{"id":35582,"date":"2020-06-18T06:05:07","date_gmt":"2020-06-18T06:05:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/"},"modified":"2020-06-18T06:05:07","modified_gmt":"2020-06-18T06:05:07","slug":"ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/","title":{"rendered":"Ah lovely, here&#8217;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them"},"content":{"rendered":"<div readability=\"32\"><img decoding=\"async\" class=\"article_img\" alt=\"Raspberry Pi active cooling\" srcset=\"https:\/\/regmedia.co.uk\/2017\/10\/18\/rpi_with_active_cooling.jpg?x=396&amp;y=198&amp;crop=1 396w, https:\/\/regmedia.co.uk\/2017\/10\/18\/rpi_with_active_cooling.jpg?x=478&amp;y=239&amp;crop=1 478w, https:\/\/regmedia.co.uk\/2017\/10\/18\/rpi_with_active_cooling.jpg?x=648&amp;y=324&amp;crop=1 648w\" sizes=\"(max-width: 409px) 396px, (max-width: 649px) 478px, 478px\" src=\"https:\/\/regmedia.co.uk\/2017\/10\/18\/rpi_with_active_cooling.jpg?x=648&amp;y=324&amp;crop=1\"><\/p>\n<p>Raspberry Pi is the primary target for Ubuntu applicances<\/p>\n<\/div>\n<div id=\"body\" readability=\"112.97633643943\">\n<p>Ubuntu has launched its Appliance Portfolio, an initiative designed to enable secure smart devices linked to cloud services. All Ubuntu appliances are &#8220;free to download and install&#8221; but may include an up-sell to paid-for services.<\/p>\n<p>The idea of the <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/blog\/the-ubuntu-appliance-portfolio\" rel=\"noopener noreferrer\">Ubuntu Appliance Portfolio<\/a> is to \u201cenable secure, self-healing, single-purpose devices,\u201d according to Canonical product manager Rhys Davies. You could probably build this software yourself by hand, though the appliances are supposed to be convenient self-maintaining packages of programs to save you the bother.<\/p>\n<p>An \u201cappliance\u201d is a system disk image for a Intel NUC PC or a Raspberry Pi, based on <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/core\" rel=\"noopener noreferrer\">Ubuntu Core<\/a>, a stripped-down variant of the popular Linux distro. Once installed, an appliance requires configuration on first startup, after which it is meant to be self-maintaining, with a daily check for updates.<\/p>\n<p>There is a built-in app store for adding features, based on the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/06\/02\/linux_mint_team_snap\/\" rel=\"noopener noreferrer\">controversial<\/a> snap packaging format, and snap is also used for the applications pre-installed in each image.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/07\/24\/5g_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"5G\"><\/p>\n<h2 title=\"Canonical drags the telco into the 21st century\">BT adopts Ubuntu OpenStack as core brains for its 5G, fibre-to-the-premises rollout<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2019\/07\/24\/bt_adopts_openstack_5g\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Currently your choice of Ubuntu appliances is limited to five devices. These are openHAB, an open source smart home solution which you can find <a target=\"_blank\" href=\"https:\/\/github.com\/openhab\" rel=\"noopener noreferrer\">on GitHub<\/a>; Plex which is a well-known media server; NextCloud which is a system for a \u201cprivate cloud at home\u201d, in this case meaning a simple collaboration platform; Mosquitto which in contrast to the other offerings is an application service aimed at developers, an <a target=\"_blank\" href=\"https:\/\/mosquitto.org\/\" rel=\"noopener noreferrer\">open source message broker<\/a> managed by the Eclipse Foundation; and AdGuard which is a security device.<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2020\/06\/17\/openhab.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/06\/17\/openhab.png?x=648&amp;y=403&amp;infer_y=1\" alt=\"A screen from openHAB, an open source smart home solution\" title=\"A screen from openHAB, an open source smart home solution\" height=\"403\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">A screen from openHAB, an open source smart home solution<\/p>\n<\/div>\n<p>That is not much to launch on, and most of these offerings are already available from their respective web sites as Pi images, so what is distinctive about the new Ubuntu offering? The main theme is that a curated range of images should reduce the chance of bad things happening with your IoT setup.<\/p>\n<p>Canonical says appliances will \u201cmeet consistent criteria for security, privacy, maintenance and operations.\u201d These criteria include secure boot protocols, the snap application sandboxing and transactional updates, and full disk encryption.<\/p>\n<p>In an enterprise context, there is the possibility of of a local corporate code store. But it does appear that Canonical will permit closed-source software in appliances, since it <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/appliance\/about\" rel=\"noopener noreferrer\">states<\/a> that \u201ccommercial software appliances reuse the same mechanisms\u201d as open source appliances; but the level of scrutiny cannot be the same.<\/p>\n<p>How are Appliance images vetted though? Canonical has three categories of device. Certified appliances have \u201ccontinuous testing by Canonical on all certified hardware.\u201d Maintained simply means \u201ca commitment from the appliance maintainers to update the underlying snaps for a declared period\u201d and to do their own testing, and Experimental means no commitment at all.<\/p>\n<p>What this means is that only the \u201cCertified\u201d devices come with meaningful reassurance. Even a certified device could have a commitment to support for only five years after the release date of the underlying version of Ubuntu Core. That means you could have a certified appliance based on Ubuntu Core 18 and it might only be kept updated until 2023 (though the OS itself has updates at least until 2028).<\/p>\n<p>A disappointment is that currently only Intel NUC devices are <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/appliance\/hardware\" rel=\"noopener noreferrer\">listed<\/a> as certified hardware on the PC side. That said, Canonical lists Dell, Lenovo, HP and component supplier Avnet as \u201cappliance hardware partners,\u201d suggesting that the list might grow. Diverse hardware and the appliance concept do not go together though, which is another reason why the Pi is the key target here.<\/p>\n<p>Will Canonical win enough momentum for its Appliance initiative to have long-term value? That is the question; and a <a target=\"_blank\" href=\"https:\/\/discourse.ubuntu.com\/c\/appliance\" rel=\"noopener noreferrer\">moribund community forum<\/a> is not a good start &#8211; zero replies to three thread topics at the time of writing. Still, the official launch was only yesterday so that could change.\u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.com\/tl\/1940\/-8722\/ransomware-has-gone-nuclear?td=wptl1940\">Ransomware has gone nuclear<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/06\/18\/ubuntu_raspberry_pi\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choose between five options Ubuntu has launched its Appliance Portfolio, an initiative designed to enable secure smart devices linked to cloud services. All Ubuntu appliances are &#8220;free to download and install&#8221; but may include an up-sell to paid-for services.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35583,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-35582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ah lovely, here&#039;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ah lovely, here&#039;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T06:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ah lovely, here&#8217;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them\",\"datePublished\":\"2020-06-18T06:05:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/\",\"name\":\"Ah lovely, here's something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg\",\"datePublished\":\"2020-06-18T06:05:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg\",\"width\":648,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ah lovely, here&#8217;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ah lovely, here's something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/","og_locale":"en_US","og_type":"article","og_title":"Ah lovely, here's something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-18T06:05:07+00:00","og_image":[{"width":648,"height":324,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ah lovely, here&#8217;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them","datePublished":"2020-06-18T06:05:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/","url":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/","name":"Ah lovely, here's something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg","datePublished":"2020-06-18T06:05:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them.jpg","width":648,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ah-lovely-heres-something-you-can-do-with-those-raspberry-pis-nuc-pcs-in-the-bottom-of-the-drawer-run-ubuntu-appliances-on-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ah lovely, here&#8217;s something you can do with those Raspberry Pis, NUC PCs in the bottom of the drawer: Run Ubuntu Appliances on them"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35582"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35582\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35583"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}