Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

Intel the era of AI: business transformation with open source | Data & AI Masters

AI is transforming the way organizations work globally. It makes everyone look differently at all scales, from workstations to data centers and edge devices. Intel’s strategy heavily focuses on AI as the next milestone to drive innovation and enable other organizations to move their projects beyond experimentation.

Launch Ubuntu Pro on Spot Instances on AWS EC2

Ubuntu Pro on Spot Instances is now generally available—here’s how to launch it using the AWS EC2 console. This guide walks you through requesting and configuring a Spot Instance for secure, cost-effective operations. Ubuntu Pro provides out-of-the-box security and compliance features, making it an ideal choice for short-term workloads like AWS EC2 Spot Instances.

What is RAG?

In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them, RAG incorporates current information that serves as a reliable source of truth for LLMs.

How does OpenSearch work?

OpenSearch is an open source search and analytics suite that developers use to build solutions for search, data observability, data ingestion, security information and event management (SIEM), vector database, and more. It is designed for scalability, offering powerful full-text search capabilities and supporting various data types, including structured and unstructured data. OpenSearch has rapidly developed into a standalone platform with unique features and capabilities.

What is vulnerability management?

Today, computers are more sophisticated, interconnected and complex than ever. This means they’re more capable than ever – but it also comes with a downside: that their attack surface is larger than ever, leading to an elevated risk of cyber incidents. Therefore, your approach to managing vulnerabilities needs to be holistic and prepare for all the ways in which vulnerabilities could cause damage to users, systems or your organization’s operations and reputation.

Using Ceph as a scalable storage solution for AI workloads | Data & AI Masters | Canonical

In this talk Canonical's Phil Williams will introduce why Ceph is referred to as the swiss army knife of storage. Discover the versatility of Ceph as we explore how it is deployed, scales and integrates with all types of infrastructure and applications- all the way from a developer’s workstation to edge infrastructure and large scale production environments.

Spark or Hadoop: the best choice for big data teams?

I always find the Olympics to be an unusual experience. I’m hardly an athletics fanatic, yet I can’t help but get swept up in the spirit of the competition. When the Olympics took place in Paris last summer, I suddenly began rooting for my country in sports I barely knew existed. I would spend random Thursday nights glued to the TV, cheering on athletes as they skillfully let fly arrows, disks, hammers and so on.

What is SBOM? Software bill of materials explained

In the wake of EU drafted legislation and US executive orders, a software bill of materials (SBOM) has gone from a nice-to-have to a fundamental piece of software documentation. In this article, we’ll examine what an SBOM is, what information it must include, and the approaches that developers and manufacturers alike should consider as they start building their SBOM.