Feeds

Google pours Java on code cloud

App Engine freed from Python

Providing a secure and efficient Helpdesk

Google has added the Java runtime to its App Engine, that (semi-)free service that lets you build and host web apps on Google's very own cloud distributed infrastructure.

When App Engine was first introduced, almost a year ago to the day, it stuck with Python, a favorite among code-happy Google Oompa Loompas. But after countless request from developers outside the Mountain View Chocolate Factory, the platform has now embraced Java as well.

"We wanted to give developers something that they could be ecstatic about, but we knew we would have to marry the simplicity of Google App Engine with the power and flexibility of the Java platform," Google engineers Don Schwarz and Toby Reyelts wrote in this evening's post to the official App Engine Blog. "We also wanted to leverage the App Engine infrastructure - and by extension Google's infrastructure - as much as possible, without giving up compatibility with existing Java standards and tools.

"And so that's what we did. App Engine now supports the standards that make Java tooling great."

According to Cnet, the service's new incarnation runs version 1.6 of the Java Virtual Machine (JVM). So, in theory, it can also handle code written in such languages as Ruby on Rails and JavaScript.

Where appropriate, Google has wrapped its App Engine APIs in such standards as the Java Servlet API, JDO and JPA, javax.cache, and javax.mail. And there's a secure sandbox "that's powerful enough to run your code safely on Google's servers, while being flexible enough for you to break abstractions at will."

But the company acknowledges that existing code may not run straightaway. "There is a vast amount of Java code out there, much of it written without consideration of sandboxing, and we can't test it all. We know that there will be some rough edges when it comes to compatibility, but we're looking forward to working with you to smooth those out."

Meanwhile, Google has made a few other tweaks to its year-old service. You can now grant access to data behind your firewall. You can set up so-called "cron jobs," tasks scheduled to operate at particular times. And you can import data from an existing database.

At the moment, there's only room for 10,000 eager Java heads on the new service. You can sign up here - if there's still space.

Even when Google expands the new App Engine to world+dog, it will be free. Up to a point. Google charges when you exceed certain resource thresholds. ®

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.