Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Ellen Arnold
on 19 December 2014

StackStorm joins the Charm Partner Programme


StackStorm is the newest member of Canonical’s Charm Partner Programme.  StackStorm is an operations automation software that enables users to define and share operational patterns from events and triggers through to actions taken in response.

“Both Canonical and StackStorm share a common goal in helping to alleviate common pain points for our end users, enabling them to focus more of their attention on delivering solutions.  Together we can do this more effectively,” says Milan Vaclavik, who leads business development for cloud infrastructure ISVs at Canonical.

Evan Powell, CEO of StackStorm says; “We’re excited about working with Canonical to assist their customers in the automation of today’s increasingly complex and fast moving environments.”

Canonical’s Charm Partner Programme lets solution providers make best use of Canonical’s cloud orchestration tool, Juju, enabling instant integration, scaling at the click of a button, simple to share blueprint deployments and an easy way to deliver solutions in minutes.

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...