Canonical

London, UK
2004
  |  By piperdeck
Open source is one of the most exciting, but often misunderstood, innovations of our modern world. I still remember the first time I installed linux on my laptop, saw the vast array of packages I could install on it, all the utilities and libraries that make it work, all the forum threads filled with advice and debugging and troubleshooting, and I thought: “Wait, all of this is free???” It’s free, you can use it, and it’s awesome.
  |  By João Hellmeister
In this third and final part of the series, I’ll provide some tips on how to set up your roadmap and effectively demonstrate compliance without overburdening your teams. If you’re just joining the fun now, in our two previous editions we covered who NIS2 applies to and what requirements it sets out. Be sure to have a look at them if you need any additional context.
  |  By João Hellmeister
In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find in NIS2 and help translate them into actionable and practical measures you can take to achieve NIS2 compliance. Join me in this post and start understanding what NIS2 is all about.
  |  By João Hellmeister
The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog post series in which I’ll explain what it is, help you understand if it is applicable to your company and how you can become NIS2 compliant.
  |  By Stefano Fioravanzo
GenAI is everywhere, and it’s changing how we approach technology. If you’ve ever wanted to dive into the world of large language models (LLMs) but felt intimidated, there’s good news! Hugging Face recently launched a self-paced course that’s perfect for beginners and more experienced enthusiasts alike. It’s hands-on, approachable, and designed to work on standard hardware thanks to the small footprint of the models.
  |  By Freyja Cooper
It’s time to stop proclaiming that “cloud native is the future”. Kubernetes has just celebrated its 10 year anniversary, and 76% of respondents to the latest CNCF Annual Survey reported that they have adopted cloud native technologies, like containers, for much or all of their production development and deployment. Cloud native isn’t the future – it’s here and now. Data-intensive workloads are no exception.
  |  By Rhys Knipe
Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your success. So what does being “well-equipped” look like in the world of Linux laptops? In this blog, we’ll lay down the best practices for procurement professionals who have been tasked with procuring Linux laptops.
  |  By Michelle Anne Tabirao
One of the most critical gaps in traditional Large Language Models (LLMs) is that they rely on static knowledge already contained within them. Basically, they might be very good at understanding and responding to prompts, but they often fall short in providing current or highly specific information.
  |  By Matthew de Klerk
What is patching automation? With increasing numbers of vulnerabilities, there is a growing risk of cyber incidents, attacks and breaches. It’s more important than ever to ensure that your systems are protected 24/7. Patching is a vital step in any vulnerability management process.
  |  By Michelle Anne Tabirao
In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them, RAG incorporates current information that serves as a reliable source of truth for LLMs.
  |  By Canonical
Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.
  |  By Canonical
Canonical CEO Mark Shuttleworth discusses open source and Canonical's portfolio and partnerships in the context of data and AI.
  |  By Canonical
Rehrig Pacific is an industry leader in waste, recycling and supply chain solutions. With an origin story that dates back to 1913, Rehrig has made its mark as a provider of sustainable packaging products. The company produces reusable, returnable plastic assets that integrate with smart material handling equipment to create end to end delivery solutions for the industries they serve.
  |  By Canonical
In this talk Mohamed Nsiri will provide a step-by-step guide on how to perform a benchmark of a given database management system configuration. We will explain how to assess the performance impact of a change (in memory, cpu speed, etc.) and how to universally compare different setups. The workshop will cover various factors that can significantly impact the performances of your databases including number of concurrent users, workload pattern and more.
  |  By Canonical
Discover how Google Cloud and Ubuntu Pro enhance cloud security. With Google Cloud’s robust infrastructure and advanced analytics, plus Ubuntu Pro’s 12 years of security patching and compliance features, you can confidently innovate while keeping your data safe. Simplify setup and focus on your business while we handle the security.
  |  By Canonical
AI is transforming the way organizations work globally. It makes everyone look differently at all scales, from workstations to data centers and edge devices. Intel’s strategy heavily focuses on AI as the next milestone to drive innovation and enable other organizations to move their projects beyond experimentation.
  |  By Canonical
Ubuntu Pro on Spot Instances is now generally available—here’s how to launch it using the AWS EC2 console. This guide walks you through requesting and configuring a Spot Instance for secure, cost-effective operations. Ubuntu Pro provides out-of-the-box security and compliance features, making it an ideal choice for short-term workloads like AWS EC2 Spot Instances.
  |  By Canonical
In this talk Canonical's Phil Williams will introduce why Ceph is referred to as the swiss army knife of storage. Discover the versatility of Ceph as we explore how it is deployed, scales and integrates with all types of infrastructure and applications- all the way from a developer’s workstation to edge infrastructure and large scale production environments.
  |  By Canonical
Is your organization ready to tackle the challenges of the modern workforce? Join us for an exclusive webinar where we'll show you how to unleash new ways of working with a flexible, cost-effective VDI. What you’ll learn.
  |  By Canonical
Unlock the power of OpenSearch for search, SIEM, data observability, and generative AI. Explore automation, security, and support from trusted experts with our Managed OpenSearch Services, 1 hour response time for the most critical issues.
  |  By Canonical
From the smallest startups to the largest enterprises alike, organisations are using Artificial Intelligence and Machine Learning to make the best, fastest, most informed decisions to overcome their biggest business challenges. But with AI/ML complexity spanning infrastructure, operations, resources, modelling and compliance and security, while constantly innovating, many organizations are left unsure how to capture their data and get started on delivering AI technologies and methodologies.
  |  By Canonical
Traditional development methods do not scale into the IoT sphere. Strong inter-dependencies and blurred boundaries among components in the edge device stack result in fragmentation, slow updates, security issues, increased cost, and reduced reliability of platforms. This reality places a major strain on IoT players who need to contend with varying cycles and priorities in the development stack, limiting their flexibility to innovate and introduce changes into their products, both on the hardware and software sides.
  |  By Canonical
Container technology has brought about a step-change in virtualisation technology. Organisations implementing containers see considerable opportunities to improve agility, efficiency, speed, and manageability within their IT environments. Containers promise to improve datacenter efficiency and performance without having to make additional investments in hardware or infrastructure. Traditional hypervisors provide the most common form of virtualisation, and virtual machines running on such hypervisors are pervasive in nearly every datacenter.
  |  By Canonical
Private cloud, public cloud, hybrid cloud, multi-cloud... the variety of locations, platforms and physical substrate you can start a cloud instance on is vast. Yet once you have selected an operating system which best supports your application stack, you should be able to use that operating system as an abstraction layer between different clouds.
  |  By Canonical
Big Software, IoT and Big Data are changing how organisations are architecting, deploying, and managing their infrastructure. Traditional models are being challenged and replaced by software solutions that are deployed across many environments and many servers. However, no matter what infrastructure you have, there are bare metal servers under it, somewhere.

We deliver open source to the world faster, more securely and more cost effectively than any other company.

We develop Ubuntu, the world’s most popular enterprise Linux from cloud to edge, together with a passionate global community of 200,000 contributors. Ubuntu means 'humanity to others'​. We chose it because it embodies the generosity at the heart of open source, the new normal for platforms and innovation.

Together with a community of 200,000, we publish an operating system that runs from the tiny connected devices up to the world's biggest mainframes, the platform that everybody uses on the public cloud, and the workstation experience of the world's most productive developers.

Products:

  • Ubuntu: The new standard secure enterprise Linux for servers, desktops, cloud, developers and things.
  • Landscape: Updates, package management, repositories, security, and regulatory compliance for Ubuntu.
  • MAAS: Dynamic server provisioning and IPAM gives you on-demand bare metal, a physical cloud.
  • LXD: The pure-container hypervisor. Run legacy apps in secure containers for speed and density.
  • Juju: Model-driven cloud-native apps on public and private infrastructure and CAAS.
  • Snapcraft: The app store with secure packages and ultra-reliable updates for multiple Linux distros.

Drive down infrastructure cost, accelerate your applications.