Canonical

London, UK
2004
  |  By Michelle Anne Tabirao
One of the most critical gaps in traditional Large Language Models (LLMs) is that they rely on static knowledge already contained within them. Basically, they might be very good at understanding and responding to prompts, but they often fall short in providing current or highly specific information.
  |  By Matthew de Klerk
What is patching automation? With increasing numbers of vulnerabilities, there is a growing risk of cyber incidents, attacks and breaches. It’s more important than ever to ensure that your systems are protected 24/7. Patching is a vital step in any vulnerability management process.
  |  By Michelle Anne Tabirao
In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them, RAG incorporates current information that serves as a reliable source of truth for LLMs.
  |  By Michelle Anne Tabirao
OpenSearch is an open source search and analytics suite that developers use to build solutions for search, data observability, data ingestion, security information and event management (SIEM), vector database, and more. It is designed for scalability, offering powerful full-text search capabilities and supporting various data types, including structured and unstructured data. OpenSearch has rapidly developed into a standalone platform with unique features and capabilities.
  |  By Matthew de Klerk
Today, computers are more sophisticated, interconnected and complex than ever. This means they’re more capable than ever – but it also comes with a downside: that their attack surface is larger than ever, leading to an elevated risk of cyber incidents. Therefore, your approach to managing vulnerabilities needs to be holistic and prepare for all the ways in which vulnerabilities could cause damage to users, systems or your organization’s operations and reputation.
  |  By Giulia Lanzafame
I always find the Olympics to be an unusual experience. I’m hardly an athletics fanatic, yet I can’t help but get swept up in the spirit of the competition. When the Olympics took place in Paris last summer, I suddenly began rooting for my country in sports I barely knew existed. I would spend random Thursday nights glued to the TV, cheering on athletes as they skillfully let fly arrows, disks, hammers and so on.
  |  By Matthew de Klerk
In the wake of EU drafted legislation and US executive orders, a software bill of materials (SBOM) has gone from a nice-to-have to a fundamental piece of software documentation. In this article, we’ll examine what an SBOM is, what information it must include, and the approaches that developers and manufacturers alike should consider as they start building their SBOM.
  |  By Daniele Procida
Typically, a technical writer takes the product created by a development team, and writes the documentation that expresses the product to its users. At Canonical we take a different approach. Documentation is part of the product. It’s the responsibility of the whole team. Documentation work is led by a technical author, who is part of the team, and whose title signals their technical authority.
  |  By Edoardo Barbieri
Industrial cybersecurity is on every CISO’s mind as manufacturers strive to integrate their IT and OT operations to drive efficiency and productivity. However, with increased connectivity comes heightened risk. This means that securing devices, networks, and systems is a critical challenge.
  |  By Massimiliano Gori
In September we introduced Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory), making it a useful tool to centralize authentication for both the application and the infrastructure layer. In large enterprises system administrators often need to deploy and manage applications and their configuration at scale.
  |  By Canonical
Discover how Google Cloud and Ubuntu Pro enhance cloud security. With Google Cloud’s robust infrastructure and advanced analytics, plus Ubuntu Pro’s 12 years of security patching and compliance features, you can confidently innovate while keeping your data safe. Simplify setup and focus on your business while we handle the security.
  |  By Canonical
AI is transforming the way organizations work globally. It makes everyone look differently at all scales, from workstations to data centers and edge devices. Intel’s strategy heavily focuses on AI as the next milestone to drive innovation and enable other organizations to move their projects beyond experimentation.
  |  By Canonical
Ubuntu Pro on Spot Instances is now generally available—here’s how to launch it using the AWS EC2 console. This guide walks you through requesting and configuring a Spot Instance for secure, cost-effective operations. Ubuntu Pro provides out-of-the-box security and compliance features, making it an ideal choice for short-term workloads like AWS EC2 Spot Instances.
  |  By Canonical
In this talk Canonical's Phil Williams will introduce why Ceph is referred to as the swiss army knife of storage. Discover the versatility of Ceph as we explore how it is deployed, scales and integrates with all types of infrastructure and applications- all the way from a developer’s workstation to edge infrastructure and large scale production environments.
  |  By Canonical
Is your organization ready to tackle the challenges of the modern workforce? Join us for an exclusive webinar where we'll show you how to unleash new ways of working with a flexible, cost-effective VDI. What you’ll learn.
  |  By Canonical
Unlock the power of OpenSearch for search, SIEM, data observability, and generative AI. Explore automation, security, and support from trusted experts with our Managed OpenSearch Services, 1 hour response time for the most critical issues.
  |  By Canonical
In this video, Anbox team covers new features and changes in Anbox Cloud 1.24.0 release: What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Chapters for Easy Navigation.
  |  By Canonical
PostgreSQL, a proven and well-loved database trusted by IT sectors for over three decades, continues to evolve with modern enterprise needs. In this video, we introduce Charmed PostgreSQL — an advanced enterprise solution designed to secure and automate the deployment, maintenance, and upgrades of PostgreSQL databases across private and public clouds.
  |  By Canonical
Watch to explore how to ensure data security and privacy in AI applications that employ Large Language Models (LLMs). As generative AI becomes increasingly vital for enterprises – especially in applications such as chatbots utilizing Retrieval-Augmented Generation (RAG) systems – ensuring the security and confidentiality of data within these frameworks is essential. During this webinar: We will introduce confidential computing as a method for safeguarding data, with a specific focus on its application within RAG systems for securing data during usage or processing;
  |  By Canonical
When performing machine learning tasks in the cloud, enterprises understandably have concerns about the potential compromise of their sensitive data privacy as well as their model’s intellectual property. Additionally, stringent industry regulations often prohibit the sharing of such data. This makes it difficult, or outright impossible, to utilise large amounts of valuable private data, limiting the true potential of AI across crucial domains.
  |  By Canonical
From the smallest startups to the largest enterprises alike, organisations are using Artificial Intelligence and Machine Learning to make the best, fastest, most informed decisions to overcome their biggest business challenges. But with AI/ML complexity spanning infrastructure, operations, resources, modelling and compliance and security, while constantly innovating, many organizations are left unsure how to capture their data and get started on delivering AI technologies and methodologies.
  |  By Canonical
Traditional development methods do not scale into the IoT sphere. Strong inter-dependencies and blurred boundaries among components in the edge device stack result in fragmentation, slow updates, security issues, increased cost, and reduced reliability of platforms. This reality places a major strain on IoT players who need to contend with varying cycles and priorities in the development stack, limiting their flexibility to innovate and introduce changes into their products, both on the hardware and software sides.
  |  By Canonical
Private cloud, public cloud, hybrid cloud, multi-cloud... the variety of locations, platforms and physical substrate you can start a cloud instance on is vast. Yet once you have selected an operating system which best supports your application stack, you should be able to use that operating system as an abstraction layer between different clouds.
  |  By Canonical
Container technology has brought about a step-change in virtualisation technology. Organisations implementing containers see considerable opportunities to improve agility, efficiency, speed, and manageability within their IT environments. Containers promise to improve datacenter efficiency and performance without having to make additional investments in hardware or infrastructure. Traditional hypervisors provide the most common form of virtualisation, and virtual machines running on such hypervisors are pervasive in nearly every datacenter.
  |  By Canonical
Big Software, IoT and Big Data are changing how organisations are architecting, deploying, and managing their infrastructure. Traditional models are being challenged and replaced by software solutions that are deployed across many environments and many servers. However, no matter what infrastructure you have, there are bare metal servers under it, somewhere.

We deliver open source to the world faster, more securely and more cost effectively than any other company.

We develop Ubuntu, the world’s most popular enterprise Linux from cloud to edge, together with a passionate global community of 200,000 contributors. Ubuntu means 'humanity to others'​. We chose it because it embodies the generosity at the heart of open source, the new normal for platforms and innovation.

Together with a community of 200,000, we publish an operating system that runs from the tiny connected devices up to the world's biggest mainframes, the platform that everybody uses on the public cloud, and the workstation experience of the world's most productive developers.

Products:

  • Ubuntu: The new standard secure enterprise Linux for servers, desktops, cloud, developers and things.
  • Landscape: Updates, package management, repositories, security, and regulatory compliance for Ubuntu.
  • MAAS: Dynamic server provisioning and IPAM gives you on-demand bare metal, a physical cloud.
  • LXD: The pure-container hypervisor. Run legacy apps in secure containers for speed and density.
  • Juju: Model-driven cloud-native apps on public and private infrastructure and CAAS.
  • Snapcraft: The app store with secure packages and ultra-reliable updates for multiple Linux distros.

Drive down infrastructure cost, accelerate your applications.