Feeds

Google's Inventor gets short shrift

Creating mobile apps isn't Lego, you know

Internet Security Threat Report 2014

Veteran tech watcher David Pogue has taken a look at Google's new building-block based development environment for Android, and he's not impressed.

The Android App Inventor follows a long line of breakthrough environments that promise to simplify application development to a series of mouse clicks. Unfortunately it seems that the App Inventor is no better than its predecessors at allowing those without any programming skills to write programs, and entirely failed to turn David Pogue into a mobile app developer.

"It’s extremely unlikely that a nonprogrammer could actually invent anything with App Inventor without the assistance of a teacher or an experienced friend, or hours poring through the App Inventor message boards" said Pogue in his review of the beta published by the NY Times. That was one of his more restrained assaults on App Inventor, which is a shame as it looks very pretty:

App Inventor is on closed beta at the moment: we've asked for an invitation and will give you a better look when we get a chance. The environment should be familiar to anyone who's used a "fourth generation" programming language that tries to use clicks for everything, but ultimately leaves you editing code to make things work.

In App Inventor those lumps of code are colour-coded to fit together - but ultimately deciding which block to use, and where to put it, is no more difficult than typing stuff.

We've used a fair range of such graphical tools, and only been really impressed by the Lego Mindstorms environment - which has the same genesis as App Inventor (both were born out of MIT projects). But while Mindstorms benefits from a very limited range of capabilities (turn motor on, turn motor off, listen to sensor, wait), App Inventor has to allow for dozens of different hardware platforms and thousands of capabilities.

Pogue spent a day failing entirely to create a single working application, or even complete the tutorials. He admits that many of his problems were down to the beta nature of the platform, but others can only be attributed to the complexity of programming itself - something that can't be hidden behind colour-coded blocks. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.