Skip to main content
  1. Blog
  2. Article

Jane Silber
on 8 December 2010

Thanks and good luck to Matt Asay


Matt Asay joined Canonical in February this year and quickly proved instrumental in aligning strategic goals and operational activities. Unfortunately for us, Matt will be leaving Canonical December 17 for the lure of an early-stage start-up. While his time here has been relatively short, we all appreciate the positive impact he has had in many areas and I will personally be very sorry to see him go.

Matt is joining Strobe, an early stage start-up at the nexus of open source and the open web, much like Matt himself. He will be taking a senior business development position, and that opportunity provides an irresistible forum for him to exercise his skills in a customer-facing role at a small start-up.

While we will miss Matt, Canonical operations remain strong. We will recruit to replace Matt, hoping to find someone who carries on his love of Dilbert cartoons and The Smiths! We all wish Matt well in his new adventure.

Related posts


Canonical
16 March 2026

Canonical announces it will distribute NVIDIA DOCA-OFED in Ubuntu

AI Article

Today Canonical, the publishers of Ubuntu, announced that it will integrate and distribute the NVIDIA DOCA-OFED networking driver with Ubuntu. ...


Canonical
16 March 2026

Meet Canonical at NVIDIA GTC 2026: NVIDIA CUDA and NVIDIA Vera Rubin NVL72 support in Ubuntu 26.04 LTS

Ubuntu Article

Previewing at NVIDIA GTC 2026: NVIDIA CUDA support in Ubuntu 26.04 LTS, NVIDIA Vera Rubin NVL72 architecture support in Ubuntu 26.04, Canonical’s official Ubuntu image for NVIDIA Jetson Thor, upcoming support for NVIDIA DGX Station and NVIDIA DOCA-OFED, and NVIDIA RTX PRO 4500 support. NVIDIA GTC 2026 is here, bringing together the techno ...


Luci Stanescu
12 March 2026

AppArmor vulnerability fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs have not been assigned yet. All of the vulnerabilities require unprivileged local user access. The impact of these vulnerabilities ranges from denial of service to kernel memory information leak, rem ...