Operations | Monitoring | ITSM | DevOps | Cloud

How to deploy Kubeflow on Azure

Kubeflow is a cloud-native, open source machine learning operations (MLOps) platform designed for developing and deploying ML models on Kubernetes. Kubeflow helps data scientists and machine learning engineers run the entire ML lifecycle within one tool. Charmed Kubeflow is Canonical’s official distribution of Kubeflow. The key benefits of Charmed Kubeflow include security maintenance of container images, enterprise support, and further tooling integration with Spark, Feast, MLFlow, and others.

Google Authd broker: authenticate to Ubuntu Desktop/Server with your Google account

Today we are announcing the introduction of Authd support for Google IAM, allowing all Ubuntu users to use their Google account to authenticate to their desktop and servers. The Google broker snap for Authd is available for free on Ubuntu Desktop and Server 24.04 and it works with both personal and Workspace Google accounts.

Install FreePBX and Asterisk on Ubuntu 24.04 LTS for security patches until 2036

Deploying FreePBX and Asterisk on a single Ubuntu virtual machine in a public cloud is an ideal solution for personal users and small to medium-sized businesses with voice over IP (VoIP) and fax over IP (FoIP) needs. This setup costs nothing, is scalable and secure, and has daily recovery points with a recovery time measured in minutes.

How to conduct a vulnerability assessment

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in this blog we’ll begin by demystifying the language, before delving into how you can perform vulnerability assessments on Ubuntu installations.

5G without compromise: Building mission-critical private networks for Industry 4.0 with open source

Enterprises across industry verticals are looking for new ways to increase the efficacy of their businesses. One way to do this is building an efficient pipeline of processes, employees, devices, and services that are all tightly integrated to get the best return on investment. However, this requires an efficient telecommunication system where industry machines, personnel, and business services use continuous, performant, and reliable communications to work together.

Valkey container image - securely designed, compliant, and long term supported (LTS)

Valkey is a new database management system that is gaining traction. Valkey is a fork of Redis, and it is available as a deb package in the Ubuntu 24.04 release. You can install it by simply running sudo apt install valkey. We also offer a Valkey container to allow you to run a secure, compliant and long-term supported Valkey on top of any Linux distribution.

How Ubuntu Pro + Support keeps your Ubuntu 20.04 LTS secure and stable

Whether you plan to continue running Ubuntu 20.04 LTS or upgrade to the latest LTS, keeping your infrastructure secure and stable is a top priority. Extended Security Maintenance (ESM) provides essential security updates to protect your systems from vulnerabilities, ensuring you stay compliant and up to date against the latest threats.

7 considerations when building your ML architecture

As the number of organizations moving their ML projects to production is growing, the need to build reliable, scalable architecture has become a more pressing concern. According to BCG (Boston Consulting Group), only 6% of organizations are investing in upskilling their workforce in AI skills. For any organization seeking to reach AI maturity, this skills gap is likely to cause disruption.

AI in 2025: is it an agentic year?

2024 was the GenAI year. With new and more performant LLMs and a higher number of projects rolled out to production, adoption of GenAI doubled compared to the previous year (source: Gartner). In the same report, organizations answered that they are using AI in more than one part of their business, with 65% of respondents mentioning they use GenAI in one function.

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.