It’s been a real pleasure to work with Huawei — both for the first and the second time. Now, we wanted to go even further by bringing you another amazing Verified Step to make your life even easier. Introducing the Huawei AppGallery Connect Reports Step. ✨ Let’s see how can it help you!
Trace is our new mobile monitoring add-on that has been in public beta since late February. It is also available to you if you have a Bitrise account, so if you want to dive into it, here's where you should start.
In the latest episode of our podcast, we talked to Russell Stephens from Compass about building mobile infrastructure, the evolution from self-hosted Jenkins to the cloud, and streamlining CI processes.
Jenkins is the world’s most popular CI/CD software, but — for a number of reasons — sees teams increasingly switch to cloud CI. What happens to all those Jenkins experts when teams
On March 4, we joined 30+ organizations in their mission to improve the technology and processes related to shipping large-scale mobile apps as a part of the Mobile Native Foundation .
With the new App-Ray Step, you can scan your apps for vulnerabilities such as security issues, privacy breaches, and potential data leaks. Available on Bitrise now.
Releasing with speed and confidence is every mobile team’s dream. To help you on that journey, mobile release trains can introduce a quicker release model and faster mobile cycles — making distributed development teams, that work on different parts of an application, become more aligned — regardless of their size.
If you are familiar with Bitrise you probably already used the Script Step to do something in your CI workflow. There are multiple options for the language of your script, by default it is a bash script, but the description of the step also mentions Go, Ruby or Python. Although it does not mention Java or Kotlin, I will show you in the next few minutes how to do it!
Oversecured joins our rapidly growing partnership program as the first Verified Step focusing on app security. Scan your apps before they go to production, detect known vulnerabilities, and protect your user’s data from the comfort of your favorite CI/CD service.