-
Life at Canonical: Victoria Antipova’s perspective as a new joiner in Product Marketing
Canonical is continuously hiring new talent. Being a remote- first company, Canonical’s new joiners receive a unique onboarding experience. In their first weeks, they are introduced to the different departments and the various tools they use to work asynchronously across the globe. New hires develop a good understanding of the open-source technologies that the company…
-
Building RAG with enterprise open source AI infrastructure
One of the most critical gaps in traditional Large Language Models (LLMs) is that they rely on static knowledge already contained within them. Basically, they might be very good at understanding and responding to prompts, but they often fall short in providing current or highly specific information. This is where Retrieval-augmented Generation (RAG) comes in; …
-
What to know when procuring Linux laptops
Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your success. So what does being “well-equipped” look like in the world of Linux laptops? In this blog, we’ll lay down the best practices for procurement professionals who have been tasked with procuring Linux laptops.…
-
What is SBOM? Software bill of materials explained
In the wake of EU drafted legislation and US executive orders, a software bill of materials (SBOM) has gone from a nice-to-have to a fundamental piece of software documentation. In this article, we’ll examine what an SBOM is, what information it must include, and the approaches that developers and manufacturers alike should consider as they…
-
What is vulnerability management?
Today, computers are more sophisticated, interconnected and complex than ever. This means they’re more capable than ever – but it also comes with a downside: that their attack surface is larger than ever, leading to an elevated risk of cyber incidents. Therefore, your approach to managing vulnerabilities needs to be holistic and prepare for all…
-
What is RAG?
In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them,…
-
How does OpenSearch work?
OpenSearch is an open source search and analytics suite that developers use to build solutions for search, data observability, data ingestion, security information and event management (SIEM), vector database, and more. It is designed for scalability, offering powerful full-text search capabilities and supporting various data types, including structured and unstructured data. OpenSearch has rapidly developed…
-
Get Valkey security patching and support with Ubuntu Pro
Canonical is pleased to announce security patching and support for Valkey through the Ubuntu Pro subscription. Ubuntu Pro is a subscription for open source software security, compliance and support that expands the maintenance period for all packages distributed in Ubuntu repositories. This extension applies to all the open source software on Ubuntu, including Valkey. This…
-
SiFive, ESWIN Computing and Canonical announce availability of Ubuntu on the HiFive Premier P550
We are pleased to announce that SiFive, ESWIN Computing and Canonical are enabling Ubuntu 24.04 LTS on the HiFive Premier P550, a development platform that offers a premium RISC-V development experience, an important milestone for the RISC-V development community. This collaboration ensures that developers who purchase the HiFive Premier P550 can take full advantage of…
-
Greetings!
This blog is a place for Posts and News in the era of Cyber security, DevOps, and GNU Linux System Administration. Contact: [email protected]