Google hands over control of Google Web Toolkit to steering committee
- 29 June, 2012 22:06
Google is yielding control of its GWT (Google Web Toolkit) for browser application development to a multi-party steering committee, a Google official said on Friday. The company also introduced a release candidate of GWT 2.5, featuring compiler optimizations.
With the GWT steering committee, Google goes from being a gatekeeper to a peer amongst equals, with the committee controlling the roadmap of GWT. "It will no longer be Google as a dictator," said Ray Cromwell, Google tech lead for GWT. He will serve as committee chairperson for the time being. Other companies represented on the committee include Vaadin, Sencha, and Red Hat, and other members include GWT advocates Thomas Broyer, Christian Goudreau, and Daniel Kurka. "We have to be responsive, and we have to think more about what other people [support]," in GWT, Cromwell said at the Google IO conference in San Francisco.
[ Google at its Google IO conference also made big splashes in the cloud computing and mobile realms. | Find out more about the latest new in software development by subscribing to InfoWorld's Developer World newsletter. ]
Google's handing over control of GWT to the committee is similar to when IBM relinquished control of the Eclipse open source tools project, which is now under the jurisdiction of the Eclipse Foundation, Cromwell acknowledged. "Eclipse is now more of a vibrant community than it was when only IBM controlled it."
GWT 2.5, the last Google-directed release of the toolkit, boasts a host of improvements. "Out of the box, with no changes to your code, you can just compile your application. You're going to get substantial code-size reduction," Cromwell said.
In addition to maintaining GWT, Google has been developing its Dart language, which shares a GWT goal of enabling structured Web programming, but Google is not replacing GWT with Dart anytime soon, Cromwell explained. Support for GWT will continue and developers should continue to use it, he said. He expects the GWT steering committee to ensure GWT has a healthy future. GWT was first released in 2006.
This article, "Google hands over control of Google Web Toolkit to steering committee," was originally published at InfoWorld.com. Follow the latest developments in business technology news and get a digest of the key stories each day in the InfoWorld Daily newsletter. For the latest developments in business technology news, follow InfoWorld.com on Twitter.
Read more about application development in InfoWorld's Application Development Channel.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- BYOD and Beyond - Implementing a Unified Access Solution
- Building Maturity and Experience in Successful Virtualisation Strategies
- Analyst Paper: Total Cost of Ownership
- Unlock the value of virtualisation with the IBM SmartCloud Foundation
- IDC Research: Leveraging the Benefits of Cloud Computing with Specialised Security
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Opinion: Why national e-health is not for everyone
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst for business growth, delivering a competitive advantage when creatively applied to established and emerging problems. Read more on what trends are accelerating the value of IT.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.