A technical introduction to the Snap Store Proxy

by Holly Hall on 24 June 2021

In the world of IoT, it is crucial to be fully in control of your devices. Over-the-air (OTA) updates are essential for a distributed set of devices. This must be carefully managed to ensure that an update is not pushed at a time where the device is active and operation should not be interrupted.

To enable this level of control, we have developed the Snap Store Proxy, an on-premise edge proxy to the general Snap Store that can do more than simply managing updates. To demonstrate some of these features, we are hosting a webinar to introduce you to the Snap Store Proxy.

When: June 30, 2021 | 16:00 UTC

Join myself (Holly Hall, Product Lead at Canonical) and Przemysław Suliga (Software Engineer at Canonical) to gain an understanding of the features and applications of the Snap Store Proxy, with a technical demonstration of how to set up, configure and use the proxy to control updates. We’ll start with the basics, learning about snaps and the Snap Store, and review some potential use cases of the proxy. Feel free to follow along and have a working Snap Store Proxy by the end of the session!

Watch the webinar here

Newsletter Signup

Related posts

Managing software in complex network environments: the Snap Store Proxy

As enterprises grapple with the evolving landscape of security threats, the need to safeguard internal networks from the broader internet is increasingly important. In environments with restricted internet access, it can be difficult to manage software updates in an easy, reliable way. When managing devices in the field, change management […]

Release management for snaps made simpler

Release management is the process of planning, scheduling, testing and deploying new versions of software. To make this process simpler for snap developers, we have released a new feature called progressive releases. Continue reading to understand what they are, why they are important and how you can use them in the Snap Store. What are […]

We wish you RISC-V holidays!

There are three types of computer users: the end user, the system administrator, and the involuntary system administrator. As it happens, everyone has found themselves in the last group at some point or another; you sit down to perform a task relevant to your needs or duties, but suddenly the machine does not work as […]