Feeds

Curl back with Web 2.0 punch

Style and substance

Beginner's guide to SSL certificates

Web 2.0 Expo Curl, the Rich internet programming language specialist, is re-launching into the North American market having succumbed to the post dotcom crash.

Curl is recruiting developers, sales and marketing staff, and expanding its marketing budget after the last North American push dried up with its VC funding.

Additionally, Curl has updated its Rich Internet Application Platform. Version 5.0 features drag-and-drop editing for menus, changes and diagrams, a profiler tool for analyzing application performance, and tooling to monitor http traffic.

Founded in 1998 and based on MIT research, Curl was purchased by Japan-based SCS Group for $1.5m and added to a roster of subsidiary properties that include VA Linux - also a high flyer during the dotcom boom.

Curl believes it can succeed this time around by targeting an AJAX and Adobe Flex crowd with a programming language that couples rich interactivity with simplified programming and enterprise-class scale. Curl uses object orientation, supports data sets larger than those provide by AJAX and Flex, and provides fast data access. Also featured are cross-browser compatibility and encryption.

A Curl spokesman told The Register that the company hopes to "get itself inserted into the conversation" when developers are considering AJAX or Flex.

That's important for Curl, as it serves customers in large manufacturing and finance running on large, distributed systems and sucking data from legacy sources. Since becoming a SCS subsiduary, Curl has ramped up 300 plus customers in Asia Pacific and Japan including giants Hitachi Displays, Nissan Diesel Motor Co and the Bank of Tokyo-Mitsubishi.

Curl hopes to make money with a licensing model charging per server and batches of user. Curl's integrated development environment and developer server are available for free to seed uptake, but the runtime server is $12,000 per server and first 20 users. Curl said its price is comparable to Adobe. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.