Skip to main content
  1. Blog
  2. Article

James Donner
on 22 December 2015

Juju Charmer Summit: Docker Lightning Talk


Ubuntu is the number one platform for Docker deployments by a wide margin. With Juju, deploying Docker is as easy as a visit to the charm store.

Join Canonical’s Charles Butler for a five minute lightning talk to learn about

  • What the Juju team are doing with Docker
  • The Juju Solutions community on Github
  • The charms.docker and layer-docker projects
  • The possibilities of layering with Juju.
  • Future plans with Docker and Juju

Want to see more fact-filled talks? Check out our Juju YouTube channel, or register for February’s upcoming summit in Belgium.

Happy charming!

Related posts


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...


Bertrand Boisseau
13 May 2026

Rethinking BYOD security: protecting data without trusting devices

Ubuntu Article

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a ...


Luci Stanescu
8 May 2026

Dirty Frag Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

Two local privilege escalation (LPE) vulnerabilities affecting the Linux kernel have been publicly disclosed on May 7, 2026. The vulnerabilities have been assigned the IDs CVE-2026-43284 and CVE-2026-43500 and are referred to as “Dirty Frag.” The affected components are Linux kernel modules. The first vulnerability impacts the modules tha ...