Couchbase Mobile 2.0 Released
April 12, 2018

Couchbase announced Couchbase Mobile 2.0.

Available today, the latest release offers enterprise developers SQL queries, Full-Text Search, synchronization, and end-to-end security among other features to easily mobilize business applications to create exceptional customer experiences and a more effective workforce. Companies across a range of industries, including Becton Dickinson (BD), Tommy Hilfiger, and Ryanair rely on Couchbase Mobile to extend their Couchbase deployments seamlessly to the edge, powering a consistent user experience across all touchpoints.

Couchbase Mobile extends the Couchbase Data Platform to the edge, securely managing and seamlessly syncing data from any cloud to all edge devices. Using Couchbase Mobile, organizations can build offline-first mobile applications with guaranteed data availability, irrespective of network connectivity or speed. Built-in enterprise-grade security from the cloud to the edge helps safeguard data while a consistent programming model for building web and mobile apps simplifies development. And with the flexibility to add capacity at every tier, enterprises can easily scale up and down as demand fluctuates.

The platform includes:

- Couchbase Server, a distributed NoSQL database for managing data in any cloud

- Couchbase Lite, an embedded NoSQL database for managing data locally on the device

- Sync Gateway, a secure web gateway that orchestrates data synchronization between Couchbase Lite and Couchbase Server

Some of the new features and associated benefits in Couchbase Mobile 2.0 include:

- SQL query and full-text search: Couchbase Lite now brings the power of SQL to the edge, giving developers the ability to run queries on embedded JSON data. Additionally, new Full-Text Search capabilities enable simple word or text search in data stored in Couchbase Lite.

- Data change events: Developers can listen and react to data, and query change events to create a richer, more reactive, and more engaging app experience.

- Replication over WebSocket: By leveraging WebSocket -- a standard technology for real-time bi-directional point to point communication between client and server -- replication is more efficient as it eliminates continuously polling the servers.

- Automatic conflict resolution: With Couchbase Lite 2.0, data conflicts are detected and automatically resolved.

- On-device replicas: An on-device replica enables data recovery on the edge.

Ravi Mayuram, SVP of Engineering and CTO, Couchbase, said: “With Couchbase Mobile 2.0, we are bringing some very exciting new capabilities to the edge that parallels what we have on Couchbase Server. For the first time, SQL queries and Full-Text Search are available on a NoSQL database running on the edge. Additionally, we’ve made programming much easier through thread and type safe database APIs, as well as automatic conflict resolution.

The Latest

July 17, 2018

In my first blog in this series, I highlighted some of the main challenges teams face with trying to scale mainframe DevOps. To get past these hurdles, the key is to develop an incremental approach that enables teams to capture value along each step of the journey ...

July 16, 2018

The key to mainframe DevOps success is in quickly identifying and removing major bottlenecks in the application delivery lifecycle. Major challenges include collaboration between mainframe and distributed teams, lack of visibility into the impact of software changes, and limited resource flexibility with scaling out necessary testing initiatives. Now let's take a closer look at some of these key challenges and how IT departments can address them ...

July 11, 2018

How much are organizations investing in the shift to cloud native, how much is it getting them? ...

July 10, 2018

In the shift to cloud native, many organizations have adopted a configuration-as-code approach. This helps drive up application deployment velocity by letting developers and DevOps teams reconfigure their deployments as their needs arise. Other organizations, particularly the more regulated ones, still have security people owning these tools, but that creates increased pressure on the security organization to keep up. How much are organizations investing in this process, and how much is it getting them? ...

June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec ...

June 27, 2018

The popularity of social media platforms and applications is spurring enterprises to adopt "social business" models to better engage with employees and customers and improve collaboration, according to a new study published by ISG ...

June 25, 2018

The previous chapter in this WhiteHat Security series discussed Codebase as the first step of the Twelve-Factor App and defined a security best practice approach for ensuring a secure source control system. Considering the importance of applying security in a modern DevOps world, this next chapter examines the security component of step two of the Twelve-Factor methodology. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

Share this