Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

John Zannos
on 3 June 2014

IBM App Throwdown – Canonical’s Juju selected as top five finalist


IBM is holding a contest for developing solutions for its new Power8 server architecture.  We’re thrilled that our service orchestration tool, Juju, ported to IBM’s Power8 CPU has been selected as one of the top five finalists.

You can show your support and vote for Juju by tweeting anything that includes “@ubuntucloud #ibminnovateapp”, or by visiting the App Throwdown page and clicking the “Tweet your Vote” link under Canonical: http://ibmappthrowdown.tumblr.com/

If you don’t already know about Juju take a moment a look see what is does, you can learn all about it and how it can help you move to cloud infrastructure at our website https://juju.ubuntu.com/

Related posts


Henry Coggill
6 June 2025

What is CMMC compliance?

Hardening Article

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public sector and amongst wider industry partners. ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...