Operations | Monitoring | ITSM | DevOps | Cloud

AI-powered robotics in action: Canonical & @qualcomm #ubuntu #opensource #iot #tech #shorts

At Canonical, we are working with Qualcomm to bring the power of Ubuntu to the latest robotics and systems: RB3 Gen2 Robotics Vision Kit – Running AI inference for body part detection Qualcomm’s new IQ9 – A high-performance system delivering 100 TOPS DSP performance By enabling Ubuntu on these systems, we simplify development and deployment, making it easier for engineers and researchers to optimize their applications across multiple hardware platforms.

European Space Agency: Modernizing data and IT infrastructure to advancespace exploration with AI

The European Space Agency (ESA) leads some of the most exciting and impactful space missions, from the Billion Star Survey to Euclid’s exploration of dark matter and energy. None of these missions would be possible without infrastructure. To expand its space mission capacity, ESA embarked on a journey to modernise its IT infrastructure and adopt an integrated set of data management capabilities. Using this new infrastructure will enable the agency to reach new frontiers and adopt new AI-driven technologies, such as anomaly detection and long-term satellite health forecasting.

AI at the Edge with #ubuntu & @RenesasPresents ! #Ubuntu #Renesas #ew25 #embeddedworld #iot

At Embedded World 2025, we demonstrated how Ubuntu enables secure, scalable, and high-performance edge AI solutions. With Secure Boot, full disk encryption, and inference running directly on a CPU in kiosk mode, this setup showcases the future of embedded intelligence. How do you see AI at the edge transforming industries?

How does AI-powered computing keep a ball balanced? #canonical #intel #embeddedworld #shorts

At Embedded World 2025 at Canonical's booth 4-160, lntel is showcasing an amazing balancing ball demo, powered by. It demonstrates the power of Intel’s cutting-edge processors, combined with the flexibility and reliability of Ubuntu, handle complex physics in milliseconds, ensuring smooth, dynamic balance with precision. A perfect example of how real-time control can be applied to, automation, and industrial AI!

How to debug an Android application using Anbox Cloud?

In this video, the Anbox team demonstrates how to debug an Android application with Android studio in Anbox Cloud. What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Trademark notice Android is a trademark of Google LLC. Anbox Cloud uses assets available through the Android Open Source Project.

How to install Anbox Cloud Appliance?

In this video, the Anbox team shows how to install the appliance on a dedicated machine. What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Trademark notice Android is a trademark of Google LLC. Anbox Cloud uses assets available through the Android Open Source Project.

Container attack surface explained

Have you noticed how open-source software has become essential to innovation in the cloud-native arena? Countless cloud-native applications are powered by open source, and they are often mission-critical for organizations across industries, ranging from small startups to large enterprises. However, there are inherent security risks associated with this reliance on external components, and this problem is only growing as container adoption continues to gain momentum.

What is Defense in Depth and how can you apply it with Ubuntu?

Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.