Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 13 October 2011

Next webinar with Mark Shuttleworth on Ubuntu Cloud


November 16th – 2pm UK time

After years of development and fine tuning, the cloud vision of true computing elasticity is finally a reality. The question now is how organisations can best take advantage of the latest cloud technologies to optimise their IT, scale infrastructure and services in near-real time, and make the most of new market opportunities.

In our webinar, Ubuntu’s Founder Mark Shuttleworth and Redmonk’s Stephen O’Grady share their ideas on the cloud and the benefits it offers businesses today. They discuss how open-source technologies in general, and Ubuntu Cloud in particular, can help companies avoid frustrating vendor lock-in and stay in control of their own cloud destinies. They also explore Ubuntu’s unique attributes, looking at how it minimises hardware and software costs, accelerates cloud deployment, and supports dynamic service provisioning and scaling.

Register now: http://www.brighttalk.com/channel/6793

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...