Recent Posts by Engine Yard

How NoOps Improves Development Productivity and Operational Agility

A NoOps platform can be a benefit to application development teams and address challenges around improving productivity and operational agility.   
Read More

Announcing The New Engine Yard Kontainers

At Engine Yard we are on a continuous journey to provide you with tools to minimize your operational burden, moving you towards friction free NoOps application deployments.  Today we are pleased to share an exciting new capability which was one of the top asks from our...
Read More

Resources for Getting Started with Ruby on Rails

Ruby on Rails is now firmly in the mainstream. A steady stream of people have good reasons to want to use Rails but don’t know where to begin. The resource list below is a solid starting point. It includes tutorials, books, blogs, podcasts and many other educational...
Read More

10 Reasons to Attend Ruby Conf 2017

Engine Yard has been dedicated to being part of the Ruby community from the beginning. Being community members means being a part of great events, and Ruby Conf 2017 is no exception.
Read More

Programming Contest! And The Winners are...

Now that everyone’s CPU and GPU clusters have cooled down, we’re ready to announce the contest winners!
Read More

Engine Yard Contest Challenge Phrase And Dictionary

We know you’ve all been working diligently and waiting, so here it is!
Read More

Programming Contest! Win iPhone 3GS & $2,000 Cloud Credit

We’re kicking off a programming contest today that is sure to challenge even the most comp-sci heavy engineers out there, and we’re excited to see what you all come up with. With the difficulty of the challenge in mind, we’ve got some great prizes for the winner: an...
Read More

Getting Started With JRuby

In the wake of our recent announcement of JRuby support, we have a guest post from Charlie Nutter of the JRuby team on getting starting with JRuby:
Read More

Http Digest Auth: Vulnerability in Rails 2.3.1/2

If you are using Ruby on Rails 2.3.1 or 2.3.2, using http digest authentication and setting the username / password via hash, then you will be affected by this vulnerability. This vulnerability allows users to bypass http authentication without a valid password.
Read More
Subscribe to our Blog