I Use This!
Activity Not Available


Analyzed 7 months ago. based on code collected 10 months ago.
Posted about 12 hours ago
  Yesterday, I delivered a talk to a lively audience at ContainerWorld in Santa Clara, California. If I measured “the most interesting slides” by counting “the number of people who took a picture of the slide”, then by far “the most interesting ... [More] slides” are slides 8-11, which pose an answer the question: “Should I run my PaaS on top of my IaaS, or my IaaS on top of my PaaS”? In the Ubuntu world, that answer is super easy — however you like!  At Canonical, we’re happy to support: Kubernetes running on top of Ubuntu OpenStack OpenStack running on top of Canonical Kubernetes Kubernetes running along side OpenStack In all cases, the underlying substrate is perfectly consistent: you’ve got 1 to N physical or virtual machines which are dynamically provisioned by MAAS or your cloud provider running stable, minimal, secure Ubuntu server image carved up into fast, efficient, independently addressable LXD machine containers With that as your base, we’ll easily to conjure-up a Kubernetes, an OpenStack, or both.  And once you have a Kubernetes or OpenStack, we’ll gladly conjure-up one inside the other. As always, I’m happy to share my slides with you here.  You’re welcome to download the PDF, or flip through the embedded slides below. [Container world 2017] The Questions You’re Afraid to Ask about Containers from Dustin Kirkland Cheers, Dustin Original article [Less]
Posted about 17 hours ago
Lubuntu Zesty Zapus Beta 1 (soon to be 17.04) has been released! We have a couple papercuts listed in the release notes, so please take a look. A big thanks to the whole Lubuntu team and contributors for helping pull this release together. You can grab the images from here: http://cdimage.ubuntu.com/lubuntu/releases/zesty/beta-1/
Posted about 17 hours ago
The first beta of the Zesty Zapus (to become 17.04) has now been released! This milestone features images for Kubuntu, Lubuntu, Ubuntu Budgie, Ubuntu GNOME, Ubuntu Kylin, Ubuntu Studio, and Xubuntu. Pre-releases of the Zesty Zapus are not encouraged ... [More] for anyone needing a stable system or anyone who is not comfortable running into occasional, even frequent breakage. They are, however, recommended for Ubuntu flavor developers and those who want to help in testing, reporting, and fixing bugs as we work towards getting this release ready. Beta 1 includes a number of software updates that are ready for wider testing. This is still an early set of images, so you should expect some bugs. While these Beta 1 images have been tested and work, except as noted in the release notes, Ubuntu developers are continuing to improve the Zesty Zapus. In particular, once newer daily images are available, system installation bugs identified in the Beta 1 installer should be verified against the current daily image before being reported in Launchpad. Using an obsolete image to re-report bugs that have already been fixed wastes your time and the time of developers who are busy trying to make 17.04 the best Ubuntu release yet. Always ensure your system is up to date before reporting bugs. Kubuntu Kubuntu is the KDE based flavor of Ubuntu. It uses the Plasma desktop and includes a wide selection of tools from the KDE project. The Kubuntu 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/kubuntu/releases/zesty/beta-1/ More information about Kubuntu 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/Kubuntu Lubuntu Lubuntu is a flavor of Ubuntu based on LXDE and focused on providing a very lightweight distribution. The Lubuntu 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/lubuntu/releases/zesty/beta-1/ More information about Lubuntu 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/Lubuntu Ubuntu Budgie Ubuntu Budgie is a flavor of Ubuntu featuring the Budgie desktop environment. The Ubuntu Budgie 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/ubuntu-budgie/releases/zesty/beta-1/ More information about Ubuntu Budgie 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/UbuntuBudgie Ubuntu GNOME Ubuntu GNOME is a flavor of Ubuntu featuring the GNOME desktop environment. The Ubuntu GNOME 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/ubuntu-gnome/releases/zesty/beta-1/ More information about Ubuntu GNOME 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/UbuntuGNOME Ubuntu Kylin Ubuntu Kylin is a flavor of Ubuntu that is more suitable for Chinese users. The Ubuntu Kylin 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/ubuntukylin/releases/zesty/beta-1/ More information about Ubuntu Kylin 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/UbuntuKylin Ubuntu Studio Ubuntu Studio is a flavor of Ubuntu configured for multimedia production. The Ubuntu Studio 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/ubuntustudio/releases/zesty/beta-1/ More information about Ubuntu Studio 17.04 Beta 1 can be found here: https://wiki.ubuntu.com/ZestyZapus/Beta1/UbuntuStudio Xubuntu Xubuntu is a flavor of Ubuntu based on the Xfce desktop environment. The Xubuntu 17.04 Beta 1 images can be downloaded from: http://cdimage.ubuntu.com/xubuntu/releases/zesty/beta-1/ More information about Xubuntu 17.04 Beta 1 can be found here: http://wiki.xubuntu.org/releases/17.04/release-notes If you’re interested in following the changes as we further develop the Zesty Zapus, we suggest that you subscribe to the ubuntu-devel-announce list. This is a low-traffic list (a few posts a month or less) carrying announcements of approved specifications, policy changes, alpha releases, and other interesting events. http://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-announce A big thank you to the developers and testers for their efforts to pull together this Beta release! Originally posted to the ubuntu-devel-announce mailing list on Fri Feb 24 00:34:19 UTC 2017 by Simon Quigley on behalf of the Ubuntu Release Team [Less]
Posted about 19 hours ago by nore...@blogger.com (Dustin Kirkland)
Yesterday, I delivered a talk to a lively audience at ContainerWorld in Santa Clara, California.If I measured "the most interesting slides" by counting "the number of people who took a picture of the slide", then by far "the most interesting slides" ... [More] are slides 8-11, which pose an answer the question:"Should I run my PaaS on top of my IaaS, or my IaaS on top of my PaaS"?In the Ubuntu world, that answer is super easy -- however you like!  At Canonical, we're happy to support: Kubernetes running on top of Ubuntu OpenStack OpenStack running on top of Canonical Kubernetes Kubernetes running along side OpenStack In all cases, the underlying substrate is perfectly consistent: you've got 1 to N physical or virtual machines which are dynamically provisioned by MAAS or your cloud provider running stable, minimal, secure Ubuntu server image carved up into fast, efficient, independently addressable LXD machine containers With that as your base, we'll easily to conjure-up a Kubernetes, an OpenStack, or both.  And once you have a Kubernetes or OpenStack, we'll gladly conjure-up one inside the other. As always, I'm happy to share my slides with you here.  You're welcome to download the PDF, or flip through the embedded slides below. [Container world 2017] The Questions You're Afraid to Ask about Containers from Dustin Kirkland Cheers,Dustin [Less]
Posted about 20 hours ago by nore...@blogger.com (Dustin Kirkland)
Introducting the Canonical Livepatch Service Howdy!Ubuntu 16.04 LTS’s 4.4 Linux kernel includes an important new security capability in Ubuntu -- the ability to modify the running Linux kernel code, without rebooting, through a mechanism called ... [More] kernel livepatch.Today, Canonical has publicly launched the Canonical Livepatch Service -- an authenticated, encrypted, signed stream of Linux livepatches that apply to the 64-bit Intel/AMD architecture of the Ubuntu 16.04 LTS (Xenial) Linux 4.4 kernel, addressing the highest and most critical security vulnerabilities, without requiring a reboot in order to take effect.  This is particularly amazing for Container hosts -- Docker, LXD, etc. -- as all of the containers share the same kernel, and thus all instances benefit.I’ve tried to answer below some questions that you might have. As you have others, you’re welcometo add them to the comments below or on Twitter with hastag #Livepatch. Retrieve your token from ubuntu.com/livepatch Q: How do I enable the Canonical Livepatch Service?A: Three easy steps, on a fully up-to-date 64-bit Ubuntu 16.04 LTS system. Go to https://ubuntu.com/livepatch and retrieve your livepatch token Install the canonical-livepatch snap $ sudo snap install canonical-livepatch  Enable the service with your token $ sudo canonical-livepatch enable [TOKEN]  And you’re done! You can check the status at any time using:$ canonical-livepatch status --verbose Q: What are the system requirements?A: The Canonical Livepatch Service is available for the generic and low latency flavors of the 64-bit Intel/AMD (aka, x86_64, amd64) builds of the Ubuntu 16.04 LTS (Xenial) kernel, which is a Linux 4.4 kernel. Canonical livepatches work on Ubuntu 16.04 LTS Servers and Desktops, on physical machines, virtual machines, and in the cloud. The safety, security, and stability firmly depends on unmodified Ubuntu kernels and network access to the Canonical Livepatch Service (https://livepatch.canonical.com:443).  You also will need to apt update/upgrade to the latest version of snapd (at least 2.15). Q: What about other architectures?A: The upstream Linux livepatch functionality is currently limited to the 64-bit x86 architecture, at this time. IBM is working on support for POWER8 and s390x (LinuxOne mainframe), and there’s also active upstream development on ARM64, so we do plan to support these eventually. The livepatch plumbing for 32-bit ARM and 32-bit x86 are not under upstream development at this time.Q: What about other flavors?A: We are providing the Canonical Livepatch Service for the generic and low latency (telco) flavors of the the Linux kernel at this time. Q: What about other releases of Ubuntu?A: The Canonical Livepatch Service is provided for Ubuntu 16.04 LTS’s Linux 4.4 kernel. Older releases of Ubuntu will not work, because they’re missing the Linux kernel support. Interim releases of Ubuntu (e.g. Ubuntu 16.10) are targeted at developers and early adopters, rather than Long Term Support users or systems that require maximum uptime.  We will consider providing livepatches for the HWE kernels in 2017. Q: What about derivatives of Ubuntu?A: Canonical livepatches are fully supported on the 64-bit Ubuntu 16.04 LTS Desktop, Cloud, and Server operating systems. On other Ubuntu derivatives, your mileage may vary! These are not part of our automated continuous integration quality assurance testing framework for Canonical Livepatches. Canonical Livepatch safety, security, and stability will firmly depend on unmodified Ubuntu generic kernels and network access to the Canonical Livepatch Service. Q: How does Canonical test livepatches? A: Every livepatch is rigorously tested in Canonical's in-house CI/CD (Continuous Integration / Continuous Delivery) quality assurance system, which tests hundreds of combinations of livepatches, kernels, hardware, physical machines, and virtual machines.  Once a livepatch passes CI/CD and regression tests, it's rolled out on a canary testing basis, first to a tiny percentage of the Ubuntu Community users of the Canonical Livepatch Service. Based on the success of that microscopic rollout, a moderate rollout follows.  And assuming those also succeed, the livepatch is delivered to all free Ubuntu Community and paid Ubuntu Advantage users of the service.  Systemic failures are automatically detected and raised for inspection by Canonical engineers.  Ubuntu Community users of the Canonical Livepatch Service who want to eliminate the small chance of being randomly chosen as a canary should enroll in the Ubuntu Advantage program (starting at $12/month).Q: What kinds of updates will be provided by the Canonical Livepatch Service?A: The Canonical Livepatch Service is intended to address high and critical severity Linux kernel security vulnerabilities, as identified by Ubuntu Security Notices and the CVE database. Note that there are some limitations to the kernel livepatch technology -- some Linux kernel code paths cannot be safely patched while running. We will do our best to supply Canonical Livepatches for high and critical vulnerabilities in a timely fashion whenever possible. There may be occasions when the traditional kernel upgrade and reboot might still be necessary. We’ll communicate that clearly through the usual mechanisms -- USNs, Landscape, Desktop Notifications, Byobu, /etc/motd, etc. Q: What about non-security bug fixes, stability, performance, or hardware enablement updates?A: Canonical will continue to provide Linux kernel updates addressing bugs, stability issues, performance problems, and hardware compatibility on our usual cadence -- about every 3 weeks. These updates can be easily applied using ‘sudo apt update; sudo apt upgrade -y’, using the Desktop “Software Updates” application, or Landscape systems management. These standard (non-security) updates will still require a reboot, as they always have. Q: Can I rollback a Canonical Livepatch?A: Currently rolling-back/removing an already inserted livepatch module is disabled in Linux 4.4. This is because we need a way to determine if we are currently executing inside a patched function before safely removing it. We can, however, safely apply new livepatches on top of each other and even repatch functions over and over. Q: What about low and medium severity CVEs?A: We’re currently focusing our Canonical Livepatch development and testing resources on high and critical security vulnerabilities, as determined by the Ubuntu Security Team.  We'll livepatch other CVEs opportunistically.Q: Why are Canonical Livepatches provided as a subscription service? A: The Canonical Livepatch Service provides a secure, encrypted, authenticated connection, to ensure that only properly signed livepatch kernel modules -- and most importantly, the right modules -- are delivered directly to your system, with extremely high quality testing wrapped around it. Q: But I don’t want to buy UA support!A: You don’t have to! Canonical is providing the Canonical Livepatch Service to community users of Ubuntu, at no charge for up to 3 machines (desktop, server, virtual machines, or cloud instances). A randomly chosen subset of the free users of Canonical Livepatches will receive their Canonical Livepatches slightly earlier than the rest of the free users or UA users, as a lightweight canary testing mechanism, benefiting all Canonical Livepatch users (free and UA). Once those canary livepatches apply safely, all Canonical Livepatch users will receive their live updates.Q: But I don’t have an Ubuntu SSO account!A: An Ubuntu SSO account is free, and provides services similar to Google, Microsoft, and Apple for Android/Windows/Mac devices, respectively. You can create your Ubuntu SSO account here.Q: But I don’t want login to ubuntu.com!A: You don’t have to! Canonical Livepatch is absolutely not required maintain the security of any Ubuntu desktop or server! You may continue to freely and anonymously ‘sudo apt update; sudo apt upgrade; sudo reboot’ as often as you like, and receive all of the same updates, and simply reboot after kernel updates, as you always have with Ubuntu.Q: But I don't have Internet access to livepatch.canonical.com:443!A: You should think of the Canonical Livepatch Service much like you think of Netflix, Pandora, or Dropbox.  It's an Internet streaming service for security hotfixes for your kernel.  You have access to the stream of bits when you can connect to the service over the Internet.  On the flip side, your machines are already thoroughly secured, since they're so heavily firewalled off from the rest of the world!Q: Where’s the source code?A: The source code of livepatch modules can be found here.  The source code of the canonical-livepatch client is part of Canonical's Landscape system management product and is commercial software.Q: What about Ubuntu Core?A: Canonical Livepatches for Ubuntu Core are on the roadmap, and may be available in late 2016, for 64-bit Intel/AMD architectures. Canonical Livepatches for ARM-based IoT devices depend on upstream support for livepatches.Q: How does this compare to Oracle Ksplice, RHEL Live Patching and SUSE Live Patching?A: While the concepts are largely the same, the technical implementations and the commercial terms are very different: Oracle Ksplice uses it’s own technology which is not in upstream Linux. RHEL and SUSE currently use their own homegrown kpatch/kgraft implementations, respectively. Canonical Livepatching uses the upstream Linux Kernel Live Patching technology. Ksplice is free, but unsupported, for Ubuntu Desktops, and only available for Oracle Linux and RHEL servers with an Oracle Linux Premier Support license ($2299/node/year). It’s a little unclear how to subscribe to RHEL Kernel Live Patching, but it appears that you need to first be a RHEL customer, and then enroll in the SIG (Special Interests Group) through your TAM (Technical Account Manager), which requires Red Hat Enterprise Linux Server Premium Subscription at $1299/node/year.  (I'm happy to be corrected and update this post) SUSE Live Patching is available as an add-on to SUSE Linux Enterprise Server 12 Priority Support subscription at $1,499/node/year, but does come with a free music video. Canonical Livepatching is available for every Ubuntu Advantage customer, starting at our entry level UA Essential for $150/node/year, and available for free to community users of Ubuntu. Q: What happens if I run into problems/bugs with Canonical Livepatches?A: Ubuntu Advantage customers will file a support request at support.canonical.com where it will be serviced according to their UA service level agreement (Essential, Standard, or Advanced). Ubuntu community users will file a bug report on Launchpad and we'll service it on a best effort basis.Q: Why does canonical-livepatch client/server have a proprietary license?A: The canonical-livepatch client is part of the Landscape family of tools available to Canonical support customers. We are enabling free access to the Canonical Livepatch Service for Ubuntu community users as a mark of our appreciation for the broader Ubuntu community, and in exchange for occasional, automatic canary testing.Q: How do I build my own livepatches?A: It’s certainly possible for you to build your own Linux kernel live patches, but it requires considerable skill, time, computing power to produce, and even more effort to comprehensively test. Rest assured that this is the real value of using the Canonical Livepatch Service! That said, Chris Arges has blogged a howto for the curious a while back:http://chrisarges.net/2015/09/21/livepatch-on-ubuntu.htmlQ: How do I get notifications of which CVEs are livepatched and which are not?A: You can, at any time, query the status of the canonical-livepatch daemon using: ‘canonical-livepatch status --verbose’. This command will show any livepatches successfully applied, any outstanding/unapplied livepatches, and any error conditions. Moreover, you can monitor the Ubuntu Security Notices RSS feed and the ubuntu-security-announce mailing list.Q: Isn't livepatching just a big ole rootkit?A: Canonical Livepatches inject kernel modules to replace sections of binary code in the running kernel. This requires the CAP_SYS_MODULE capability. This is required to modprobe any module into the Linux kernel. If you already have that capability (root does, by default, on Ubuntu), then you already have the ability to arbitrarily modify the kernel, with or without Canonical Livepatches. If you’re an Ubuntu sysadmin and you want to disable module loading (and thereby also disable Canonical Livepatches), simply ‘echo 1 | sudo tee /proc/sys/kernel/modules_disabled’. Keep the uptime!:-Dustin [Less]
Posted 1 day ago
It’s Season Ten Episode Zero of the Ubuntu Podcast! Alan Pope, Mark Johnson and Martin Wimpress are connected and speaking to your brain. In your face, we’re back for season 10! In this pre-season teaser: We discuss what we’ve been up to since the ... [More] end of last year.: Having curry together somewhere near Oxford. Upgrading a Steambox with a low-profile nvidia GEFORCE GTX 1050 TI 4GT graphics card. Buying and playing games to “test drive” the nvidia GEFORCE GTX 1050 TI 4GT. Getting an LG G Watch to experiment with Asteroid OS. Decorating the house. Fixing an unreliable car. Hacking another car with Carista OBD2 to make it smarter. Making a better fuel gauge with an OBD2 adpater. Echo, echo, echo… Voice activated Philips Hue lights. We explain some changes to the show format for Season 10. This weeks cover image is taken from Wikimedia. That’s all for the season teaser. Episode 1 will be out on March 9th! If there’s a topic you’d like us to discuss, or you have any feedback on previous shows, please send your comments and suggestions to show@ubuntupodcast.org or Tweet us or Comment on our Facebook page or comment on our Google+ page or comment on our sub-Reddit. Join us in the Ubuntu Podcast Chatter group on Telegram [Less]
Posted 1 day ago
Ubuntu Core and the TS-4900 makes for one the most secure, easy to manage, and flexible i.MX6 powered boards on the market The TS-4900 with Ubuntu Core will be on the Ubuntu Booth in Hall P3 – 3K31 at Mobile World Congress 2017 London ... [More] , UK and Fountain Hills, AZ – 23 February 2017 : Today, Technologic Systems, Inc. announced that it will be partnering with Canonical to make Ubuntu Core available for their TS-4900 Compute Module. The TS-4900 is a high-performance Computer on Module (CoM) based on the NXP i.MX6 CPU which implements the ARM® CortexTM A9 architecture clocked at 1 GHz. The TS-4900 is ideal for embedded systems applications, especially those needing wireless connections like industrial IoT gateways. Ubuntu Core is ideal for this environment because of its rich networking and protocol support. In addition, Ubuntu Core offers a secure, reliable, and remotely upgradeable platform to easily update and maintain IoT devices making for a more secure and cost-effective deployment. The TS-4900 is available in either single or quad core configurations with up to 2 GB DDR3 RAM. It is designed with connectivity in mind with WiFi 802.11 b/g/n and Bluetooth 4.0 onboard. Several standard interfaces are supported including Gigabit Ethernet, USB, SATA II, and PCIe Express. The TS-4900 is fanless, although a heat sink is recommended for the quad core configuration, and it is rated at an industrial temperature range (-40 oC to 85 oC). In addition, new applications can be simply developed and rolled out across the deployment via snap packages, increasing the utility and value of any IoT deployment. Bob Miller, founder of Technologic Systems said, “With the functionality of our TS-4900 and the flexibility of Ubuntu Core, I can see these powering virtually anything from industrial IoT gateways, plant automation, network equipment, high definition digital signage, to remote monitoring stations.” Mike Bell, EVP IoT and Devices of Canonical said, “The TS-4900 Compute Module brings Ubuntu Core to the popular i.MX6 platform, delivering a new level of life-cycle management, monetisation and security to a whole range of IoT applications. Ubuntu Core delivers groundbreaking security, management, operations, and upgradability in a compact developer-friendly platform, underpinned by the open “snap” packaging technology.” For more information on Ubuntu Core please visit: www.ubuntu.com/core For more information on TS-4900 powered by Ubuntu Core please visit: www.embeddedarm.com/software/ubuntu-core Mobile World Congress 2017 location: To find out Ubuntu Core and the TS-4900 visit the Ubuntu Booth in Hall P3 – 3K31 at Mobile World Congress 2017. -ends- About Technologic Systems, Inc. Technologic Systems has been in business for 32 years, helping more than 8000 OEM customers and building over a hundred COTS products that have never been discontinued. Our commitment to excellent products, low prices, and exceptional customer support has allowed our business to flourish in a very competitive marketplace. We offer a wide variety of single board computers, computer-on-modules, touch panel PCs, PC/104 and other peripherals, and industrial controllers that satisfy most embedded project requirements. We also offer custom configurations and design services. We specialize in the ARM and X86 architectures, FPGA IP-core design, and open-source software support, providing advanced custom solutions using hardware-software co-design strategies. Technologic Systems Fountain Hills, AZ www.embeddedARM.com (480)837-5200 About Canonical Canonical is the company behind Ubuntu, the leading OS for cloud operations. Most public cloud workloads use Ubuntu, as do most new smart gateways, switches, self-driving cars and advanced robots. Canonical provides enterprise support and services for commercial users of Ubuntu. Established in 2004, Canonical is a privately held company. Media contacts EMEA Ubuntu@wildfirepr.com +44 208 408 8000 US March Communications ubuntu@marchcomms.com +1 (617) 960-9900. [Less]
Posted 2 days ago
Does anybody still think of a phone as a way of just making calls? According to Informate Mi less than 10% of the time you spend on a phone is spent giving calls. That’s because phones have evolved from single function device to malleable pocket ... [More] computers whose entire purpose is defined by the apps that they run. In reality, a smartphone is a software-defined device. What’s much less commonly known is that the world of telco is also becoming software-defined. ‘Software-defined everything’ represents a step change in the telco industry. The entire industry is moving away from a mode of organising and thinking about their network and services as a bunch of boxes with fixed functions to thinking about it as stacks of interacting software. Look at some of the key themes at MWC this year…. 5G for example. Many people see it as just another iteration in the 1G, 2G, 3G, 4G where what matters is the additional bandwidth for the end user. But behind the scenes a drastic redesign of the telco mobile network is underway where fixed function networking equipment laid out in a static / predefined architecture is being replaced by mini-data centres of generic servers whose function is responsive to the needs of the network. 5G is really about the software-defined telco network. Another key theme is IoT (Internet of Things). Many believe M2M (the ancestor of IoT) has been part of MWC since times immemorial, so why make a fuss about it all of a sudden? Once again the answer is software. M2M was simple with unidirectional exchanges of data, reflecting the simple nature of the software being run on M2M devices – images were sent down to a digital signage box and telemetry data was sent from an industrial gateway to a monitoring server. But today things are very different. The software run by all these devices has evolved drastically which has changed the very simple nature of these exchanges. For example, as well as displaying advertisements, a digital signage screen might be count the people that pass it or act as a wifi hotspot. IoT is reall about software-defined smart devices. Autonomous cars, another big theme this year, is yet another example of the software-defined nature of things to come. In car maps was followed by telemetry data coming from cars which was then complemented by in-car hot-spots and infotainment. Today, complex self driving or navigation support systems offer a level of artificial intelligence never seen before in vehicles. If you’re in Barcelona next week for MWC2017 drop by our booth at Hall P3 – 3K31 to learn how we see Ubuntu at the centre of our software-defined future. [Less]
Posted 2 days ago
Part 1: Setting up an “All-Snap” Ubuntu Core image in a QEMU/KVM virtual machine Part 2: Basic management of an Ubuntu Core installation Part 3: Mir and graphics on Ubuntu Core Part 4: Confinement After I’ve set up an “All-Snap” Ubuntu Core virtual machine in the last post, let’s see what I can do with it. Logging in After […]
Posted 2 days ago
A factor for so many smaller enterprises today is that they are unable to take full advantage of the range of services associated with standard public cloud offerings. Privacy and control are so important to their operation that using a publicly ... [More] provided service will not work for tech-focused, smart enterprises that place privacy and control as one of their most important requirements. The successful Nextcloud box, which runs Ubuntu Core, has shown the level of interest that exists in full control and self-hosting. Document sharing and editing, communications and messaging, email, code management are further examples of services that work well as part of a self-hosting solution – especially for small businesses that are sensitive to the privacy of their data. Ubuntu has a ready-made ecosystem of services which will run on a device such as a smart NAS or a router which can benefit enterprises that wish to control and host everything on-site. At MWC this year, we will be demonstrating a new solution for enterprises who want to take advantage of this trend in self-hosted services. We have taken the very best available from the Ubuntu snap ecosystem and created a solution designed specifically for small enterprises that delivers a range of high quality self-hosted services which are engineered for privacy. Thereby enabling a small business to easily deploy a full suite of relevant, self-hosted services for internal staff to access from any desktop browser sitting on the private LAN. The solution is built to be fully extensible and can easily evolve to include other services which exist within the Ubuntu snap ecosystem. As well as a demonstrating the product on our stand at MWC next week, it will also be available as an image containing all the featured snaps so anyone can download and run the solution on compatible hardware. Included in the image is a snap-based offering with Nextcloud file and data management, Rocket.Chat messaging and communication, Collabora Online collaborative document editing suite, Wekan workflow tool, code management and distribution from Gogs , video conferencing using Spreed, and a fully self-hosted email solution and UI using iRedMail. All the services are open source and all integrated using Ubuntu Core for added security with the wider benefit of extending the solution to include any service that exists as a snap. And importantly, the solution comes with a customisable front-end GUI for admin control and service management. Frank Karlitschek, Managing Director at Nextcloud, said: “This new solution from Ubuntu is the perfect next step on from the Nextcloud box and brings a fantastic blend of snaps to make it super easy for enterprises to experiment with self-hosted services.” Michael Meeks, Managing Director at Collabora Productivity, said: “Collabora is the driving force behind bringing LibreOffice to every modern device with a browser, so we’re thrilled to contribute an Ubuntu snap of Collabora Online to this solution. By seamlessly integrating the collaborative editing of complex documents we give huge scope for enterprises to reduce cost as well as to simplify their productivity provision.” Visit us at the Ubuntu Booth in Hall P3 – 3K31 at Mobile World Congress [Less]