Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

Navigating multi-cloud database deployments with MySQL for maximum uptime

Public cloud providers offer convenient services for database deployments. However, depending solely on a single provider’s database-as-a-service can result in vendor lock-in and reduce your system’s resilience against widespread outages affecting the provider. Instead, explore our approach to deploying MySQL across multiple clouds. A multi-cloud database strategy enables you to retain control of your infrastructure while enhancing overall resiliency and leveraging the unique strengths of each cloud provider.

Charmed MySQL enters General Availability

Nov 6th, 2024: Today Canonical announced the release of Charmed MySQL, an enterprise solution that helps you secure and automate the deployment, maintenance and upgrades of your MySQL databases across private and public clouds. MySQL is one of the world’s most popular databases. MySQL’s simple deployment model and ease of use make it the default choice for many developers. MySQL is the M in the popular LAMP architecture that powers most web applications today.

What is IoT device management?

IoT device management refers to processes or practices used to deploy, monitor and maintain IoT devices. As organizations scale up their IoT efforts, a solid device management approach is essential to running a secure, streamlined fleet of devices. The proliferation of connected devices worldwide (projected to reach 18.8 billion in 2024) means that IoT device management is growing more complex, a reality that has not gone unnoticed by bad actors.

Charmed Kubeflow vs Kubeflow

Kubeflow is an open source MLOps platform that is designed to enable organizations to scale their ML initiatives and automate their workloads. It is a cloud-native solution that helps developers run the entire machine learning lifecycle within a single solution on Kubernetes. It can be used to develop, optimize and deploy models. This blog will walk you through the benefits of using an official distribution of the Kubeflow project.

Imagining the future of Cybersecurity

October 2024 marks the 20th anniversary of Ubuntu. The cybersecurity landscape has significantly shifted since 2004. If you have been following the Ubuntu Security Team’s special three-part series podcast that we put out to mark Cybersecurity Awareness Month, you will have listened to us talk about significant moments that have shaped the industry, as well as what our recommendations to stay safe are.

Unleash new ways of working with flexible, cost-effective VDI

For years, virtual desktop infrastructure (VDI) has helped power the most complex IT environments—and the technology is still relevant today. After all, VDI allows employees to access their work applications and data across any device, anywhere. And the growth of 5G networked edge computing means that VDI workloads can soon be optimised for even greater flexibility, security and cost savings. But what’s the right way to deploy VDI in the cloud era?

What is Ubuntu used for?

The launch of Ubuntu in 2004 was a step-change for everyday users and developers everywhere. Nicknamed “Ubuntu Linux” in its early days, to differentiate it from its various cousins in the Linux world, it has since lost the need for its surname and grown to become a powerful force. Besides being used by millions of home users, Ubuntu is widely used in the development and business world. As developers have become a driving force of innovation, so has Ubuntu.

Creating a Secure Cyber Environment | Ubuntu Security Podcast

Software supply chain knowledge is crucial for cybersecurity. It's essential to understand not only what's running but also its provenance and reliability. In episode two of our 3-part Month podcast series, Eduardo Barretto and Luci Stanescu join Alex Murray to discuss some of the best cybersecurity practices for everyone.