Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Jane Silber
on 21 January 2013

Ubuntu helped set the stage for today's inauguration


Today’s inauguration of Barack Obama to his second term provides a good opportunity to look back at last year’s campaign and appreciate it in a bit more detail. We’ll skip discussion of the adverts, polls, photo ops, sound bites, political theatre and even the much appreciated informed debate on the issues, and focus instead on the interesting stuff – the IT infrastructure that powers something as dynamic as a presidential campaign. You can imagine the demands placed on such an infrastructure – scalability, reliability, cost effectiveness, manageability, openness, cloud. Once you have those requirements in mind, the clear choice for meeting those demands is Ubuntu. And so it’s no surprise that the Obama campaign reached the same conclusion.  We recently spoke with Harper Reed, the CTO of the Obama campaign, about the challenges he faced and solutions he and his team put in place during the campaign. We’ve published that piece in honour of today’s inauguration; you can find it on our new Insights blog.

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...