Guests in Ubuntu OpenStack: ODS Vancouver

This article was last updated 9 year s ago.


A key theme of IaaS is that Guests are what makes the compute part of IaaS interesting. And, as Dustin Kirkland suggests in his OpenStack Summit keynote, “It’s a variety of guests that keep it interesting” – like any decent party.

We want to go to a party that has all sorts of crazy guests; it’s the variety that makes it a good one, right? In the data centre there’s always variety. There is no such thing as 100% homogeneity in a data centre.

In this featured video from OpenStack Summit Vancouver, Dustin discusses the value of Guests in an OpenStack environment; showing how they bring a range and variety of technologies to the stack – and with that, the flexibility and scope to design a limitless number and type of clouds.

 

Want To Master Canonical’s OpenStack Tools? Take a look at our Fundamentals training

Created by Canonical’s Engineering team, the Ubuntu OpenStack Fundamentals Training course is a classroom-based combination of lectures and lab work. The course gives a comprehensive introduction to Ubuntu OpenStack and our industry-leading cloud toolset Juju (services orchestration), MAAS (hardware provisioning) and Landscape (systems management and monitoring).

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical’s Privacy Policy.

Related posts

What is CMMC compliance?

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public...

What if your container images were security-maintained at the source?

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises...

Apport local information disclosure vulnerability fixes available

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps...