Operations | Monitoring | ITSM | DevOps | Cloud

Announcing Charmed Kubeflow 1.10

We are thrilled to announce the release of Charmed Kubeflow 1.10, Canonical’s latest update to the widely-adopted open source MLOps platform. This release integrates significant improvements from the upstream Kubeflow 1.10 project, while also bringing a suite of additional capabilities targeted towards enterprise deployments. Charmed Kubeflow 1.10 empowers machine learning practitioners and teams to operationalize machine learning workflows more efficiently, securely, and seamlessly than ever.

How does MongoDB work?

Data is essential for gaining a competitive advantage in business. It has the power to reveal new insights that offer opportunities for profit, efficiency, and operational scaling. This is why organizations of all sizes and industries are eager to leverage data for an edge in the marketplace. However, working with data can be challenging for many businesses due to various obstacles like database storage scalability, security, and compliance.

The future of Kubernetes networking: Cilium and other CNIs with Canonical Kubernetes

Choosing the right Container Network Interface (CNI) for Kubernetes is critical to achieving optimal performance, security, and scalability. With the launch of Canonical Kubernetes LTS (long-term support) last month, Canonical decided to integrate Cilium as the default CNI in order to reflect our commitment to delivering a modern, security-maintained, high-performance Kubernetes experience.

Securing Software Supply Chains: New Research Highlights Industry Vulnerabilities

New IDC study, co-sponsored by Canonical and Google Cloud, reveals the challenges and opportunities for organizations securing their software supply chains. Today, Canonical and Google Cloud released findings from a joint research project conducted by the International Data Corporation (IDC) that sheds light on the critical challenges organizations face in securing their software supply chains. The report, “The State of Software Supply Chains.

Open source enterprise application security remains a challenge despite greater patching efforts, IDC research reveals

The latest report from the International Data Corporation (IDC) co-sponsored by Canonical and Google Cloud indicates that 36% of organizations adopt open source to improve development velocity, and 7 in 10 organizations see open source as extremely important to run mission critical workloads. However as open source adoption grows, organizations face increasing difficulty in securing and maintaining their software supply chains.

What is Application Security (AppSec)?

The cybersecurity world has changed. Thanks to spreading risk of cyber attacks, malware, ransomware, and the intensifying pressure of new cybersecurity regulations and sky-high penalties for leaks and breaches, robust Application Security (AppSec) is non-negotiable. In this blog, you’ll learn how you can meet these challenges head on, and secure your operations and systems by focusing on the most fundamental aspects of your security posture.

Accelerating AI with open source machine learning infrastructure

The landscape of artificial intelligence is rapidly evolving, demanding robust and scalable infrastructure. To meet these challenges, we’ve developed a comprehensive reference architecture (RA) that leverages the power of open-source tools and cutting-edge hardware.

Unlocking Edge AI: a collaborative reference architecture with NVIDIA

The world of edge AI is rapidly transforming how devices and data centers work together. Imagine healthcare tools powered by AI, or self-driving vehicles making real-time decisions. These advancements rely on bringing AI directly to edge devices. However, building a robust architecture for diverse edge environments presents significant hurdles. This blog introduces our new reference architecture, designed to simplify edge AI deployment.