Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

What is SysOps? Learn more about key SysOps responsibilities and how Landscape can help

What is SysOps and what role do systems management tools play in SysOps responsibilities? Canonical’s Rajan Patel explains the concept and dives into the key features Canonical’s systems management tool delivers to help teams take control of their IT infrastructure.

Ubuntu Early Days | 20 Years of Ubuntu | Reflections from the Canonical team

In this video, the Canonical team reflects on 20 years of Ubuntu. Canonical attracts a diverse team of experts united by one mission: to amplify the impact of open source. Many of the original contributors and team members behind Ubuntu are still around, including our Founder and CEO. So what was it that attracted them to get involved in a project like Ubuntu?

What is the Cyber Resilience Act (CRA)? | Open Source Cybersecurity

Today, compliance is more important than ever before. As part of our #CybersecurityAwareness month series, we’re sharing essential insights on security compliance. Watch as Cédric Gégout, VP of Product Management at Canonical, breaks down the key aspects of the Cybersecurity Resilience Act (CRA), a new regulation set to take effect in 2027. In the video, you’ll learn what CRA is, how it classifies products, and what it means for your organization.

Secure your stack with Canonical | Open Source Cybersecurity

Cybersecurity is an ongoing challenge for many enterprises, and safeguarding systems against evolving threats requires proactive, diligent security assessments and monitoring. Security and compliance is a challenge for organizations, with research showing that 84% of codebase contains at least one vulnerability and requires about 100 days on average to apply those fixes. In this video, Cédric Gégout, VP Product Management at Canonical, dives into the complexities of securing open source systems and company infrastructures, sharing insights from Canonical’s 20+ years of experience.

What is a vector database?

A vector database is a data storage system that organises information in the form of vectors, which are mathematical representations. These databases are designed to store, index, and query vector embeddings or numerical representations of unstructured data, including text documents, multimedia content, audio, geospatial coordinates, tables, and graphs.

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Ubuntu powers Azure's confidential AI offering

Microsoft Azure has announced the general availability of their confidential virtual machines (VMs) with NVIDIA H100 Tensor Core GPUs, powered by Ubuntu. This offering combines the hardware-based protection of AMD EPYC processors with NVIDIA’s latest GPU technology to enable secure and high-performance AI workloads in the cloud. Combining these technologies allows sensitive sectors to unlock AI adoption through addressing previous concerns of critical data privacy.

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).

The waiting game is over. 5G is coming to the edge.

Cédric Gégout (VP of Product at Canonical) reflects on a recent research report that Canonical published in collaboration with Omdia. The report uncovered that despite the lack of widespread 5G standalone infrastructure, enterprises, industrial actors and service providers are preparing for 5G edge computing to produce returns within two years.

How to deploy AI workloads at the edge using open source solutions

AI is driving a new wave of opportunities in all kinds of edge settings—from predictive maintenance in manufacturing, to virtual assistants in healthcare, to telco router optimisation in the most remote locations. But to support these AI workloads running virtually everywhere, companies need edge infrastructure that’s fast, secure and highly scalable.