Skip to main content
  1. Blog
  2. Article

Canonical
on 21 November 2011

Five Golden Rules for a Successful Ubuntu Desktop Migration


So, you like the idea of deploying an Ubuntu desktop to all or some of your users. You like the way Ubuntu’s light-client model can give  your older desktop machines a new lease of life. You like the fact that Ubuntu is secure, portable, and easy to manage. Best of all, you like that it costs nothing to license, and comes with a host of enterprise-grade apps that cost nothing to license either.

Now it’s time to see how it works for you in the real world. To help you plan your migration, we’ve compiled our five golden rules for success. These are things we’ve learned from the hundreds of Ubuntu desktop migrations we’ve conducted for clients around the world – from the French National Police Force to the Supreme Court of India.

 

Download today and discover how to:

  • Plan effectively for maximum effect
  • Target the users ripe for migration
  • Identify the apps that save you money and hassle
  • Create the right management flows
  • Pilot your project to get it just right

Related posts


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...


Bertrand Boisseau
13 May 2026

Rethinking BYOD security: protecting data without trusting devices

Ubuntu Article

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a ...