Skip to main content
  1. Blog
  2. Article

Canonical
on 11 March 2015

Architecting OpenStack for enterprise reality



With OpenStack becoming more and more popular as a cloud-building technology for enterprises, companies are asking themselves several important questions. How viable is OpenStack as an enterprise platform? Is it possible (and feasible) to integrate it with existing virtualisation infrastructure, e.g. vSphere from VMware? Is there a business case for such integration, and what are the risks and challenges associated with it? Finally, how do they best utilise OpenStack: is the “vanilla” architecture always the best approach, or is there a case for swapping out certain components for third-party tools?

Gigaom analyst Paul Miller looks at these questions and more in this report sponsored by Canonical. For a more in-depth look at integrating vSphere and OpenStack, you may also want to read this whitepaper.

Download eBook

Related posts


Miguel Divo
22 May 2026

Decoding design: How design and engineering thrive together in open source

Design Design

Open source thrives on engineering-driven processes. Fast feedback loops, terminal tools, Git workflows: they’re the lifeblood of how we build software in the open. But for software to truly excel, we need to create user experiences that empower people to use them. I wanted to bring this conversation into the spotlight as part of Canonica ...


Abdelrahman Hosny
21 May 2026

Developing web apps with local LLM inference

AI Article

I’ve yet to meet a developer that enjoys working with metered AI APIs. The need to pay for every API call in development works in direct opposition to the ethos of rapid iteration, and it’s easy for the costs to get out of hand. That’s why Canonical has created a different approach to building AI-powered ...


Luci Stanescu
21 May 2026

PinTheft Linux kernel vulnerability mitigation

Ubuntu Article

A local privilege escalation (LPE) security vulnerability in the Linux kernel, codename “PinTheft,” was publicly disclosed on May 19, 2026. The vulnerability was fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published along with public disclosure. The vulnerability does not have a CVE ID assigned at the moment; o ...