Skip to main content
  1. Blog
  2. Article

Jorge O. Castro
on 23 February 2016

Juju Charmer Summit: Design For Success


This talk from Juju Charmer Summit 2015 provides a comprehensive introduction to the pieces that make Juju magic happen. We recommend that anyone interested in writing Charms or the process of charming watch this talk as, like Juju itself, it distills best practices into a repeatable formula for success. Topics covered in this video include the basics, the juju dictionary, charm structure, actions, configurations, and testing.

Happy charming!

Related posts


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...


Bertrand Boisseau
13 May 2026

Rethinking BYOD security: protecting data without trusting devices

Ubuntu Article

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a ...