Operations | Monitoring | ITSM | DevOps | Cloud

Introducing Charmed PostgreSQL

PostgreSQL, a proven and well-loved database trusted by IT sectors for over three decades, continues to evolve with modern enterprise needs. In this video, we introduce Charmed PostgreSQL — an advanced enterprise solution designed to secure and automate the deployment, maintenance, and upgrades of PostgreSQL databases across private and public clouds.

GenAI security with confidential computing

Watch to explore how to ensure data security and privacy in AI applications that employ Large Language Models (LLMs). As generative AI becomes increasingly vital for enterprises – especially in applications such as chatbots utilizing Retrieval-Augmented Generation (RAG) systems – ensuring the security and confidentiality of data within these frameworks is essential. During this webinar: We will introduce confidential computing as a method for safeguarding data, with a specific focus on its application within RAG systems for securing data during usage or processing;

Confidential AI with Ubuntu on Azure: a deep dive | Data & AI Masters | Canonical and Microsoft

When performing machine learning tasks in the cloud, enterprises understandably have concerns about the potential compromise of their sensitive data privacy as well as their model’s intellectual property. Additionally, stringent industry regulations often prohibit the sharing of such data. This makes it difficult, or outright impossible, to utilise large amounts of valuable private data, limiting the true potential of AI across crucial domains.

Valkey explained: How to power your web applications with Valkey | Data & AI Masters | Canonical

Modern web applications require a balance between performance, scalability, and ease of development. Valkey is an open-source (BSD) high-performance key/value datastore that supports various workloads such as caching and message queues and can act as a primary database. This makes Valkey an ideal database for running modern web applications.

MicroCloud LTS Demo

Canonical MicroCloud’s 2.1.0 LTS release features support for single-node deployments, improved security posture, and more flexibility during the initialization process. In this video we guide you through the new process, starting with deploying a MicroCloud on a single node, and then expanding with two additional members for a highly available cluster. Follow along and try it yourself.

What is a MicroCloud?

A MicroCloud is a new lightweight, featureful, and straightforward cloud for on-demand computing at the edge. MicroClouds differ from IoT which uses thousands of single machines or sensors to gather data, yet does not perform computing tasks. Instead, MicroClouds reuse proven cloud primitives with unattended, autonomous, and clustering features that resolve typical edge computing challenges.

Navigating multi-cloud database deployments with MySQL for maximum uptime

Public cloud providers offer convenient services for database deployments. However, depending solely on a single provider’s database-as-a-service can result in vendor lock-in and reduce your system’s resilience against widespread outages affecting the provider. Instead, explore our approach to deploying MySQL across multiple clouds. A multi-cloud database strategy enables you to retain control of your infrastructure while enhancing overall resiliency and leveraging the unique strengths of each cloud provider.

Creating a Secure Cyber Environment | Ubuntu Security Podcast

Software supply chain knowledge is crucial for cybersecurity. It's essential to understand not only what's running but also its provenance and reliability. In episode two of our 3-part Month podcast series, Eduardo Barretto and Luci Stanescu join Alex Murray to discuss some of the best cybersecurity practices for everyone.

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.