Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Migrating from VMware to an open-source private cloud in financial services

This is part one of a two part blog series on open source based private cloud for financial services. This blog describes the need for a cost-effective private cloud to execute a successful hybrid cloud strategy. It also shares a comparison between proprietary and open source based private cloud platforms.

Electrical and electronic vehicle architecture trends: an exploration

Vehicles are becoming more complex everyday. Customers expect safe, autonomous, connected, electrified and shared vehicles and these features are achieved via software. Although there is a clear change in focus from hardware to software, the advent of software-defined vehicles will rely heavily on optimised Electrical / Electronic (E/E) vehicle architectures. To make way for this changing paradigm, big hardware changes need to take place.

Multipass 1.10 brings new instance modification capabilities

Developers rejoice! The Multipass team has been listening to your feedback, and we are excited to announce that the latest update to Multipass contains one of our most requested features – instance modification. For those who are just discovering Multipass, it’s software designed to make working with virtual machines as painless as possible. It has an intuitive command line interface, and abstracts away the hard work of configuring, launching, modifying and destroying VMs.

Let's get confidential! Canonical Ubuntu Confidential VMs are now generally available on Microsoft Azure

On behalf of all Canonical teams, I am happy to announce the general availability of Ubuntu Confidential VMs (CVMs) on Microsoft Azure! They are part of the Microsoft Azure DCasv5/ECasv5 series, and only take a few clicks to enable and use. Ubuntu 20.04 is the first and only Linux distribution to support Confidential VMs on Azure.

Omnichannel Enablement: 4 technology success factors

The days in which a business could thrive by serving customers through brick-and-mortar stores alone are long gone. Almost all retailers now offer a variety of online and offline channels, often with some degree of integration to ensure a smooth customer journey across different touchpoints. However, even these multichannel and cross-channel strategies are increasingly falling short of modern expectations.

UX Deep Dive: Classify interactions for a more intuitive user interface

We try hard to make our products as intuitive and familiar as possible, but there will always be “advanced” options and rarely-used features. Giving users choice and control over their experience will naturally lead to features that are used less frequently or settings that only a small percentage of users will change. So how do we decide what order and prominence to give to these lesser-used features?

New Active Directory Integration features in Ubuntu 22.04 (part 4) - Scripts execution

In this article we will focus on how you can use Active Directory to schedule startup, shutdown, login or logout scripts on your managed desktops through ADsys. In this area, as well as for all the other new features delivered by ADsys, we tried to offer a user experience as close as possible to the native one available in Microsoft Windows, with the aim of enabling IT admins to reuse the same knowledge and tools they acquired over the years to manage Ubuntu desktops.

What's new in Security for Ubuntu 22.04 LTS?

Canonical Ubuntu 22.04 LTS is the latest long term support release of Ubuntu, one of the world’s most popular Linux distributions. As a Long Term Support release, Ubuntu 22.04 LTS will be supported for 10 years, receiving both extended security updates and kernel livepatching via an Ubuntu Advantage subscription (which is free for personal use).

Weave Cybersecurity into your product design

How important security is for your application and digital services? “Very important”, this is the answer we get the most often from Product Managers and Executives. Nobody wants the malware to take advantage of the vulnerabilities of their applications. However, any access point to the internet can be an entry point for hackers.