Canonical

London, UK
2004
  |  By Massimiliano Gori
Today we are announcing the introduction of Authd support for Google IAM, allowing all Ubuntu users to use their Google account to authenticate to their desktop and servers. The Google broker snap for Authd is available for free on Ubuntu Desktop and Server 24.04 and it works with both personal and Workspace Google accounts.
  |  By Rajan Patel
Deploying FreePBX and Asterisk on a single Ubuntu virtual machine in a public cloud is an ideal solution for personal users and small to medium-sized businesses with voice over IP (VoIP) and fax over IP (FoIP) needs. This setup costs nothing, is scalable and secure, and has daily recovery points with a recovery time measured in minutes.
  |  By Luci Stanescu
The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in this blog we’ll begin by demystifying the language, before delving into how you can perform vulnerability assessments on Ubuntu installations.
  |  By Serdar Vural
Enterprises across industry verticals are looking for new ways to increase the efficacy of their businesses. One way to do this is building an efficient pipeline of processes, employees, devices, and services that are all tightly integrated to get the best return on investment. However, this requires an efficient telecommunication system where industry machines, personnel, and business services use continuous, performant, and reliable communications to work together.
  |  By Michelle Anne Tabirao
Valkey is a new database management system that is gaining traction. Valkey is a fork of Redis, and it is available as a deb package in the Ubuntu 24.04 release. You can install it by simply running sudo apt install valkey. We also offer a Valkey container to allow you to run a secure, compliant and long-term supported Valkey on top of any Linux distribution.
  |  By Andreea Munteanu
As the number of organizations moving their ML projects to production is growing, the need to build reliable, scalable architecture has become a more pressing concern. According to BCG (Boston Consulting Group), only 6% of organizations are investing in upskilling their workforce in AI skills. For any organization seeking to reach AI maturity, this skills gap is likely to cause disruption.
  |  By Lidia Luna Puerta
Whether you plan to continue running Ubuntu 20.04 LTS or upgrade to the latest LTS, keeping your infrastructure secure and stable is a top priority. Extended Security Maintenance (ESM) provides essential security updates to protect your systems from vulnerabilities, ensuring you stay compliant and up to date against the latest threats.
  |  By Andreea Munteanu
2024 was the GenAI year. With new and more performant LLMs and a higher number of projects rolled out to production, adoption of GenAI doubled compared to the previous year (source: Gartner). In the same report, organizations answered that they are using AI in more than one part of their business, with 65% of respondents mentioning they use GenAI in one function.
  |  By ijlal-loutfi
Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.
  |  By Canonical
Canonical is proud to announce it has achieved the ISO 21434 certification for its Security Management System, following an extensive assessment by TÜV SÜD, a globally respected certification provider. This milestone highlights Canonical’s leadership in providing trusted and reliable open source solutions for the automotive sector.
  |  By Canonical
We’re on the ground, analysing, defining, and sharing the open source trends shaping the future. Quantum computing in Hall 6? Edge AI revolutionising infrastructure? Our experts are uncovering the innovations that matter, so you stay ahead. What’s the most impactful open-source trend you’ve seen?
  |  By Canonical
In this video, the Anbox team demonstrates how to debug an Android application with Android studio in Anbox Cloud. What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Trademark notice Android is a trademark of Google LLC. Anbox Cloud uses assets available through the Android Open Source Project.
  |  By Canonical
In this video, the Anbox team shows how to install the appliance on a dedicated machine. What is Anbox Cloud? Anbox Cloud lets you run virtualized Android environments securely, at any scale, to any device letting you focus on your use case. Run Android in system containers, not emulators, on AWS, OCI, Azure, GCP or your private cloud with ultra low streaming latency. Trademark notice Android is a trademark of Google LLC. Anbox Cloud uses assets available through the Android Open Source Project.
  |  By Canonical
Have you noticed how open-source software has become essential to innovation in the cloud-native arena? Countless cloud-native applications are powered by open source, and they are often mission-critical for organizations across industries, ranging from small startups to large enterprises. However, there are inherent security risks associated with this reliance on external components, and this problem is only growing as container adoption continues to gain momentum.
  |  By Canonical
Find out how you can apply a Defense in Depth approach with Ubuntu. Ubuntu’s security offerings are much more than just a collection of tools: they are an ecosystem of layered defenses, each tuned to address specific threat levels and attacker capabilities. By understanding the unique threats each layer counters, you can make informed choices about which defenses are most important for your environment.
  |  By Canonical
Canonical CEO Mark Shuttleworth discusses open source and Canonical's portfolio and partnerships in the context of data and AI.
  |  By Canonical
Rehrig Pacific is an industry leader in waste, recycling and supply chain solutions. With an origin story that dates back to 1913, Rehrig has made its mark as a provider of sustainable packaging products. The company produces reusable, returnable plastic assets that integrate with smart material handling equipment to create end to end delivery solutions for the industries they serve.
  |  By Canonical
In this talk Mohamed Nsiri will provide a step-by-step guide on how to perform a benchmark of a given database management system configuration. We will explain how to assess the performance impact of a change (in memory, cpu speed, etc.) and how to universally compare different setups. The workshop will cover various factors that can significantly impact the performances of your databases including number of concurrent users, workload pattern and more.
  |  By Canonical
Discover how Google Cloud and Ubuntu Pro enhance cloud security. With Google Cloud’s robust infrastructure and advanced analytics, plus Ubuntu Pro’s 12 years of security patching and compliance features, you can confidently innovate while keeping your data safe. Simplify setup and focus on your business while we handle the security.
  |  By Canonical
AI is transforming the way organizations work globally. It makes everyone look differently at all scales, from workstations to data centers and edge devices. Intel’s strategy heavily focuses on AI as the next milestone to drive innovation and enable other organizations to move their projects beyond experimentation.
  |  By Canonical
From the smallest startups to the largest enterprises alike, organisations are using Artificial Intelligence and Machine Learning to make the best, fastest, most informed decisions to overcome their biggest business challenges. But with AI/ML complexity spanning infrastructure, operations, resources, modelling and compliance and security, while constantly innovating, many organizations are left unsure how to capture their data and get started on delivering AI technologies and methodologies.
  |  By Canonical
Traditional development methods do not scale into the IoT sphere. Strong inter-dependencies and blurred boundaries among components in the edge device stack result in fragmentation, slow updates, security issues, increased cost, and reduced reliability of platforms. This reality places a major strain on IoT players who need to contend with varying cycles and priorities in the development stack, limiting their flexibility to innovate and introduce changes into their products, both on the hardware and software sides.
  |  By Canonical
Private cloud, public cloud, hybrid cloud, multi-cloud... the variety of locations, platforms and physical substrate you can start a cloud instance on is vast. Yet once you have selected an operating system which best supports your application stack, you should be able to use that operating system as an abstraction layer between different clouds.
  |  By Canonical
Container technology has brought about a step-change in virtualisation technology. Organisations implementing containers see considerable opportunities to improve agility, efficiency, speed, and manageability within their IT environments. Containers promise to improve datacenter efficiency and performance without having to make additional investments in hardware or infrastructure. Traditional hypervisors provide the most common form of virtualisation, and virtual machines running on such hypervisors are pervasive in nearly every datacenter.
  |  By Canonical
Big Software, IoT and Big Data are changing how organisations are architecting, deploying, and managing their infrastructure. Traditional models are being challenged and replaced by software solutions that are deployed across many environments and many servers. However, no matter what infrastructure you have, there are bare metal servers under it, somewhere.

We deliver open source to the world faster, more securely and more cost effectively than any other company.

We develop Ubuntu, the world’s most popular enterprise Linux from cloud to edge, together with a passionate global community of 200,000 contributors. Ubuntu means 'humanity to others'​. We chose it because it embodies the generosity at the heart of open source, the new normal for platforms and innovation.

Together with a community of 200,000, we publish an operating system that runs from the tiny connected devices up to the world's biggest mainframes, the platform that everybody uses on the public cloud, and the workstation experience of the world's most productive developers.

Products:

  • Ubuntu: The new standard secure enterprise Linux for servers, desktops, cloud, developers and things.
  • Landscape: Updates, package management, repositories, security, and regulatory compliance for Ubuntu.
  • MAAS: Dynamic server provisioning and IPAM gives you on-demand bare metal, a physical cloud.
  • LXD: The pure-container hypervisor. Run legacy apps in secure containers for speed and density.
  • Juju: Model-driven cloud-native apps on public and private infrastructure and CAAS.
  • Snapcraft: The app store with secure packages and ultra-reliable updates for multiple Linux distros.

Drive down infrastructure cost, accelerate your applications.