Couchbase Mobile 2.0 Released
April 12, 2018

Couchbase announced Couchbase Mobile 2.0.

Available today, the latest release offers enterprise developers SQL queries, Full-Text Search, synchronization, and end-to-end security among other features to easily mobilize business applications to create exceptional customer experiences and a more effective workforce. Companies across a range of industries, including Becton Dickinson (BD), Tommy Hilfiger, and Ryanair rely on Couchbase Mobile to extend their Couchbase deployments seamlessly to the edge, powering a consistent user experience across all touchpoints.

Couchbase Mobile extends the Couchbase Data Platform to the edge, securely managing and seamlessly syncing data from any cloud to all edge devices. Using Couchbase Mobile, organizations can build offline-first mobile applications with guaranteed data availability, irrespective of network connectivity or speed. Built-in enterprise-grade security from the cloud to the edge helps safeguard data while a consistent programming model for building web and mobile apps simplifies development. And with the flexibility to add capacity at every tier, enterprises can easily scale up and down as demand fluctuates.

The platform includes:

- Couchbase Server, a distributed NoSQL database for managing data in any cloud

- Couchbase Lite, an embedded NoSQL database for managing data locally on the device

- Sync Gateway, a secure web gateway that orchestrates data synchronization between Couchbase Lite and Couchbase Server

Some of the new features and associated benefits in Couchbase Mobile 2.0 include:

- SQL query and full-text search: Couchbase Lite now brings the power of SQL to the edge, giving developers the ability to run queries on embedded JSON data. Additionally, new Full-Text Search capabilities enable simple word or text search in data stored in Couchbase Lite.

- Data change events: Developers can listen and react to data, and query change events to create a richer, more reactive, and more engaging app experience.

- Replication over WebSocket: By leveraging WebSocket -- a standard technology for real-time bi-directional point to point communication between client and server -- replication is more efficient as it eliminates continuously polling the servers.

- Automatic conflict resolution: With Couchbase Lite 2.0, data conflicts are detected and automatically resolved.

- On-device replicas: An on-device replica enables data recovery on the edge.

Ravi Mayuram, SVP of Engineering and CTO, Couchbase, said: “With Couchbase Mobile 2.0, we are bringing some very exciting new capabilities to the edge that parallels what we have on Couchbase Server. For the first time, SQL queries and Full-Text Search are available on a NoSQL database running on the edge. Additionally, we’ve made programming much easier through thread and type safe database APIs, as well as automatic conflict resolution.

The Latest

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 13, 2018

"Our research provides compelling evidence that smart investments in technology, process, and culture drive profit, quality, and customer outcomes that are important for organizations to stay competitive and relevant -- both today and as we look to the future," said Dr. Nicole Forsgren, co-founder and CEO of DevOps Research and Assessment (DORA), referring to the organization's latest report Accelerate: State of DevOps 2018: Strategies for a New Economy ...

September 12, 2018

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 06, 2018

In evaluating 316 million incidents, it is clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major threat to business, according to Security Report for Web Applications (Q2 2018) from tCell ...

September 04, 2018

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 29, 2018

While everyone is convinced about the benefits of containers, to really know if you're making progress, you need to measure container performance using KPIs.These KPIs should shed light on how a DevOps team is faring in terms of important parameters like speed, quality, availability, and efficiency. Let's look at the specific KPIs to track for each of these broad categories ...

August 27, 2018

Protego Labs recently discovered that 98 percent of functions in serverless applications are at risk, with 16 percent considered "serious" ...

August 23, 2018

After another record year of breaches, The 2018 DevSecOps Community Survey found that 3 in 10 respondents suspected or verified breaches stemming from vulnerabilities in open source components — a 55% increase over 2017, and 121% increase since 2014 ...

Share this