Risk
9/17/2010
04:22 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Releases Instantiations Dev Tools For Free

Java developers are getting a gift from Google: Java development applications that used to cost several hundred dollars.

Top 15 Google Apps For Business
Top 15 Google Apps For Business
(click image for larger view and for full photo gallery)
Last month, Google acquired Instantiations, a maker of Java programming tools, for an undisclosed sum.

This month, Google is offering Instantiations' products for free. Bruce Johnson of the Google developer team made the announcement in a blog post on Thursday.

The newly free software includes: GWT Designer, Eclipse-based development tools that facilitate the creation of Ajax user interfaces in Google Web Toolkit; CodePro AnalytiX, a tool to enhance software code quality and security analysis; WindowBuilder Pro, a Java GUI design tool for a variety of frameworks such as Swing, SWT, GWT, RCP, and XWT UI; and WindowTester Pro, a tool for testing in Java client rich applications that utilize the SWT and Swing UI frameworks.

Previously, these software applications were fairly expensive. WindowBuilder Pro, for example, used to sell for $329; WindowTester Pro used to cost from $499 to $799; and CodePro AnalytiX started at $6,395.

Google's next step, said Johnson, will be to integrate these tools with the Google Plugin for Eclipse (GPE).

In another developer-oriented announcement, Google unveiled a redesign of golang.org, the official Web site of the Go programming language.

The renovated site now includes the Go Playground, an online tool that allows visitors to enter and execute Go code.

"We hope that this will give curious programmers an opportunity to try the language before installing it, and experienced Go users a convenient place in which to experiment," said Google engineer Andrew Gerrand in a blog post.

The Go programming language was introduced in November, 2009 and was the 16th most popular programming language during the first half of September, 2010, according to Tiobe's search-based index.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-4801
Published: 2014-12-18
Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.