Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Jane Silber
on 22 January 2008

Why a Canonical blog?


Welcome to the Canonical Blog. The goal of the blog is to provide a vehicle for people who work for Canonical to respond to some of the questions we get asked, to explore the issues we care about, and to expand on some of the initiatives in which we are involved. It is a companion piece to the Fridge, Planet Ubuntu and to Mark’s blog but it is different as it is not the voice of the Ubuntu Community.

It is the Canonical (capital C) voice. It is (we hope) the considered opinion of people within Canonical with a valuable perspective on a specific topic. It is here to address that gap where a press release is over the top but we want to respond to an issue or we want to provide more colour on an announcement, where we want to provoke debate or bring attention to something that we feel is important.

We live in interesting times in computing and at Canonical we are fortunate to find ourselves at the centre of a lot of the more interesting developments. We hope this blog develops into a useful perspective on these issues.

– The Canonical Team

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...