Feeds

Google renames developer groups to scare away punters

GTUGs become GDGs and no, they won't teach you Gmail

High performance access to file storage

Google has renamed its developers groups and says, through SpokesGooglers on both sides of the Pacific, that it has no particular reason for the change.

But the Chocolate Factory has let it be known that the old name, Google Technology User Groups (GTUGs), appealed to average non-coding punters.

“We’ve gotten lots of feedback from organizers that the 'Google Technology User Group' moniker has caused confusion as to who the audience for the group is," says says an FAQ about the change on the GTUG site. "For example, people show up expecting to learn how to use Gmail.”

The program has therefore been renamed "Google Developer Groups" (GDGs), which certainly sounds like just the kind of thing to keep scare non-coders away from developers and all their binary babbling.

The FAQ says nothing substantive will change, other than the name, although the GTUG directory at Gtugs.org will migrate to developers.google.com/groups.

But the FAQ also hints at future changes, to whit: “… we hope to give *a lot* more exposure to local chapters and local events. It will also evolve over time as a single place where you can look at your entire developer experience with Google, not just related to user groups.”

The change is not arbitrary. The FAQ says it was decided on after “... multiple Hangouts and IRC chat sessions...” so it is not as if GTUG organisers were forced to change.

But The Reg understands that GDG volunteers do have a bit of re-naming and re-branding work to do, with some retiring existing social media presences to fold them into the new developer site or Google+. There's also a spiffy new three-tiered logo for GDGs organisers will get busy adding to their sites.

There's a small GDG logo, a larger image and a GDG-specific logo too.

The new small logo for google developer groups

Those logos certainly look to have repellent power for non-techies. Just what they say about the obvious hunger for contact with real, live Googlers to talk about their product we'll leave for others to decide. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.