Operations | Monitoring | ITSM | DevOps | Cloud

Canonical

.NET chiselled Ubuntu Containers | Canonical x Microsoft Interview

Dive deep into the collaboration between Canonical and Microsoft as we explore the latest innovation in the world of containers and.NET. In this interview, Richard Lander, Principal Program Manager for.NET at Microsoft, sits down with Cristovao Cordeiro, Engineering Manager for Containers at Canonical, to discuss the exciting developments post the launch of chiselled Ubuntu on Microsoft.NET with a focus on.NET 8, the latest release from Microsoft.

Unlocking software-defined vehicles: a deep dive into automotive software

We will address key topics such as the need for cybersecurity mandates, the evolving E/E architecture of SDVs, the importance of maintaining software integrity, meeting regulatory requirements, and delivering innovative features to enhance the user experience.

Edge AI: what, why and how with open source

Edge AI is transforming the way that devices interact with data centres, challenging organisations to stay up to speed with the latest innovations. From AI-powered healthcare instruments to autonomous vehicles, there are plenty of use cases that benefit from artificial intelligence on edge computing. This blog will dive into the topic, capturing key considerations when starting an edge AI project, main benefits, challenges and how open source fits into the picture.

5 Edge Computing Examples You Should Know

In the fast-paced world of technology, innovation is the key to staying ahead of the curve. As businesses strive for efficiency, speed, and real-time data processing, the spotlight is increasingly turning towards edge computing. Edge computing represents a paradigm shift in the way data is processed and analysed. Unlike traditional cloud computing, which centralises data processing in distant data centres, edge computing brings the processing power closer to the source of data.

Charmed MongoDB: use cases for financial services

Financial institutions handle vast amounts of sensitive and confidential data, including customer information, transaction details, and regulatory compliance records. A trusted database ensures the security and privacy of this sensitive information, protecting it from unauthorised access, breaches, or cyber threats. MongoDB is the ideal fit, and it’s one of the most widely used databases in the financial services industry. It provides a sturdy, adaptable and trustworthy foundation.

Cloud storage security best practices

Data is like the crown jewels of any organisation, if lost or exposed there could be severe repercussions. Failure to protect against system failure could lead to the loss of business data rendering a business non-functional and ultimately causing it’s failure. Exposing sensitive data to unauthorised parties not only leads to reputational damage, but can also cause businesses to incur massive fines.

Driving towards Environmental Parity and Software-Defined Vehicles with EB corbos Linux - built on Ubuntu

As the automotive industry continues to advance into the world of high-performance computing (HPC), it becomes increasingly crucial to achieve environmental parity for seamless software integration. In this blog post, we will explore the synergy between Elektrobit and Canonical at the core of ‘EB corbos Linux – built on Ubuntu‘ in the context of automotive computing.

Exploring edge computing in automotive

From autonomous cars to factories: how data processing at the edge will transform automotive Automotive is at the forefront of innovation, but challenges always come with change. One of those challenges is processing data in decentralised environments like factories or vehicles. In this webinar, you will learn about automotive use cases that require local data processing for confidential reasons, or simply due to networking constraints. We will also discuss what edge clouds bring to the table and how Canonical’s MicroCloud addresses the automotive industry’s edge computing challenges.

[Demo] Intel TDX 1.0 technology preview available on Ubuntu 23.10

Securing data at run-time has long been an open security challenge. Whether it is malicious insiders exploiting elevated privileges or attackers exploiting vulnerabilities within the platform’s privileged system software, your data’s confidentiality and integrity was at risk.