Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Amrisha Prashar
on 15 October 2015


Dell World
20th-22nd October 2015
Austin, Texas
Austin Convention Center

Dell World is a three day event held in Austin, Texas bringing together technology leaders and decision makers from organisations of all sizes across a variety of different industries. This fifth annual event of its kind presents a forum for businesses to showcase how emerging technologies can transform their businesses through mobility, security, cloud, big data and the internet of things.

The Canonical team will be on hand at booth #1011 showcasing and demoing the power of snappy Ubuntu Core in partnership with CloudPlugs and Flowthings.io. We’ll be demoing how easy it is to use snappy Ubuntu Core with Dell IoT gateways and their software for solutions in building automation, industrial automation, smart cities, and energy applications.

Register now: http://dellworld.com/register

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...