical’s Rajan Patel explains the concept and dives into the key features Canonical’s systems management tool delivers to help teams take control of their IT infrastructure.

Ubuntu Early Days | 20 Years of Ubuntu | Reflections from the Canonical team

In this video, the Canonical team reflects on 20 years of Ubuntu. Canonical attracts a diverse team of experts united by one mission: to amplify the impact of open source. Many of the original contributors and team members behind Ubuntu are still around, including our Founder and CEO. So what was it that attracted them to get involved in a project like Ubuntu?

What is the Cyber Resilience Act (CRA)? | Open Source Cybersecurity

Today, compliance is more important than ever before. As part of our #CybersecurityAwareness month series, we’re sharing essential insights on security compliance. Watch as Cédric Gégout, VP of Product Management at Canonical, breaks down the key aspects of the Cybersecurity Resilience Act (CRA), a new regulation set to take effect in 2027. In the video, you’ll learn what CRA is, how it classifies products, and what it means for your organization.

Secure your stack with Canonical | Open Source Cybersecurity

Cybersecurity is an ongoing challenge for many enterprises, and safeguarding systems against evolving threats requires proactive, diligent security assessments and monitoring. Security and compliance is a challenge for organizations, with research showing that 84% of codebase contains at least one vulnerability and requires about 100 days on average to apply those fixes. In this video, Cédric Gégout, VP Product Management at Canonical, dives into the complexities of securing open source systems and company infrastructures, sharing insights from Canonical’s 20+ years of experience.

What is a vector database?

A vector database is a data storage system that organises information in the form of vectors, which are mathematical representations. These databases are designed to store, index, and query vector embeddings or numerical representations of unstructured data, including text documents, multimedia content, audio, geospatial coordinates, tables, and graphs.

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Ubuntu powers Azure's confidential AI offering

Microsoft Azure has announced the general availability of their confidential virtual machines (VMs) with NVIDIA H100 Tensor Core GPUs, powered by Ubuntu. This offering combines the hardware-based protection of AMD EPYC processors with NVIDIA’s latest GPU technology to enable secure and high-performance AI workloads in the cloud. Combining these technologies allows sensitive sectors to unlock AI adoption through addressing previous concerns of critical data privacy.