Skip to main content
  1. Blog
  2. Article

James Donner
on 22 September 2015

Big Data Contest at Strata + Hadoop World


Strata + Hadoop World New York City is going to be a big week for big data. Canonical are proud to be exabyte sponsors for the upcoming event.

If you’re coming to Strata + Hadoop World, don’t forget to visit our booth and discover the wonders of Juju. Juju is our service modelling tool that will let you build entire cloud environments in just a couple of clicks. In fact, you can see how easy it is to use by testing the demo in your web browser.

Juju opens endless potential for configurations. To demonstrate this, we’ll be hosting a Big Data Contest during Strata + Hadoop World. Come to our designated pod at our booth and create a solution for Big Data Architectures using the Juju GUI. Once you’ve submitted it as a bundle and outlined the documentation, you’ll be entered into the competition. We’ll be judging the solutions based on complexity, problem solving, and real use application. If your solution is chosen, we have some exciting rewards for the winners.

If you’re in top 3, you’ll get to pick between a Bose Soundlink Speaker, a Parrot Rolling Spider, or an Intel Compute Stick Ubuntu Edition. And the 3 next will each get a Xiaomi Mi Band.

We hope to see you at Strata + Hadoop World, and we can’t wait to see what creative solutions you can imagine. When it comes to big data, think big!

Related posts


Massimiliano Gori
30 March 2026

How to Harden Ubuntu SSH: From static keys to cloud identity

Cloud and server Article

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, ...


Lech Sandecki
27 March 2026

The “scanner report has to be green” trap 

Security Article

Stability, backports, and hidden risks of the bleeding edge In the modern DevSecOps world, CISOs are constantly looking for signals in the noise, and the outputs of security scanners often carry a lot of weight. A security scan that returns a “zero CVE” report often unlocks promotion to production; a single red flag can block ...


Massimiliano Gori
27 March 2026

Modern Linux identity management: from local auth to the cloud with Ubuntu

Cloud and server Article

The modern enterprise operates in a hybrid world where on-premises infrastructure coexists with cloud services, and security threats evolve daily. IT administrators are tasked with a difficult balancing act: maintaining traditional local workflows while managing the inevitable shift toward cloud-native architectures. Identity has emerged ...