In modern PC-based platforms, UEFI Secure Boot is used to protect the integrity of the boot process by ensuring that only authorized code is allowed to run during this critical time. If unauthorized code can run during the boot process, the operating system itself and the security guarantees it tries to provide can no longer be trusted. In April 2020, a security vulnerability in the GRUB2 bootloader allowing arbitrary code execution was disclosed to the GRUB2 maintainers and a number of other affected parties. Although the fix to the code itself was simple, only one line, complications with both the UEFI Secure Boot implementation and ecosystem necessitated a complex, industry-wide mitigation effort. Revocation, new shim review process, additional vulnerabilities found and fixed, and more. We'll discuss the problems we encountered and overcame as well as areas for future improvement from the perspective of the security researchers, the GRUB upstream maintainers, and the Linux distributions.
Join the Ubuntu Masters telegram channel to connect with Ubuntu product managers, engineers and other attendees! https://t.me/joinchat/JOsc1hzTAhbAfjBX1fsqLA
RecordedDec 10 202063 mins
Your place is confirmed, we'll send you email reminders
Although the public cloud market is mostly dominated by the hyperscalers, using cloud services from AWS, Azure or Google in some parts of the world is challenging due to local regulations, digital sovereignty concerns and latency issues. As a result, many businesses have started implementing their own public cloud infrastructure to offer cloud services on local markets. Leveraging open source technologies enabled them to reduce the TCO of cloud infrastructure maintenance and offer their services to their customers at a better price than the hyperscalers.
Join Thierry Carrez, VP of Engineering at the Open Infrastructure Foundation, Nauman Vawda, CEO & Founder at iVolve Technologies and Tytus Kurek, Product Manager at Canonical to learn how OpenStack enables businesses to implement local public cloud infrastructure.
Charles Adetiloye - Co-founder & AI Consultant, Mavencode | Rui Vasconcelos - AI/ML Product Manager, Canonical
The need for efficient allocation of compute resources and planning of utilization capacity is fast becoming a necessity in many Enterprise Machine Learning Operation endeavors. Optimizing resource allocation, from both a cost and technical perspective, is driving many organizations to strongly consider a hybrid-cloud infrastructure setup.
Architectural best practices that have emerged in recent times around ML workflow pipelines, cloud-agnostic model deployment and serving, feature stores, data versioning and more, make it easy for companies looking in this direction to bootstrap and get up and running.
In this webinar, we will cover:
1. How to effectively bring your models to production across clouds
2. How to make the best use of feature stores
3. How to use Kubeflow Pipelines with a feature store
4. How to use Apache Hudi to unify historical and new data
5. How to use Kubeflow with Apache Spark operator
6. How to leverage model-driven operators to deploy and manage your MLOps stack
7. Storage agnostic best practices (s3, gs, az storage) in the public cloud and (ceph) on-prem
Have you dreamt of having your own home cloud but found it too complex? Micro-clouds enable everyone to build a cloud anywhere. In this video we cover how to combine LXD, MicroK8s, and Charmed Operators to BYOC (build your own cloud) - we're using Raspberry Pi's!
Mobile networks are not a complex and expensive black box. With the power of open source you can build your own 5G or LTE network. On this webinar we will explore most popular use-cases, go over software and hardware needed to run it efficiently and deep dive into 2 build examples - small network for hacking and experimentation on unlicensed spectrum and minimal cost and a 5G network running solar powered cameras for forests and agriculture monitoring with some image recognition at the edge capabilities.
Although Kubernetes revolutionised the software life cycle, its steep learning curve still discourages many users from adopting it. MicroK8s is a production-grade, low-touch Kubernetes that abstracts the complexity and can address use cases from workstations to clouds to the edge. We’ll highlight the details of MicroK8s’ simplicity and robustness and demonstrate the different usage scenarios, running it on NVIDIA DGX, EGX, DPU and Jetson hardware using real applications from NVIDIA marketplace.
Tytus Kurek, Product Manager, Lech Sandecki, Product Manager and Ken VanDine, Engineering Manager
Ubuntu Server 21.04 brings significant improvements to the networking, automation and stability fronts with a new Hardware Enablement (HWE) advanced networking stack, extensions to the Ubuntu Server Live Installer and APT phased updates. In addition, the latest development cycle includes improved enterprise applications availability with native support for Microsoft SQL Server on Ubuntu 20.04 LTS. All this makes Ubuntu Server a reasonable alternative for CentOS users, both in terms of infrastructure and application support. Join Tytus Kurek and Lech Sandecki, Product Managers from Canonical to learn about everything new in Ubuntu Server 21.04 release.
Gabriel Aguiar Noury, Robotics Product Manager, Sid Faber, Head of Robotics Canonical
ROS Kinetic, one of the most popular ROS releases, has been available since 2016 - with many roboticists adopting it for building and deploying robots and autonomous systems. However, by the end of April 2021, both ROS Kinetic and its primary platform - Ubuntu Xenial - will reach End of Life. Should you care?
End of Life means the end of security updates and common vulnerabilities exposures (CVE) fixes for both distributions. Security updates are strict requirements to keep your robot compliant with common consensus frameworks of foundational security controls, and even more importantly, to protect your robot from compromise.
This webinar explains the implications to robotics developers from a security perspective, and introduces ROS ESM, a Hardened ROS with 10 year security from Open Robotics and Canonical.
To help us explore this, Sid Faber, our security expert and head of the robotics team at Canonical, will join us!
In this webinar you will learn:
- About the implications of ROS Kinetic EOL
- Why security compliance for robots matters
- What comprises ESM for ROS
Stephane Verdy – Solution Architect, Canonical and John Fuji – Software Engineering, HP
With Z by HP now preinstalling Ubuntu LTS 20.04 on several of their Desktop and Mobile Workstations, end users and IT managers can feel confident that Ubuntu 20.04 LTS and all of its subsystems such as WiFi, Bluetooth, and fingerprint authentication, will work flawlessly from first boot. But why else would developers and designers choose Z by HP with Ubuntu Linux to realize their greatest AI, machine learning, and data science workflow dreams? Join members of HP and Canonical in this webinar to find out.
Lorenzo Cavassa- Field Engineer, Canonical; Giuseppe Petralia- Cloud Operations Engineer, Canonical
L'infrastruttura aziendale sta guidando l'efficienza, eppure ci si aspetta che i dipartimenti informatici abbassino i costi. Come possono riuscirci? Vi porteremo le storie di imprese e istituzioni italiane che hanno tagliato il loro budget IT e ottenuto un'innovazione accelerata.
Il 12 maggio, unisciti al gruppo di esperti di Ubuntu per un evento virtuale dal vivo che riunisce varie soluzioni per l'infrastruttura aziendale e storie di clienti. Avrai l'opportunità di fare domande direttamente ai nostri relatori e di essere coinvolto in una conversazione sull'ottimizzazione dell'infrastruttura.
Durante l’evento, parleremo di:
● Infrastruttura aziendale: le sfide relative alla scalabilità e al TCO
● Sfruttare l’automazione: OpenStack, Kubernetes e Kubeflow
● Casi studio di ottimizzazioni del rapporto prezzo/performance
Incontra i nostri relatori:
● Lorenzo Cavassa, Field Engineer - Canonical
● Alex Barchiesi, Senior Cloud Architect - GARR
● Franco Fiorese, IT Strategist - DXC
● Giuseppe Petralia, Cloud Operations Engineer - Canonical
Maciej Mazur, Product Manager at Canonical, Kyle Harper, Director of AI Strategy at Dell, Michael Boros, AI Strategy at Dell
While new AI algorithms and training methods get all the hype, most analysts agree that data scientists spend up to 80% of their time on data: exploration, acquisition, ingestion, transformation and cleansing. This webinar will explore best open source platforms and tools that help to work on large and varyings datasets, which is the first step of a 4 piece series on the journey to AI.
Wajeeha Hamid, Product Manager OSM; Maciej Mazur, Product Manager Telco
The transition to virtualized infrastructure and software network functions requires a re-evaluation in the telecom production environments. Network function is not alone.
It includes the monitoring, logging, scaling, auditing, upgrades, and security, etc.
To achieve exceptional performance, these Day-2 operations become tiresome in manual management processes and the big functions need operations to be open source and automated. Although there are multiple tools for LMA (Logging, Monitoring, and Alerting) like Prometheus, Grafana, and Graylog which can serve the purpose but reconfiguring these tools with every update in your network functions can reduce the human operators to tears.
Join our webinar to learn how Charmed OSM with the help of juju eases the deployment and integration of LMA stack with your existing network functions.
Lech Sandecki - Product Manager, Rick Harding - Server Engineering Mgr and Alex Murray - Security Staff Engineer
As major organisations migrate and continue to build, test and deploy across open source technologies, security of those platforms is always top-of-mind. With Ubuntu, security is built in from its foundation, making it a popular Linux distribution used by developers and a secure platform for production environments across any multi-cloud infrastructure, even extending to devices and edge computing.
The Ubuntu security team at Canonical is constantly working to review threats, fix vulnerabilities and upgrade security capabilities for releases to protect your systems and mission-critical workloads.
Get the full Ubuntu security story and see how our teams are securing Ubuntu systems across cloud, device and edge environments.
In this webinar, join our team to learn how:
- Ubuntu is built with security in mind from the ground up, and how we keep you protected against major vulnerabilities
- How you can ensure performant open source in production environments
- Specific security services that can help you achieve maximum availability by reducing downtime and providing access to high and critical CVE fixes
- Ubuntu helps organisations remain compliant with government and industry standards and regulations, including Common Criteria EAL2 with FIPS 140-2 Level 1 certified crypto modules
Together We Sink or Swim: Plugging the BootHoleJ. Michael, Principal Researcher, Eclypsium; D. Kiper, Software Eng., Oracle; C. Coulson, Sr Software Eng., Canonical[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]62 mins