Main Menu

Recent posts

#91
Ubuntu News / Arduino’s new AI single-board...
Last post by tim - Mar 13, 2026, 06:09 PM
Arduino's new AI single-board computer runs Ubuntu 

Qualcomm subsidiary Arduino has announced the VENTUNO Q, a new single-board computer that ships with Ubuntu pre-installed. This isn't a board aimed at casual makers or tech tinkerers bored with their Raspberry Pi, but catering to the demands of AI workloads at the edge: robotics, industrial automation, computer vision. The Ventuno Q is built around Qualcomm's Dragonwing IQ-8275 processor with CPU, GPU and NPU, which delivers 40 TOPS of AI compute to run large language models, visual language models and computer vision workloads on-device. It comes with 16GB of LPDDR5 RAM – double what you get on the comparable Jetson Orin [...]

You're reading Arduino's new AI single-board computer runs Ubuntu  , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: Hardware, News, Arduino, arm
Source: https://www.omgubuntu.co.uk/2026/03/arduino-ventuno-q-ubuntu-edge-ai-board Mar 11, 2026, 01:40 AM
#92
Ubuntu News / Ghostty 1.3 terminal released...
Last post by tim - Mar 13, 2026, 06:09 PM
Ghostty 1.3 terminal released with search, scrollbars and more

A big update to Ghostty terminal emulator has dropped, delivering a raft of new features like scrollback search, native scrollbars and and process completion notifications. Ghostty 1.3.0 packs in 6 months of development effort: 2,800+ commits from 180 contributors. That means hundreds of performance tweaks, bug fixes and platform optimisations for those using it on macOS, Linux and FreeBSD (Ghostty isn't available on Windows). But since it's the new features that most of you care about, and this update to the Zig-based open-source terminal adds a couple of long-requested ones. Ghostty 1.3.0: Highlights Text search/match You can now search your [...]

You're reading Ghostty 1.3 terminal released with search, scrollbars and more , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: News, App Updates, ghostty, terminal apps
Source: https://www.omgubuntu.co.uk/2026/03/ghostty-1-3-terminal-brings-big-new-features Mar 10, 2026, 10:47 PM
#93
Ubuntu News / HandBrake 1.11 adds ProRes, D...
Last post by tim - Mar 13, 2026, 06:09 PM
HandBrake 1.11 adds ProRes, DNxHR encoders and MOV output

HandBrake, the free and open-source video transcoder, has just dropped its first major release of 2026 – adding new professional encoders, MOV output container and a considered clutch of Linux changes. Those of you who work to production standards will find the DNxHR and ProRes encoder support in HandBrake 1.11.0 the star addition. Both offer a range of presets, including standard, high-quality, and proxy variants at resolutions up to 4K. The new ProRes and DNxHR encoders, listed as "Production ProRes" and "Production DNxHR", can output in a MOV container, new with this release. ProRes is most associated with Apple and, [...]

You're reading HandBrake 1.11 adds ProRes, DNxHR encoders and MOV output , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: News, App Updates, AV1, HandBrake, ProRes
Source: https://www.omgubuntu.co.uk/2026/03/handbrake-update-prores-encoding Mar 09, 2026, 04:20 AM
#94
Ubuntu News / Resources 1.10.2 fixes ‘impla...
Last post by tim - Mar 13, 2026, 06:09 PM
Resources 1.10.2 fixes 'implausible' Intel NPU values

Several Intel NPU fixes land in the latest update to Resources, which Ubuntu is making the default system monitor in 26.04 LTS. Resources is a GTK4/libadwaita tool that shows more system usage, processes and hardware details than GNOME System Monitor, which it is replacing as Ubuntu's default in the new LTS. The Resources v1.10 release at the start of February added (among other changes) support for AMD Neural Processing Units (NPUs). The app has supported usage for Intel NPUs since its v1.7.x release in late 2024. The v1.10.2 changelog resolves what is described as "implausible" usage values in Intel NPU [...]

You're reading Resources 1.10.2 fixes 'implausible' Intel NPU values , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: News, AI/ML, App Updates, Intel, Resources
Source: https://www.omgubuntu.co.uk/2026/03/resources-1-10-2-intel-npu-fixes Mar 08, 2026, 07:19 PM
#95
9to5Linux / TUXEDO InfinityBook Max 16 Li...
Last post by tim - Mar 07, 2026, 08:48 AM
TUXEDO InfinityBook Max 16 Linux Laptop Now Available with AMD Ryzen AI 300



TUXEDO Computers launches a new variant of the InfinityBook Max 16 Gen10 Linux-powered laptop with AMD Ryzen AI 300 processors.

The post TUXEDO InfinityBook Max 16 Linux Laptop Now Available with AMD Ryzen AI 300  appeared first on 9to5Linux  - do not reproduce this article without permission. This RSS feed is intended for readers, not scrapers.


Categories: Hardware, News, InfinityBook Max 16, Linux laptop, Linux notebook
Source: https://9to5linux.com/tuxedo-infinitybook-max-16-linux-laptop-now-available-with-amd-ryzen-ai-300 Mar 06, 2026, 03:36 PM
#96
9to5Linux / GNOME 50 Release Candidate Ar...
Last post by tim - Mar 07, 2026, 08:48 AM
GNOME 50 Release Candidate Arrives with HDR Screen Sharing Support



GNOME 50 Release Candidate (RC) is now available for public testing ahead of the final release on March 18th, 2026. Here's what's new!

The post GNOME 50 Release Candidate Arrives with HDR Screen Sharing Support  appeared first on 9to5Linux  - do not reproduce this article without permission. This RSS feed is intended for readers, not scrapers.


Categories: Desktops, News, desktop environment, GNOME, GNOME 50, GNOME desktop
Source: https://9to5linux.com/gnome-50-release-candidate-arrives-with-hdr-screen-sharing-support Mar 06, 2026, 07:55 AM
#97
9to5Linux / NVIDIA 595 Linux Graphics Dri...
Last post by tim - Mar 07, 2026, 08:48 AM
NVIDIA 595 Linux Graphics Driver Promises Wayland 1.20 Support, Beta Out Now



NVIDIA 595 graphics driver is now available for public beta testing with support for Wayland 1.20, DRI3 1.2, and other changes. Here's what to expect!

The post NVIDIA 595 Linux Graphics Driver Promises Wayland 1.20 Support, Beta Out Now  appeared first on 9to5Linux  - do not reproduce this article without permission. This RSS feed is intended for readers, not scrapers.


Categories: Drivers, News, graphics driver, Nvidia, NVIDIA 595, video driver
Source: https://9to5linux.com/nvidia-595-linux-graphics-driver-promises-wayland-1-20-support-beta-out-now Mar 05, 2026, 07:02 PM
#98
Ubuntu Blog / Sovereign clouds: enhanced da...
Last post by tim - Mar 07, 2026, 08:48 AM
Sovereign clouds: enhanced data security with confidential computing 

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud . However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle. 

In this blog, we cover the differences between data residency and data sovereignty, how confidential computing works to enhance the security of your data, and can support you in achieving digital sovereignty. 

Data residency is not data sovereignty.

Many people confuse knowing where your data is stored (data residency) with achieving data sovereignty. However, just because you know where your data is stored, and that it's protected while being stored, doesn't mean that you have data sovereignty. In other words,  it doesn't mean you have complete control over it.

Storage is only one state of data. Achieving true sovereignty in your systems means considering everywhere that plaintext exists: in memory during computation, in registers during execution, in GPU memory during inference, and in intermediate buffers during training. If those states are visible to the host – the underlying physical machine, or the hypervisor running the workloads – then your data protection depends entirely on operator behavior. Whether that's a public cloud operator, third party managed service provider, or your own IT department, you're not enforcing a boundary. You are hoping one holds.

Confidential computing closes that gap. It is a hardware-level capability that encrypts data while it is being processed, not just when it is stored on disk or moving across a network. The processor itself enforces isolation using what are called Trusted Execution Environments (TEEs): protected regions of memory that the hypervisor cannot inspect, the host operating system cannot read, and administrators cannot dump. 

This is what makes it structurally different from conventional cloud security. Disk encryption protects data at rest. TLS protects data in transit. Confidential computing protects data in use, the one state where, until recently, defenders had almost no tools. And for sovereign clouds, that is the state that matters most.

From identity-based trust to state-based trust

Traditional cloud security is anchored to identity. IAM policies, role separation, access logs, conditional access, all of it answers one question: who is requesting access?

Confidential computing introduces a different question: what is the state of the environment where data is being used?

A workload proves the hardware class it runs on, the firmware version, the boot chain integrity, the measurement of its own code, and whether debug capabilities are active. Secrets are released based on verified state, not organizational assurances. You are no longer asking whether you trust this operator. You are asking whether this execution environment satisfies your cryptographic conditions.

Control under privilege

Cloud systems are layered privilege machines. Firmware controls hardware. Hypervisors control guests. Operators control infrastructure. Providers control updates. Supply chains control binaries. To achieve data sovereignty, you need to ask a difficult question that cuts across all of them: what happens when the layer with privilege is not the layer you want to trust?

Without confidential computing, the answer is uncomfortable. You rely on contracts, governance frameworks, and organizational separation; mechanisms that constrain behavior, but cannot constrain capability. With confidential computing, the answer becomes structural: privilege does not automatically grant visibility.

TEEs encrypt memory in use and restrict host introspection. The hypervisor may schedule a workload, but it cannot read its memory. An administrator may control the host, but cannot dump secrets from the guest. Debug pathways are restricted or disabled at the silicon level.

This does not negate trust. It narrows it. And narrowing trust surfaces is the core engineering discipline behind any sovereign cloud that deserves the name.

Programmable sovereignty

The different levels of sovereignty – data, operational, and software, which we've discussed at greater length on our webpage  – are typically treated as static requirements. Data must stay here. Operators must be local. Legal control must be bounded by jurisdiction. Software must be accessible without lock-in.

Confidential computing makes both data and operational sovereignty programmable. Attestation policies can define which hardware generations are acceptable, which firmware versions are approved, which configurations are disallowed, and which geographic attestation roots are trusted. Those policies can evolve without re-architecting infrastructure.

This matters most where regulatory frameworks move faster than infrastructure lifecycles. Instead of redesigning systems to meet new requirements, you rotate attestation baselines. That agility is not a convenience; it is a strategic capability that most sovereign deployments do not yet appreciate.

Blast radius, not distrust

There is a persistent misunderstanding that confidential computing implies an adversarial relationship with operators. That framing is shallow. 

The real issue is blast radius. Even trusted operators make mistakes, get phished, inherit compromised dependencies, become subject to legal orders from foreign jurisdictions, and rotate personnel. Infrastructure systems cannot assume that privileged access will always align with national or organizational intent, not because operators are necessarily malicious, but because assuming perpetual alignment is an architectural error.

Confidential computing reduces what privileged access can see. That is risk minimization applied to the one attack surface sovereignty frameworks care most about: administrative and systemic pathways, not internet-facing exploits.

Sovereign AI without runtime protection is strategically exposed

As sovereign cloud strategies absorb AI workloads, national language models, public-sector analytics, and defense applications, the problem intensifies along every axis.

Foundation models represent intellectual capital, and inference pipelines process high-value inputs in real time. Without runtime protection, model weights can be extracted from host memory, training data is visible during processing, debug hooks become exfiltration vectors, and multi-tenant infrastructure becomes a leakage surface.

The more valuable the model, the less acceptable hypervisor visibility becomes. In sovereign AI, confidential computing is not an enhancement, but a necessity. Learn more on our webpage

The central role of open source in confidential computing

There is a dependency that is easy to overlook. Attestation proves that a workload matches a known measurement. But if you cannot audit the kernel, reproduce the build, verify the signing process, or inspect the virtualization stack, then the measurement proves very little. You have cryptographic evidence of an opaque system. That is not sovereignty.

Confidential computing becomes meaningful only when the measured components are themselves transparent and reproducible. Operating system integrity, supply-chain provenance, and verifiable builds are not peripheral concerns. They are the substrate on which attestation credibility rests. 

This is why open source is not ideological in sovereign cloud architectures, it is structural. Learn more about why open source is necessary to achieve a truly sovereign cloud in "Sovereign cloud: the essential guide for enterprises."  

Ubuntu powering the world's public and private confidential clouds

Confidential computing is a strategic investment area that Canonical has been building toward for years. Today, Ubuntu makes confidential computing  operational across both public cloud and on-premise enterprise environments. 

On major public cloud providers, including Azure, AWS, and Google Cloud, Ubuntu powers confidential virtual machines with first-class guest support for AMD SEV-SNP and Intel TDX, enabling hardware-isolated workloads without proprietary guest images. 

At the same time, Ubuntu provides the necessary host and hypervisor integration for enterprises deploying confidential computing on-prem, including kernel, QEMU/KVM, and virtualization stack support aligned with upstream TDX and SNP enablement. 

This dual capability is important: sovereign and regulated environments rarely operate in a single domain. They span public cloud and private infrastructure. Ubuntu's open, upstream implementation across both host and guest layers allows organizations to deploy confidential workloads consistently, without bifurcating their operating system strategy or relying on opaque vendor-specific stacks. Confidential computing is not a feature bolted onto Ubuntu; it is integrated into the core platform that enterprises already standardize on.

What confidential computing actually does

Confidential computing does three things for sovereign cloud architectures: 

  • It minimizes reliance on privileged infrastructure actors, 
  • It converts sovereignty requirements into cryptographic conditions, 
  • It makes assurance demonstrable rather than rhetorical.

It does not replace governance, remove the need for identity controls, solve application-layer vulnerabilities, or resolve geopolitical complexity. It does something narrower and more precise. Confidential computing enforces confidentiality at the only moment that truly matters: while computation is happening.

In cloud systems, computation is where data is most vulnerable. It is also where, until recently, defenders had the fewest tools. Confidential computing changes that. Not through policy, or through contract. Through architecture.

The question for every sovereign cloud strategy is whether you design around the reality that infrastructure privilege always exists, or whether you ignore it and hope governance holds.

Confidential computing is how you design around it.

Further resources:

Sovereign Cloud: the essential guide for enterprises

This guide will help you to understand key concepts, requirements, and options to build cloud sovereignty in your organization. 

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it's more like a game of chess: predicting your opponent's moves and making the game unwinnable for them. The best defense isn't a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn. Learn more about Ubuntu's security strategy in this blog. 

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences between data residency and data [...]


Categories: confidential computing, confidential VM, Security, security & compliance
Source: https://ubuntu.com//blog/sovereign-cloud-confidential-computing Mar 06, 2026, 01:55 PM
#99
Ubuntu News / Get Gmail alerts on Ubuntu wi...
Last post by tim - Mar 07, 2026, 08:48 AM
Get Gmail alerts on Ubuntu without a dedicated mail client

Pigeon Email Notifier is a GNOME Shell extension that does one thing: show a desktop notification when new mail arrives in your Gmail, Microsoft Outlook or IMAP webmail account. If you don't want to leave a webmail tab open in Firefox, the overhead of a desktop email app like Thunderbird, or your provider doesn't offer a desktop Linux app (like Fastmail and Proton Mail now do), Pigeon provides a set-and-forget way to still get new mail alerts. Desktop email notifiers have been around for a long time. I've written about many standalone tools, like Unity Mail, Popper and Mail Nag over [...]

You're reading Get Gmail alerts on Ubuntu without a dedicated mail client , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: News, email, GNOME Extensions
Source: https://www.omgubuntu.co.uk/2026/03/gnome-email-notifier-gmail-outlook Mar 07, 2026, 06:07 AM
#100
Ubuntu News / Ubuntu 26.04 LTS adds Snap an...
Last post by tim - Mar 07, 2026, 08:48 AM
Ubuntu 26.04 LTS adds Snap and web search to the Overview

Ubuntu 26.04 LTS ships with two new extensions installed and active by default, both adding new search capabilities to the GNOME Shell Overview. The first new extension is Web Search Provider. This lets you initiate a web search on Google straight from the GNOME Shell Overview. 'Initiate' is the important term here as search terms made in GNOME Shell are not sent anywhere directly. Before you raise an eyebrow: this is not a revival of the Shopping Lens furore. That saw local file and app searches typed in Ubuntu's then-Unity desktop piped off to third parties (anonymised, but still dodgy [...]

You're reading Ubuntu 26.04 LTS adds Snap and web search to the Overview , a blog post from OMG! Ubuntu . Do not reproduce elsewhere without permission.


Categories: News, GNOME Extensions, Ubuntu 26.04 LTS
Source: https://www.omgubuntu.co.uk/2026/03/ubuntu-2604-gnome-search-extensions Mar 06, 2026, 07:34 PM