Skip to main content
  1. Blog
  2. Article

Canonical
on 21 November 2011

Five Golden Rules for a Successful Ubuntu Desktop Migration


So, you like the idea of deploying an Ubuntu desktop to all or some of your users. You like the way Ubuntu’s light-client model can give  your older desktop machines a new lease of life. You like the fact that Ubuntu is secure, portable, and easy to manage. Best of all, you like that it costs nothing to license, and comes with a host of enterprise-grade apps that cost nothing to license either.

Now it’s time to see how it works for you in the real world. To help you plan your migration, we’ve compiled our five golden rules for success. These are things we’ve learned from the hundreds of Ubuntu desktop migrations we’ve conducted for clients around the world – from the French National Police Force to the Supreme Court of India.

 

Download today and discover how to:

  • Plan effectively for maximum effect
  • Target the users ripe for migration
  • Identify the apps that save you money and hassle
  • Create the right management flows
  • Pilot your project to get it just right

Related posts


Canonical
16 March 2026

Canonical announces it will distribute NVIDIA DOCA-OFED in Ubuntu

AI Article

Today Canonical, the publishers of Ubuntu, announced that it will integrate and distribute the NVIDIA DOCA-OFED networking driver with Ubuntu. ...


Canonical
16 March 2026

Meet Canonical at NVIDIA GTC 2026: NVIDIA CUDA and NVIDIA Vera Rubin NVL72 support in Ubuntu 26.04 LTS

Ubuntu Article

Previewing at NVIDIA GTC 2026: NVIDIA CUDA support in Ubuntu 26.04 LTS, NVIDIA Vera Rubin NVL72 architecture support in Ubuntu 26.04, Canonical’s official Ubuntu image for NVIDIA Jetson Thor, upcoming support for NVIDIA DGX Station and NVIDIA DOCA-OFED, and NVIDIA RTX PRO 4500 support. NVIDIA GTC 2026 is here, bringing together the techno ...


Luci Stanescu
12 March 2026

AppArmor vulnerability fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs have not been assigned yet. All of the vulnerabilities require unprivileged local user access. The impact of these vulnerabilities ranges from denial of service to kernel memory information leak, rem ...