Operations | Monitoring | ITSM | DevOps | Cloud

Ubuntu Community | 20 years of Ubuntu

A lot has changed in the past two decades. A lot of new releases, new platforms and even a few new logos along the way. One thing stayed the same: the heart of Ubuntu. A global community of users, enthusiasts and contributors all helping to spread the mission of changing the world through open-source software. We couldn't have done it without you.

Ubuntu Community | 20 years of Ubuntu

A lot has changed in the past two decades. A lot of new releases, new platforms and even a few new logos along the way. One thing stayed the same: the heart of Ubuntu. A global community of users, enthusiasts and contributors all helping to spread the mission of changing the world through open-source software. We couldn't have done it without you.

Create an EKS Cluster with Ubuntu Pro Using eksctl

Setting up an EKS cluster with Ubuntu Pro has never been easier, thanks to eksctl. In this brief tutorial, we'll walk you through the simplest way to create an EKS cluster with Ubuntu Pro, using the latest version of eksctl. Why choose Ubuntu Pro? Ubuntu Pro on EKS provides enhanced security features tailored for your enterprise needs. From Kernel Livepatch, which keeps your kernel secure without requiring node reboots, to ESM-Apps, ensuring your containers run with fully supported open-source software from Ubuntu's repositories—all backed by Canonical's active security maintenance.

What is the Cyber Resilience Act?

The Cyber Resilience Act is an upcoming European Union legislation that aims to implement more rigorous cybersecurity commitments, documentation, and vulnerability reporting requirements for the IT industry. The legislation would apply to developers, distributors, manufacturers and retailers of hardware, devices, software, applications, and other “products with digitally connected elements” sold within the EU. The requirements you need to meet depend on the CRA classification of products.

STIG hardening on Ubuntu 22.04 with Ubuntu Security Guide

In this webinar, Henry Coggill will showcase USG (the Ubuntu Security Guide) and demonstrate how it can automate compliance requirements. We will discuss the hardening profiles that are available, including DISA-STIG and CIS benchmarks, then cover setting up and configuring the tool and demonstrate the configuration options that you can make for maximum security and coverage of the STIG rules.

A data lake on your cloud with Spark, Kubernetes and OpenStack

Data lake is a very large scale data processing paradigm that disrupts the conventional data warehousing model. Data lakes can offer greater flexibility whilst retaining the benefits and efficiency of centralised data governance. With Canonical OpenStack private cloud platform, Kubernetes and Charmed Spark solutions, your data lake architecture can also benefit from extended flexibility and scalability whilst remaining cost effective to operate.

Optimise your ML workloads on Kubernetes

Kubernetes has proven to be a vital tool for developing and running ML models. It enhances experimentation, workflow management, and ensures high availability while handling the resource-intensive nature of AI workloads. With optimizations, Kubernetes can further improve resource utilization, making AI/ML projects more efficient.