Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Spark or Hadoop: the best choice for big data teams?

I always find the Olympics to be an unusual experience. I’m hardly an athletics fanatic, yet I can’t help but get swept up in the spirit of the competition. When the Olympics took place in Paris last summer, I suddenly began rooting for my country in sports I barely knew existed. I would spend random Thursday nights glued to the TV, cheering on athletes as they skillfully let fly arrows, disks, hammers and so on.

What is SBOM? Software bill of materials explained

In the wake of EU drafted legislation and US executive orders, a software bill of materials (SBOM) has gone from a nice-to-have to a fundamental piece of software documentation. In this article, we’ll examine what an SBOM is, what information it must include, and the approaches that developers and manufacturers alike should consider as they start building their SBOM.

Anbox Cloud 1.24.0: new features, improvements and updates

In this video, Anbox team covers new features and changes in Anbox Cloud 1.24.0 release: What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Chapters for Easy Navigation.

Introducing Charmed PostgreSQL

PostgreSQL, a proven and well-loved database trusted by IT sectors for over three decades, continues to evolve with modern enterprise needs. In this video, we introduce Charmed PostgreSQL — an advanced enterprise solution designed to secure and automate the deployment, maintenance, and upgrades of PostgreSQL databases across private and public clouds.

Documentation, development and design for technical authors

Typically, a technical writer takes the product created by a development team, and writes the documentation that expresses the product to its users. At Canonical we take a different approach. Documentation is part of the product. It’s the responsibility of the whole team. Documentation work is led by a technical author, who is part of the team, and whose title signals their technical authority.

Industrial cybersecurity: the journey towards IEC 62443 compliance

Industrial cybersecurity is on every CISO’s mind as manufacturers strive to integrate their IT and OT operations to drive efficiency and productivity. However, with increased connectivity comes heightened risk. This means that securing devices, networks, and systems is a critical challenge.

GenAI security with confidential computing

Watch to explore how to ensure data security and privacy in AI applications that employ Large Language Models (LLMs). As generative AI becomes increasingly vital for enterprises – especially in applications such as chatbots utilizing Retrieval-Augmented Generation (RAG) systems – ensuring the security and confidentiality of data within these frameworks is essential. During this webinar: We will introduce confidential computing as a method for safeguarding data, with a specific focus on its application within RAG systems for securing data during usage or processing;

Entra ID authentication on Ubuntu at scale with Landscape

In September we introduced Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory), making it a useful tool to centralize authentication for both the application and the infrastructure layer. In large enterprises system administrators often need to deploy and manage applications and their configuration at scale.