Feeds

Echo2 versus GWT

Another toolkit that hides AJAX's implementation details

Secure remote control for conventional and virtual desktops

Comparison with GWT

Echo is already an extremely interesting framework and the adoption of AJAX within Echo2 only improves its viability. However, in doing so it brings an obvious comparison with the AJAX based Google Web Toolkit (or GWT). In this section, we provide a comparison of the two approaches.

Java to AJAX frameworks

Both Echo2 and the GWT are frameworks that allow a developer to create a client within a purely Java world and then to deploy them to web clients supported by AJAX technologies.

Client-side or server-side

However, although both GWT and Echo2 rely on the use of AJAX, their approaches are quite distinct. GWT employs a Java-to-JavaScript translator that takes the developed Java code and translates it completely into a rich-client application using AJAX based technologies.

In contrast, Echo2 dynamically generates the client side elements on demand with all user interaction involving client-to-server communication. Both approaches work, but Echo results in more client-to-server communications, while GWT involves generating a completely new client - that will need testing just as much as the development version may have required testing.

In addition, with Echo2, none of the GUI logic resides in the client and only the current state of the GUI is sent to the client; while with GWT all the client GUI elements reside on the client. Note, in neither case does this limit the backend Java resources (or other resources) that the GUI accesses.

Open source or not

Echo2 is fully Open Source, and is distributed under the terms of the Mozilla Public License (or, if preferred, the GNU LGPL License). Thus, the code is freely available and you can modify, extend it, and work with it as required. In addition, a commercial company and a group of dedicated developers worldwide support it.

On the other hand, the GWT is not fully open source - some of its aspects are open source and others aren't. Notably, the Java-to-JavaScript cross-compiler is proprietary, binary-only software, although Google supports the GWT, of course.

Extensibility

Echo is easily extendable and once a new Echo2 component has been created, it can be used by everyone, without any need for others to learn the internals of Echo2. In contrast, developing new GWT widgets isn't as straightforward.

Summary

From my point of view, both Echo2 and GWT show the way forward in developing sophisticated web GUI applications using Java. At present, they have taken somewhat different approaches to the same problem, but which is better is rather a matter of opinion.

Personally, I would tend to consider using Echo2 if the application was based on an intranet (where its inherent client-server communication overhead won't matter much); but would probably consider GWT for an internet-based application (due to its greater support for a rich-client delivery platform). ®

References

The Echo2 Forum is here.
The Eclipse Plug-in for Echo2 is here.
Some Echo2 demos can be found here.

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.