Feeds

SpringSource buys Groovy and Grails specialist

Java meets dynamic languages

Internet Security Threat Report 2014

SpringSource hopes to attract Java developers in the enterprise and dynamic languages fans with its acquisition of Groovy and Grails specialist G2One.

The company is today expected to announce that it's buying G2One's team of six experts for an undisclosed package comprising cash and stock. G21 may be small but customers included social network LinkedIn and UK TV broadcasting giant BskyB, who've built back-ends and content management systems on Grails for online users.

This is SpringSource's second acquisition this year, following Apache services company Covalent, and it confirms our earlier report.

SpringSource plans to integrate Grails with dm Server, the company's OSGi-based open-source Java server that uses the Spring Framework and launched this year. It also plans to "build value ads" around Grails and Groovy for enterprise customers in areas such as application management systems and the SpringSource tools suite. There's no timeframe for either, but SpringSource plans to deliver Grails support ahead of these.

Rod Johnson, SpringSource chief executive, told The Reg he believes SpringSource can appeal to enterprise users who want to work with dynamic languages and attract those using dynamic languages who want to move into the enterprise but who are new to the Java platform.

Johnson said Groovy would let enterprise programmers re-use their existing Java skills while Groovy programmers can tap underlying power of Java. Groovy is able to access Java class libraries and the Spring container, which is used in the dm Server and can run on the Java virtual machine (JVM).

Much of the dynamic-languages hype has centered on Ruby on Rails, which has eclipsed Groovy. Johnson pointed to Ruby on Rails' continued challenges in scalability and in dealing with complexity issues, such as object-relational mapping as hurdles to greater use in the enterprise. ®

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.