Skip to main content
  1. Blog
  2. Article

Canonical
on 8 July 2015

Learn About Landscape! ODS Keynote


In complex computing scenarios, creating a holistic or unified update procedure across multiple clouds and hundreds of separate machines feels like an impossible task. And what do you want to do when your systems estate reaches the thousands, is it possible to automate and simplify cloud management so that thousands of systems can be managed as easily as one?

In this latest of our OpenStack Summit seminars, Dean Henrichsmeyer, Engineering Manager for our Landscape group talks about the challenges facing compute-heavy, cloud-based organisations when trying to manage a growing cloud ecosystem. He explains how Landscape has been designed to scale from the outset; able to manage (with ease) up to 40,000 machines. He also talks about the importance of understanding, and responding to milestones in the life-cycle of each cloud. He digs into the intricacies of working with Autopilot and demonstrates how, by putting your OpenStack cloud on Autopilot you can automate the way your cloud evolves using Canonical’s wealth of experience and tools.

Watch our OpenStack Summit keynote below.

Related posts


ilvipero
6 May 2026

Three weeks to go: A sneak peek of the Ubuntu Summit 26.04 experience

Ubuntu Article

The countdown to the Ubuntu Summit is officially on! We are just three weeks away from Ubuntu Summit 26.04, and the orange energy levels in our community channels are peaking. We’ve been reviewing the talk submissions, and have been blown away by the passion and creativity of our circle of friends. Once again, the schedule ...


Rajan Patel
4 May 2026

How to use Ubuntu on Windows

Ubuntu Article

Why run Ubuntu on Windows? It’s about getting the best of both worlds. ...


Luci Stanescu
30 April 2026

Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on April 29, 2026. The vulnerability has been assigned CVE ID CVE-2026-31431 and is referred to as Copy Fail. The affected component is a kernel module that provides hardware-accelerated cryptographic functions: algif_aead. The vulnerab ...