Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Reducing latency in industrial systems with real-time Ubuntu on Intel SoCs

Delivering a comprehensive real-time solution for industrial systems requires careful work at every layer of the stack. Since standalone hardware or software components are not sufficient, Canonical and Intel have joined forces to deliver an out-of-the-box real-time solution. This solution is now generally available on Intel Core processors.

Enhancing the Ubuntu Experience on Azure: Introducing Ubuntu Pro Updates Awareness

Canonical works closely with Microsoft to ensure that running Ubuntu on Azure is a great experience. One of the key aspects of this collaboration is ensuring the longevity and security of Ubuntu releases, such as Ubuntu 18.04 LTS, even beyond their Standard Security Maintenance period. We are excited to announce the integration of Ubuntu Pro update awareness into Azure through the Azure Guest Patching Service (AzGPS) and Update Management Center (UMC).

Why and how to use Rust on Ubuntu

Rust has been the language most loved by developers for the last 8 years and it is seeing increased adoption by software companies of all sizes. However, its many high-level rules and abstractions create a steep initial learning curve which can leave the impression that Rust is the preserve of a select few but this couldn’t be any further from the truth. Let’s examine why Rust is often a great choice and take a look at how to get started with it on Ubuntu.

Learn how to monitor Linux computers with Pandora FMS: Full guide

Today, in those much needed training videos, we will delve into the exciting and mysterious universe of basic monitoring of computers with Linux operating systems. Ready to unlock the hidden secrets of your devices? Well, let’s go! Before you dive into this adventure, make sure you have Pandora FMS environment installed and running. Done? Well, now we will focus on how to monitor those Linux computers that allow you to install the software agent devoted to this operating system.

Why do you also need confidential computing for your private datacenter?

As the adoption of confidential computing gains momentum, a question we often get asked is: why would I need confidential computing in my private data center? However, while it is true that confidential computing has often been associated with addressing security concerns in public cloud environments, its value proposition extends well beyond that.

Start your SNP VMs on Google Cloud

SEV-SNP is a new security feature that is available on AMD’s EPYC processors. It stands for Secure Encrypted Virtualization Secure Nested Pages. SEV-SNP provides a new level of protection for firmware by encrypting the memory pages that contain the firmware code. This makes it much more difficult for attackers to gain access to the firmware and launch attacks.

Optimizing Network Performance using Topology Aware Routing with Calico eBPF and Standard Linux dataplane

In this blog post, we will explore the concept of Kubernetes topology aware routing and how it can enhance network performance for workloads running in Amazon. We will delve into topology aware routing and discuss its benefits in terms of reducing latency and optimizing network traffic flow. In addition, we’ll show you how to minimize the performance impact of overlay networking, using encapsulation only when necessary for communication across availability zones.

Vanilla 4.0 release

Last week we released a new major version of the Vanilla framework. Vanilla 4.0 introduces the elements of the new style used for a current rebranding of Canonical’s brochure websites, including typography changes of headings utilising new variable Ubuntu font, wider grid width, removed rounded corners, some updated colours, and updates to any related components.

What does the future of AI hold in store?

On 16 July the world celebrates International Artificial Appreciation Day. In the previous century, science fiction often covered topics and inventions that are now closer to science fact, such as humanoid robots. In the 50s, artificial intelligence met both great successes, including algorithm development, and big failures, caused by compute power constraints.