Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Tom Callway
on 9 March 2015

Ubuntu at WHD.global 2015


With MWC2015 barely over, we’re now looking forward to the next big European cloud event – WHD.global 2015 – held at Europa Park in Rust, Germany.

WHD.global 2015, now in its 11th year, promises to be as popular and diverse as ever. The event organisers expect over 6,000 vendors, service providers and software developers to visit the Europa Park site this year making it one of the premier cloud and hosting events in Europe.

This year’s conference talk line-up looks excellent with my former colleague Monty Widenus, the creator of MySQL and MariaDB, and Apple co-founder Steven Wozniak giving keynote talks on Day One. Day Two and Three keynotes will be by Edward Snowden, former US security services contractor, and Thomas Arenz from Samsung respectively.

This year, members of the Ubuntu team will be present at both the Atomia and StackVelocity booths talking about Juju, OpenStack and BootStack, our managed cloud service.

This event is not to be missed if only to try many of the rides at the location’s massive amusement park!

See you in Rust!

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...