Operations | Monitoring | ITSM | DevOps | Cloud

Linux

An Introduction to Open Source Licensing for complete beginners

Open source is one of the most exciting, but often misunderstood, innovations of our modern world. I still remember the first time I installed linux on my laptop, saw the vast array of packages I could install on it, all the utilities and libraries that make it work, all the forum threads filled with advice and debugging and troubleshooting, and I thought: “Wait, all of this is free???” It’s free, you can use it, and it’s awesome.

A comprehensive guide to NIS2 Compliance: Part 3 - Setting the roadmap and demonstrating NIS2 compliance.

In this third and final part of the series, I’ll provide some tips on how to set up your roadmap and effectively demonstrate compliance without overburdening your teams. If you’re just joining the fun now, in our two previous editions we covered who NIS2 applies to and what requirements it sets out. Be sure to have a look at them if you need any additional context.

A comprehensive guide to NIS2 Compliance: Part 2 - Understanding NIS2 requirements

In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find in NIS2 and help translate them into actionable and practical measures you can take to achieve NIS2 compliance. Join me in this post and start understanding what NIS2 is all about.

What is Defense in Depth and how can you apply it with Ubuntu?

Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.

A comprehensive guide to NIS2 Compliance: Part 1 - Understanding NIS2 and its scope

The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog post series in which I’ll explain what it is, help you understand if it is applicable to your company and how you can become NIS2 compliant.

How to build your first model using DSS

GenAI is everywhere, and it’s changing how we approach technology. If you’ve ever wanted to dive into the world of large language models (LLMs) but felt intimidated, there’s good news! Hugging Face recently launched a self-paced course that’s perfect for beginners and more experienced enthusiasts alike. It’s hands-on, approachable, and designed to work on standard hardware thanks to the small footprint of the models.

Your data applications, contained and maintained

It’s time to stop proclaiming that “cloud native is the future”. Kubernetes has just celebrated its 10 year anniversary, and 76% of respondents to the latest CNCF Annual Survey reported that they have adopted cloud native technologies, like containers, for much or all of their production development and deployment. Cloud native isn’t the future – it’s here and now. Data-intensive workloads are no exception.

Digital transformation in logistics with edge AI | Data & AI Masters | Rehrig Pacific Company

Rehrig Pacific is an industry leader in waste, recycling and supply chain solutions. With an origin story that dates back to 1913, Rehrig has made its mark as a provider of sustainable packaging products. The company produces reusable, returnable plastic assets that integrate with smart material handling equipment to create end to end delivery solutions for the industries they serve.

How to benchmark your database management system | Data & AI Masters | Canonical

In this talk Mohamed Nsiri will provide a step-by-step guide on how to perform a benchmark of a given database management system configuration. We will explain how to assess the performance impact of a change (in memory, cpu speed, etc.) and how to universally compare different setups. The workshop will cover various factors that can significantly impact the performances of your databases including number of concurrent users, workload pattern and more.