Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

What is Defense in Depth and how can you apply it with Ubuntu?

Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.

How to build your first model using DSS

GenAI is everywhere, and it’s changing how we approach technology. If you’ve ever wanted to dive into the world of large language models (LLMs) but felt intimidated, there’s good news! Hugging Face recently launched a self-paced course that’s perfect for beginners and more experienced enthusiasts alike. It’s hands-on, approachable, and designed to work on standard hardware thanks to the small footprint of the models.

Your data applications, contained and maintained

It’s time to stop proclaiming that “cloud native is the future”. Kubernetes has just celebrated its 10 year anniversary, and 76% of respondents to the latest CNCF Annual Survey reported that they have adopted cloud native technologies, like containers, for much or all of their production development and deployment. Cloud native isn’t the future – it’s here and now. Data-intensive workloads are no exception.

Digital transformation in logistics with edge AI | Data & AI Masters | Rehrig Pacific Company

Rehrig Pacific is an industry leader in waste, recycling and supply chain solutions. With an origin story that dates back to 1913, Rehrig has made its mark as a provider of sustainable packaging products. The company produces reusable, returnable plastic assets that integrate with smart material handling equipment to create end to end delivery solutions for the industries they serve.

How to benchmark your database management system | Data & AI Masters | Canonical

In this talk Mohamed Nsiri will provide a step-by-step guide on how to perform a benchmark of a given database management system configuration. We will explain how to assess the performance impact of a change (in memory, cpu speed, etc.) and how to universally compare different setups. The workshop will cover various factors that can significantly impact the performances of your databases including number of concurrent users, workload pattern and more.

What to know when procuring Linux laptops

Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your success. So what does being “well-equipped” look like in the world of Linux laptops? In this blog, we’ll lay down the best practices for procurement professionals who have been tasked with procuring Linux laptops.

Building RAG with enterprise open source AI infrastructure

One of the most critical gaps in traditional Large Language Models (LLMs) is that they rely on static knowledge already contained within them. Basically, they might be very good at understanding and responding to prompts, but they often fall short in providing current or highly specific information.

Secure Your Cloud Journey: Google Cloud & Ubuntu Pro for Enhanced Protection

Discover how Google Cloud and Ubuntu Pro enhance cloud security. With Google Cloud’s robust infrastructure and advanced analytics, plus Ubuntu Pro’s 12 years of security patching and compliance features, you can confidently innovate while keeping your data safe. Simplify setup and focus on your business while we handle the security.