Engage pages

Ubuntu case studies, whitepapers and webinars.



whitepaper

HPE Telco validated design with Canonical Kubernetes

Telco infrastructure solutions from HPE and Canonical provide leading, carrier-grade infrastructure to enable choice, flexibility, agility, and a lower total cost of ownership (TCO).

hpe, partner, telco, kubernetes, reference architecture
whitepaper

A guide to Kubernetes operators

Understand software operator frameworks, their capabilities and benefits.

Juju, K8s, Kubernetes, charmed, charm collection, charms, kubernetes operator, operator framework
webinar

A developer’s guide to operators

Get best practices to develop software operators on a solid foundation

Juju, kubernetes, cloud-native, metal, edge, charms, juju.is
webinar

Is Linux secure?

Don’t miss the updates of the Summer 2023 Edition!

Linux security, Ubuntu security, Linux security vulnerabilities, Linux security maintenance, What is linux, Linux distro, kernel livepatching
webinar

Kubernetes operators explained

Learn about the operator pattern and dive into its capabilities and benefits.

Juju, K8s, Kubernetes, charmed, charmcollection, charms, juju, k8s, kubernetes, kubernetesoperator, operatorframework
webinar

IoT DevOps webinar

How to scale software development to the edge

IoT DevOps, edge, edge computing, embedded linux, iot, devices, iot management
webinar

Introduction to Open Source MANO (OSM)

Accelerate telco workload migration to NFV with OSM

Network functions, NFV migrations, Charmed OSM, VNFs, CNFs, onboarding, day1/day2 operations
webinar

What’s new in MAAS 3.2?

Hear about the latest bare metal provisioning features

MAAS, bare metal, bare metal cloud, metal as a service
webinar

A technical introduction to Ubuntu Core 22

Gain a technical understanding of the new features in Ubuntu Core, the OS optimised for IoT and embedded devices

IoT, devices, ubuntu core, embedded linux, edge devices, webinar, Yocto, tutorial, security, developers, enablement, app development
webinar

Implementing FIPS with maximum security configurations

Minimise the amount of time your systems are vulnerable after a patch is published, to be safe when an exploit becomes active

CIS, Compliance, DISA, DISASTIG, FIPS, FIPS140-2, FIPS 140-3, FedRAMP, GovCloud, Linux, compliance, fips, security, webinar
whitepaper

Public, private and managed clouds

Building hassle-free cloud operations

Managed services, managed openstack, managed kubernetes, managed cloud, public cloud, private cloud