Solved

Can you please elaborate on Java vs XULRunner in creating GUI?

Posted on 2013-05-15
5
436 Views
Last Modified: 2013-05-22
Hi,
I have an architectural question.

I am trying to write a desktop application. In order to do that, I will use Java. But my of my colleagues insist that we should use XULRunner. I am having hard time to convince him why we should not use XULRunner.

The main reason for me is it is a technical experimentation and we can find someone who knows java more easily when it come to hiring in the future.

But I need more technical reasons. Can you please compare XULRunner vs Java to write an application?

What are the disadvantages of XULRunner over Java?

The requirements are roughly like this:

We need:
-file access permissions
-to run certain CLI commands from the UI.
- ability to execute CLI in the context of IDE. IDE should be able to capture certain context information such as file list from the database


Can you please elaborate on this?
0
Comment
Question by:Tolgar
  • 2
  • 2
5 Comments
 
LVL 21

Expert Comment

by:Amitkumar Panchal
ID: 39170319
0
 
LVL 21

Expert Comment

by:Amitkumar Panchal
ID: 39170324
also refer https://developer.mozilla.org/en/docs/XULRunner_FAQ, you will get some counter arguments for XULRunner
0
 

Author Comment

by:Tolgar
ID: 39171247
I don't see any statement that tells the disadvantages of XULRunner over Java.

Are there any significant technical disadvantages?
0
 

Author Comment

by:Tolgar
ID: 39171254
Such as: how is debugging in XULRunner? Is it as easy as Java debugger in Eclipse or in Netbeans?
0
 
LVL 12

Accepted Solution

by:
basav_com earned 500 total points
ID: 39172253
Here are some thoughts : http://adblockplus.org/blog/xulrunner-in-large-projects-part-2-why-xulrunner-isn-t-like-java

And at the sametime, login to a job portal and search for job openings based on 'Java' and 'XULRunner'. The results itself will speak.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction This article is the first of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article explains our test automation goals. Then rationale is given for the tools we use to a…
Many times as a report developer I've been asked to display normalized data such as three rows with values Jack, Joe, and Bob as a single comma-separated string such as 'Jack, Joe, Bob', and vice versa.  Here's how to do it. 
This video teaches viewers about errors in exception handling.
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now