Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Get familiar with "Rusty" kernel programming in Ubuntu Lunar Lobster

The Linux kernel has recently introduced the Rust programming language as an alternative to C for creating kernel modules. Rust is a strongly, statically typed programming language with a focus on memory safety features which produces extremely compact executable code. These properties, paired with its good tooling, make Rust a natural choice for creating many types of kernel modules, including device drivers, network protocols and filesystems.

LLMs explained: how to build your own private ChatGPT

Large language models (LLMs) are the topic of the year. They are as complex as they are exciting, and everyone can agree they put artificial intelligence in the spotlight. Once LLms were released to the public, the hype around them grew and so did their potential use cases – LLM-based chatbots being one of them. While large language models have been available for some time, there are still a lot of challenges when it comes to building your own project.

How New Mexico State University accelerates compliant federal research with Ubuntu

When the stakes are high and national security is on the line, every decision matters. Just ask the team at New Mexico State University’s Physical Science Laboratory (PSL). Founded back in 1946 to support the United States’ space and rocket programs, PSL has been on the leading edge of defence-oriented applied science for over seven decades. But when the Department of Defense (DoD) rolled out new cybersecurity guidelines, PSL found itself at a crossroads.

Closing the Gap: Ubuntu Pro in the AWS Shared Responsibility Model

Deploying your application on a public cloud offers numerous benefits, including improved time to market, elastic capacity, and improved baseline security compared to on-premises solutions. However, this does not guarantee better security coverage for your application and data. For this reason, the major cloud providers provide a Shared Responsibility Model, which outlines the distribution of security responsibilities between the cloud service provider and its customers.

Telecom security: How to safeguard your open source telco infrastructure

From pure voice to data, and now with the connectivity provided to devices and machines, telco systems make it possible to deliver digital services to society. Thanks to telecom systems, we can keep in touch with each other and reach the information sources we need at any time and anywhere. As we have become increasingly reliant on these systems, we also need to be vigilant about telecom security.

Ubuntu Desktop: charting a course for the future

It has been a little while since we shared our vision for Ubuntu Desktop, and explained how our current roadmap fits into our long term strategic thinking. Recently, we embarked on an internal exercise to consolidate and bring structure to our values and goals for how we plan to evolve the desktop experience over the next few years. This post is designed to share the output of those discussions and give insight into the direction we’re going.

AI and Big Data Solutions

Big data and artificial intelligence (AI) go hand in hand. Used for tasks like trend prediction, process automation and research, these two technologies can help organisations solve some of the toughest problems. However, the growing volume of data and increasing diversity of data sources make it difficult to use data and AI effectively and at scale.

Machine learning in finance: history, technologies and outlook

In its analysis of over 1,400 use cases from “Eye on Innovation” in Financial Services Awards, Gartner found that machine learning (ML) is the top technology used to empower innovations at financial services firms, with operational efficiency and cost optimisation as key intended business outcomes. ML is a branch of artificial intelligence (AI) that involves the development of algorithms and models capable of automatically learning and improving from data.

What is a hypervisor? A beginner's guide

In the realm of virtualisation and cloud computing, the hypervisor is a critical component that enables the seamless operation of multiple virtual machines (VMs) on a single host. While virtualisation is a technology, the hypervisor is its actual implementation. In this beginner’s guide, we will explore the fundamentals of hypervisors, their types, and how they differ from container runtimes. We will also review some of the leading hypervisors available today.

Key Steps for a More Secure Linux Server

Linux server hardening means fortifying and securing a Linux server in order to protect it from vulnerabilities and threats. While total security will always remain a moving target in the security arms race, this article explores some important fundamental steps you can take to help keep your servers safe and secure.