Canonical

London, UK
2004
  |  By ijlal-loutfi
Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.
  |  By Canonical
Canonical is proud to announce it has achieved the ISO 21434 certification for its Security Management System, following an extensive assessment by TÜV SÜD, a globally respected certification provider. This milestone highlights Canonical’s leadership in providing trusted and reliable open source solutions for the automotive sector.
  |  By Jean-Baptiste Lallement
We are happy to announce that Ubuntu on Windows Subsystem for Linux (WSL) is now available in Microsoft’s new tar-based distribution architecture. Ubuntu has been a widely used Linux distribution on WSL, offering a familiar development environment for many users. This new distribution architecture for WSL will make adoption easier in enterprise environments by enabling image customization and deployments at scale.
  |  By Henry Coggill
There’s good news in the US federal compliance space. The latest FedRAMP policy on the use of cryptographic modules relaxes some of the past restrictions that prevented organizations from applying critical security updates. There has long been a tension between the requirements for strictly certified FIPS crypto modules and the need to keep software patched and up to date with the latest security vulnerability fixes.
  |  By Philip Williams
In our last blog post we talked about how you can use Intel QAT with Canonical Ceph, today we’ll cover why this technology is important from a business perspective – in other words, we’re talking data storage costs. Retaining and protecting data has an inherent cost based on the underlying architecture of the system used to store it.
  |  By Philip Williams
When storing large amounts of data, the cost ($) to store each gigabyte (GB) is the typical measure used to gauge the efficiency of the storage system. The biggest driver of storage cost is the protection method used. It is common to protect data by either having multiple replicas within the storage system or by using erasure coding to create data chunks and parity chunks to reduce the raw storage consumed, albeit at the cost of higher CPU utilisation.
  |  By Robert Ancell
Over the past 5 years, Canonical has been contributing to Flutter, including building out Linux support for Flutter applications, publishing libraries to help integrate into the Linux desktop and building modern applications for Ubuntu, including our software store. Last year we announced at the Ubuntu Summit that we’ve been working on bringing support for multiple windows to Flutter desktop apps.
  |  By piperdeck
Open source is one of the most exciting, but often misunderstood, innovations of our modern world. I still remember the first time I installed linux on my laptop, saw the vast array of packages I could install on it, all the utilities and libraries that make it work, all the forum threads filled with advice and debugging and troubleshooting, and I thought: “Wait, all of this is free???” It’s free, you can use it, and it’s awesome.
  |  By João Hellmeister
In this third and final part of the series, I’ll provide some tips on how to set up your roadmap and effectively demonstrate compliance without overburdening your teams. If you’re just joining the fun now, in our two previous editions we covered who NIS2 applies to and what requirements it sets out. Be sure to have a look at them if you need any additional context.
  |  By João Hellmeister
In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find in NIS2 and help translate them into actionable and practical measures you can take to achieve NIS2 compliance. Join me in this post and start understanding what NIS2 is all about.
  |  By Canonical
Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.
  |  By Canonical
Canonical CEO Mark Shuttleworth discusses open source and Canonical's portfolio and partnerships in the context of data and AI.
  |  By Canonical
Rehrig Pacific is an industry leader in waste, recycling and supply chain solutions. With an origin story that dates back to 1913, Rehrig has made its mark as a provider of sustainable packaging products. The company produces reusable, returnable plastic assets that integrate with smart material handling equipment to create end to end delivery solutions for the industries they serve.
  |  By Canonical
In this talk Mohamed Nsiri will provide a step-by-step guide on how to perform a benchmark of a given database management system configuration. We will explain how to assess the performance impact of a change (in memory, cpu speed, etc.) and how to universally compare different setups. The workshop will cover various factors that can significantly impact the performances of your databases including number of concurrent users, workload pattern and more.
  |  By Canonical
Discover how Google Cloud and Ubuntu Pro enhance cloud security. With Google Cloud’s robust infrastructure and advanced analytics, plus Ubuntu Pro’s 12 years of security patching and compliance features, you can confidently innovate while keeping your data safe. Simplify setup and focus on your business while we handle the security.
  |  By Canonical
AI is transforming the way organizations work globally. It makes everyone look differently at all scales, from workstations to data centers and edge devices. Intel’s strategy heavily focuses on AI as the next milestone to drive innovation and enable other organizations to move their projects beyond experimentation.
  |  By Canonical
Ubuntu Pro on Spot Instances is now generally available—here’s how to launch it using the AWS EC2 console. This guide walks you through requesting and configuring a Spot Instance for secure, cost-effective operations. Ubuntu Pro provides out-of-the-box security and compliance features, making it an ideal choice for short-term workloads like AWS EC2 Spot Instances.
  |  By Canonical
In this talk Canonical's Phil Williams will introduce why Ceph is referred to as the swiss army knife of storage. Discover the versatility of Ceph as we explore how it is deployed, scales and integrates with all types of infrastructure and applications- all the way from a developer’s workstation to edge infrastructure and large scale production environments.
  |  By Canonical
Is your organization ready to tackle the challenges of the modern workforce? Join us for an exclusive webinar where we'll show you how to unleash new ways of working with a flexible, cost-effective VDI. What you’ll learn.
  |  By Canonical
Unlock the power of OpenSearch for search, SIEM, data observability, and generative AI. Explore automation, security, and support from trusted experts with our Managed OpenSearch Services, 1 hour response time for the most critical issues.
  |  By Canonical
From the smallest startups to the largest enterprises alike, organisations are using Artificial Intelligence and Machine Learning to make the best, fastest, most informed decisions to overcome their biggest business challenges. But with AI/ML complexity spanning infrastructure, operations, resources, modelling and compliance and security, while constantly innovating, many organizations are left unsure how to capture their data and get started on delivering AI technologies and methodologies.
  |  By Canonical
Traditional development methods do not scale into the IoT sphere. Strong inter-dependencies and blurred boundaries among components in the edge device stack result in fragmentation, slow updates, security issues, increased cost, and reduced reliability of platforms. This reality places a major strain on IoT players who need to contend with varying cycles and priorities in the development stack, limiting their flexibility to innovate and introduce changes into their products, both on the hardware and software sides.
  |  By Canonical
Private cloud, public cloud, hybrid cloud, multi-cloud... the variety of locations, platforms and physical substrate you can start a cloud instance on is vast. Yet once you have selected an operating system which best supports your application stack, you should be able to use that operating system as an abstraction layer between different clouds.
  |  By Canonical
Container technology has brought about a step-change in virtualisation technology. Organisations implementing containers see considerable opportunities to improve agility, efficiency, speed, and manageability within their IT environments. Containers promise to improve datacenter efficiency and performance without having to make additional investments in hardware or infrastructure. Traditional hypervisors provide the most common form of virtualisation, and virtual machines running on such hypervisors are pervasive in nearly every datacenter.
  |  By Canonical
Big Software, IoT and Big Data are changing how organisations are architecting, deploying, and managing their infrastructure. Traditional models are being challenged and replaced by software solutions that are deployed across many environments and many servers. However, no matter what infrastructure you have, there are bare metal servers under it, somewhere.

We deliver open source to the world faster, more securely and more cost effectively than any other company.

We develop Ubuntu, the world’s most popular enterprise Linux from cloud to edge, together with a passionate global community of 200,000 contributors. Ubuntu means 'humanity to others'​. We chose it because it embodies the generosity at the heart of open source, the new normal for platforms and innovation.

Together with a community of 200,000, we publish an operating system that runs from the tiny connected devices up to the world's biggest mainframes, the platform that everybody uses on the public cloud, and the workstation experience of the world's most productive developers.

Products:

  • Ubuntu: The new standard secure enterprise Linux for servers, desktops, cloud, developers and things.
  • Landscape: Updates, package management, repositories, security, and regulatory compliance for Ubuntu.
  • MAAS: Dynamic server provisioning and IPAM gives you on-demand bare metal, a physical cloud.
  • LXD: The pure-container hypervisor. Run legacy apps in secure containers for speed and density.
  • Juju: Model-driven cloud-native apps on public and private infrastructure and CAAS.
  • Snapcraft: The app store with secure packages and ultra-reliable updates for multiple Linux distros.

Drive down infrastructure cost, accelerate your applications.