Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Amrisha Prashar
on 4 February 2016

#UbuntuAtMWC Competition


We’re really excited about MWC this year and can’t wait to showcase the various demos across Cloud and Devices!

For those of you not going we’d love to offer you the chance to come and join us and see what we have on display – as our presence is even bigger and better than last year.

To win tickets to MWC we’d like you to tell us or show us why you want to see Ubuntu at MWC in a tweet! Feel free to be as creative as possible with text, images, GIFs or even videos and add the hashtag #UbuntuAtMWC so we can track your awesome entries. The competition starts on 4th Feb (17:00 GMT) and finishes just before the stroke of midnight on Valentines day – 14th Feb (23:55 GMT.) Our creative team will judge the entries based on originality and select three winners where we’ll contact you via Twitter.

Happy creating and we can’t wait for your entries!

Terms and Conditions #UbuntuAtMWC

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...