Operations | Monitoring | ITSM | DevOps | Cloud

February 2024

Introduction to Apache Kafka

Have you heard about Apache Kafka but aren’t quite sure about its functions or applications? This webinar is tailored for you. Apache Kafka is more than just a buzzword in the tech community; it’s a critical tool for data processing and management. Join our expert-led webinar to explore the world of Apache Kafka, a powerful distributed event streaming platform. Learn how Canonical simplifies Kafka operations, offering secure, automated deployments and maintenance across various clouds.

Telco-grade Sylva-compliant Canonical platforms

In December 2023, Canonical joined the Sylva project of Linux Foundation Europe to provide fully open-source and upstream telco platform solutions to the project. Sylva aims to tackle the fragmentation in telco cloud technologies and the vendor lock-in caused by proprietary platform solutions, by defining a common validation software framework for telco core and edge clouds.

Canonical announces the availability of Real-time Ubuntu for Amazon EKS Anywhere

Barcelona, Spain. 28 February 2024. Canonical today announced an expansion of its relationship with Amazon Web Services (AWS) to make Real-time Ubuntu available to Amazon Elastic Kubernetes Service Anywhere (Amazon EKS Anywhere) customers for use in Open radio access network (RAN) commercial deployments. With Real-time Ubuntu and Amazon EKS Anywhere, customers can benefit from ultra-reliable low-latency operating system performance and simplified Kubernetes cluster management.

Canonical announces the general availability of Charmed Kafka

27 February 2024: Today, Canonical announced the release of Charmed Kafka – an advanced solution for Apache Kafka® that provides everything users need to run Apache Kafka at scale. Apache Kafka is an event store that supports a range of contemporary applications including microservices architectures, streaming analytics and AI/ML use cases. Canonical Charmed Kafka simplifies deployment and operation of Kafka across public clouds and private data centres alike.

Ubuntu AI Podcast | Launch of 2nd series

Season 2 of Ubuntu AI podcast is here! After a start with great guests and great feedback from our listeners, we are ready to kickstart a new series of episodes. We will continue talking about AI and open source, focusing mostly on the machine learning lifecycle, AI on public cloud, AI at the edge and the security angle of the AI projects. This time around, we will periodically invite contributors to open source projects from the AI space to join us.

Crafting new Linux schedulers with sched-ext, Rust and Ubuntu

In our ongoing exploration of Rust and Ubuntu, we delve into an experimental kernel project that leverages these technologies to create new schedulers for Linux. Playing around with CPU scheduling policies has always been a dream for many kernel hackers and OS enthusiasts. However, such material typically remains within the domain of a few core kernel developers with extensive years of experience.

What is a Kubernetes operator?

Operators take a real-world operations team’s knowledge, wisdom, and expertise, and codify it into a computer program that helps operating complex server applications like databases, messaging systems, or web applications. Operators provide implementations for operating applications that are testable and thus more reliable at runtime.

Preview Confidential AI with Ubuntu Confidential VMs and Nvidia H100 GPUs on Microsoft Azure

With Ubuntu confidential AI on Azure, businesses can undertake various tasks including ML training, inference, confidential multi-party data analytics, and federated learning with confidence. The effectiveness of AI models depends heavily on having access to large amounts of good quality data. While using publicly available datasets has its place, for tasks like medical diagnosis or financial risk assessment, we need access to private data during both training and inference.

.NET chiselled Ubuntu Containers | Canonical x Microsoft Interview

Dive deep into the collaboration between Canonical and Microsoft as we explore the latest innovation in the world of containers and.NET. In this interview, Richard Lander, Principal Program Manager for.NET at Microsoft, sits down with Cristovao Cordeiro, Engineering Manager for Containers at Canonical, to discuss the exciting developments post the launch of chiselled Ubuntu on Microsoft.NET with a focus on.NET 8, the latest release from Microsoft.

Unlocking software-defined vehicles: a deep dive into automotive software

We will address key topics such as the need for cybersecurity mandates, the evolving E/E architecture of SDVs, the importance of maintaining software integrity, meeting regulatory requirements, and delivering innovative features to enhance the user experience.

Edge AI: what, why and how with open source

Edge AI is transforming the way that devices interact with data centres, challenging organisations to stay up to speed with the latest innovations. From AI-powered healthcare instruments to autonomous vehicles, there are plenty of use cases that benefit from artificial intelligence on edge computing. This blog will dive into the topic, capturing key considerations when starting an edge AI project, main benefits, challenges and how open source fits into the picture.

5 Edge Computing Examples You Should Know

In the fast-paced world of technology, innovation is the key to staying ahead of the curve. As businesses strive for efficiency, speed, and real-time data processing, the spotlight is increasingly turning towards edge computing. Edge computing represents a paradigm shift in the way data is processed and analysed. Unlike traditional cloud computing, which centralises data processing in distant data centres, edge computing brings the processing power closer to the source of data.

Charmed MongoDB: use cases for financial services

Financial institutions handle vast amounts of sensitive and confidential data, including customer information, transaction details, and regulatory compliance records. A trusted database ensures the security and privacy of this sensitive information, protecting it from unauthorised access, breaches, or cyber threats. MongoDB is the ideal fit, and it’s one of the most widely used databases in the financial services industry. It provides a sturdy, adaptable and trustworthy foundation.

Cloud storage security best practices

Data is like the crown jewels of any organisation, if lost or exposed there could be severe repercussions. Failure to protect against system failure could lead to the loss of business data rendering a business non-functional and ultimately causing it’s failure. Exposing sensitive data to unauthorised parties not only leads to reputational damage, but can also cause businesses to incur massive fines.

Driving towards Environmental Parity and Software-Defined Vehicles with EB corbos Linux - built on Ubuntu

As the automotive industry continues to advance into the world of high-performance computing (HPC), it becomes increasingly crucial to achieve environmental parity for seamless software integration. In this blog post, we will explore the synergy between Elektrobit and Canonical at the core of ‘EB corbos Linux – built on Ubuntu‘ in the context of automotive computing.

Exploring edge computing in automotive

From autonomous cars to factories: how data processing at the edge will transform automotive Automotive is at the forefront of innovation, but challenges always come with change. One of those challenges is processing data in decentralised environments like factories or vehicles. In this webinar, you will learn about automotive use cases that require local data processing for confidential reasons, or simply due to networking constraints. We will also discuss what edge clouds bring to the table and how Canonical’s MicroCloud addresses the automotive industry’s edge computing challenges.

[Demo] Intel TDX 1.0 technology preview available on Ubuntu 23.10

Securing data at run-time has long been an open security challenge. Whether it is malicious insiders exploiting elevated privileges or attackers exploiting vulnerabilities within the platform’s privileged system software, your data’s confidentiality and integrity was at risk.