Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about
Ubuntu and upcoming events where you can meet our team.Close
Have you ever wondered how GCP pricing actually works? If you’re embarking on a new project and evaluating public clouds, the cost involved will be one of your main considerations. You might decide to use Google Cloud Platform (GCP) as your primary cloud platform. If so, you’ll want to estimate costs based on listed prices.
What is Golden Image A Golden image is a base image that is used as a template for your organization’s various virtual machines either on-prem or in the public cloud. It streamlines software development processes since mission-critical applications are dependent on a certified environment. Using Golden Images saves...
Ubuntu 22.04 Jammy Jellyfish was published in April this year. Ubuntu users are excited about its advanced desktop features, such as support for Wayland and GNOME 42 (I will use SliM this time since I won’t play any game in this demo). But recently, some Ubuntu users say that they can’t launch the Jammy Jellyfish
How important security is for your application and digital services? “Very important”, this is the answer we get the most often from Product Managers and Executives. Nobody wants the malware to take advantage of the vulnerabilities of their applications. However, any access point to the internet can be an entry point...
Ubuntu Pro FIPS images are now available in Google Cloud. Find out more about why you need a FIPS-compliant environment and how you can be FIPS compliant in Google Cloud.
A Data Pipeline is a series of processes that collects raw data from various sources, filters the disqualified data, transforms them into the appropriate format, moves them to the places you want to store them, analyzes them, and finally presents them to your audience. As we can see in the chart above, a data pipeline
Since I wrote Launch Ubuntu Desktop on Google Cloud last week, I kept thinking about putting Ubuntu Desktop into containers. A container is an independent unit of software packages and their dependencies so that the application on the container can run reliably in different computing environments. Docker, an open-source...
This tutorial shows you how to set up a Ubuntu Desktop on Google Cloud. If you need a graphic interface to your virtual desktop on the cloud, this tutorial will teach you how to set up a desktop environment just like what you can get on your own computer. We need four steps to set
Ubuntu is the platform of choice for deploying and running workloads on public clouds. No other operating system gives you better performance and consistency of experience across public clouds, including Amazon, Azure, Google, IBM and Oracle. There is a reason behind this exceptional experience. By design, Ubuntu images...
In August 2016, the United States government announced a new federal source-code policy, which mandates that at least 20% of custom source code developed by or for any agency of the federal government must be released as open-source software (OSS). The memo of this policy also states that the Federal Government spends...
If this is your desire, it is Ubuntu Pro’s commitment: “Ubuntu Pro will secure your Open-Source Freedom for 10 years”. Security and Freedom shouldn’t be a debate, a trade-off, even a dilemma. Security shouldn’t be your concern when you embrace Open-Source. A 10-year commitment Canonical backs Ubuntu Pro for 10 years,...
CIS Benchmarks are best practices for the secure configuration of a target system. The Center for Internet Security, Inc. (CIS®) is the authority backing CIS Benchmarks. Ubuntu Pro is entitled to be CIS compliant and packaged with CIS toolings from Canonical. Let’s SSH into your Ubuntu Pro virtual machine. If you...
It’s official: since the outbreak of the COVID-19 pandemic, cybercrime has increased by 600%. Among these, ransomware attacks are estimated to cost $6 trillion in 2021 alone. And there were nearly 550,000 ransomware attacks per day in 2020. The question is: are your workloads secure enough? In this blog, we will discuss...