Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

Ellen Arnold
on 21 February 2016

Charm Partner Programme


If you’re an ISV focused on the cloud or big data, you’ll know how difficult it can sometimes be for your customers to realise the full value of your software. Juju, the award-winning application modelling tool from Canonical, automates and accelerates the deployment, scaling and integration of distributed applications in virtually any public or private cloud. It also works on bare-metal. By creating a Juju Charm for your software, you can make it easy for administrators and DevOps teams to integrate it into hundreds of other solutions. And the Charm Partner Programme (CPP), is the best way to accomplish this.

For more details, have a look at the Charm Partner Programme Datasheet.

Related posts


Canonical
30 September 2025

Canonical achieves ISO 27001 certification

Canonical announcements Article

The certification demonstrates alignment with cybersecurity standards that will further safeguard open source products and services for use in the most demanding enterprise environments. Canonical is proud to announce it has achieved the ISO/IEC 27001 certification for its Information Security Management System (ISMS), following an extens ...


Jehudi
29 September 2025

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

Cloud and server Article

Ubuntu now supports Azure’s Metadata Security Protocol (MSP), raising the baseline for VM security on Azure. MSP locks down IMDS and WireServer behind HMAC-signed, identity-aware requests enforced by the azure-proxy-agent (Canonical’s integration of Microsoft’s GPA) using eBPF interception and per-endpoint allowlists. It must be enabled f ...


Stephanie Domas
24 September 2025

Beyond ‘whack-a-mole’ and insecticide

Ubuntu Article

Designing a new, robust, sustainable, and truly holistic approach to cybersecurity Talk to any cybersecurity expert or IT security manager, and they’ll tell you they’re sick of alerts and issues. For a while now, the industry has slowly been realizing that there’s a better way to improve cybersecurity and resolve security issues in IT wit ...