Mender blog

Mender 2.2 released: Safely deploy at scale

27th Oct 2019

We are excited to release Mender 2.2!

Mender 2.2 improves support for large-scale deployments and security.

The key features of Mender 2.2 are covered below, and you can see the detailed items in the Mender 2.2.0 release notes.

Read the article

Delta updates, phased rollouts, schedule deployments and more with new Mender editions

21st Oct 2019

We are currently in the midst of gearing up and launching our new products and services at ELC Lyon next week on October 28th to 30th, and will be there to show you exciting demos of our new commercial features.

Commercial editions of Mender will soon get new value-add features! These include:

Delta updates: Save up to 70-90% bandwidth and make updates much faster Phased rollout: Gradua... Read the article

A whirlwind tour of the Mender client architecture using Rust

15th Oct 2019

This blog post will have a closer look at the architecture of the Mender client. I figured that one of the best ways of getting a birds-eye view of the client is to rewrite the core functionality from scratch. And what better language to rewrite existing functionality than Rust. Thus, in the spirit of Rust we are going to rewrite the existing and well tested functionality of the Mender client in t...

Read the article

Mender 2.2 beta: Yocto warrior and Raspberry Pi 4

10th Oct 2019

We are excited to release Mender 2.2 beta!

Mender 2.2 adds new hardware and OS support and contains performance and stability improvements.

The key features of Mender 2.2 beta are covered below, and you can see the detailed items in the Mender 2.2.0 beta release notes.

Read the article

4 ways to minimize IoT cybersecurity risks

26th Sep 2019

With close to 400k followers, the Twitter account named Internet of Shit is the epitome of the dire situation emerging as we stumble into a world of connected devices.

Governments around the world are waking up to a reality where the severity of vulnerable technologies grows with our increasing dependence on technology. While hackers enjoy everything from ransomware to stealing compute power for...

Read the article