Skip to main content
  1. Blog
  2. Article

Ellen Arnold
on 19 December 2014

StackStorm joins the Charm Partner Programme


StackStorm is the newest member of Canonical’s Charm Partner Programme.  StackStorm is an operations automation software that enables users to define and share operational patterns from events and triggers through to actions taken in response.

“Both Canonical and StackStorm share a common goal in helping to alleviate common pain points for our end users, enabling them to focus more of their attention on delivering solutions.  Together we can do this more effectively,” says Milan Vaclavik, who leads business development for cloud infrastructure ISVs at Canonical.

Evan Powell, CEO of StackStorm says; “We’re excited about working with Canonical to assist their customers in the automation of today’s increasingly complex and fast moving environments.”

Canonical’s Charm Partner Programme lets solution providers make best use of Canonical’s cloud orchestration tool, Juju, enabling instant integration, scaling at the click of a button, simple to share blueprint deployments and an easy way to deliver solutions in minutes.

Related posts


Canonical
16 March 2026

Canonical announces it will distribute NVIDIA DOCA-OFED in Ubuntu

AI Article

Today Canonical, the publishers of Ubuntu, announced that it will integrate and distribute the NVIDIA DOCA-OFED networking driver with Ubuntu. ...


Canonical
16 March 2026

Meet Canonical at NVIDIA GTC 2026

Ubuntu Article

Previewing at the event: NVIDIA CUDA support in Ubuntu 26.04 LTS, NVIDIA Vera Rubin NVL72 architecture support in Ubuntu 26.04 LTS, Canonical’s official Ubuntu image for NVIDIA Jetson Thor, upcoming support for NVIDIA DGX Station and NVIDIA DOCA-OFED, and NVIDIA RTX PRO 4500 support. NVIDIA GTC 2026 is here, bringing together the technolo ...


Luci Stanescu
12 March 2026

AppArmor vulnerability fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs have not been assigned yet. All of the vulnerabilities require unprivileged local user access. The impact of these vulnerabilities ranges from denial of service to kernel memory information leak, rem ...