Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

Blog


Anthony Dillon
8 January 2025

Web Engineering: Hack Week 2024

Design Engineering

At Canonical, the work of our teams is strongly embedded in the open source principles and philosophy. We believe open source software will become the most prevalent method of software development and delivery in the future. Being open source is more than making the source of your software available, it’s also about contributing to other ...


Rhys Knipe
23 December 2024

What to know when procuring Linux laptops

Ubuntu Article

Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your success. So what does being “well-equipped” look like in the world of Linux laptops?  In this blog, we’ll lay down the best practices for procurement professionals who have been taske ...


Michelle Anne Tabirao
20 December 2024

Building RAG with enterprise open source AI infrastructure

Data Platform Article

How to create a robust enterprise AI infrastructure for RAG systems using open source tooling?A highlight on how open source can help ...


Amir Abdel Baki
19 December 2024

Life at Canonical: Victoria Antipova’s perspective as a new joiner in Product Marketing

Ubuntu Article

Life at Canonical: Victoria Antipova’s perspective as a new joiner in Product Marketing ...


Matthew de Klerk
18 December 2024

What is patching automation?

Security Article

In software, patches are updates that are designed to overcome problems, flaws or vulnerabilities in the programming. Patch management is the process of gathering and applying these patches to the target software, devices or systems. ...


shrishtikarkera
17 December 2024

A beginner’s tutorial for your first Machine Learning project using Charmed Kubeflow

AI Article

The goal of this guide is to show you how to develop a model capable of classifying different species of Iris flowers based on their characteristics, such as sepal length and petal width. This will help you to learn the fundamentals of building and deploying machine learning models, which will serve you well in more complex projects down ...


Jehudi
17 December 2024

Ubuntu brings comprehensive support to Azure Cobalt 100 VMs

Cloud and server Article

Ubuntu and Ubuntu Pro support Microsoft’s Azure Cobalt 100 Virtual Machines, featuring their new 64-bit Arm processors. With over 95% of packages compiled for this architecture, users can deploy a wide range of workloads—from application servers to machine learning—while benefiting from Ubuntu’s robust security and extensive ecosystem. ...


Michelle Anne Tabirao
16 December 2024

Get Valkey security patching and support with Ubuntu Pro

Data Platform Article

Canonical is pleased to announce security patching and support for Valkey through the Ubuntu Pro subscription. Ubuntu Pro is a subscription service for open-source software security, compliance and support that expands the maintenance period for all packages distributed in Ubuntu repositories. This extension applies to all the open source ...


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...