Java inventor James Gosling building smart marine robots

Robots use satellite-based remote controlsto cross the wave-pitched seas

James Gosling, the inventor of the Java programming language when he worked at Sun Microsystems, finds the security framework for Java he designed still stands up after all these years. In fact he's using it today to design marine robots that can be sent across the ocean to gather weather data or carry out research projects.

"I'm using all the crypto APIs and the sandbox APIs and the Java DE [development environment] and NetBeans," says Gosling, now chief software architect at Liquid Robotics. Gosling, is helping design marine robots that use satellite-based remote controls (plus cellular signals when close to shore) to cross the wave-pitched seas, sometimes for months at a time, to do jobs like collect weather data or monitor pollution levels.

IN THE NEWS: Second Java zero-day found: Time to disable it, say experts

The programming for the robots is based on Java, and the robots are basically a "platform for sensors," says Gosling. The latest marine robot being completed is designed to be more aware about its environment so it can navigate more on its own without remote control or preprogramming. There's also work being done to optimize communications since satellite use can be expensive and bandwidth-intensive. He notes, "It's all Java code, a new generation of robots that's all Java on the inside."

The Java programming language that Gosling created, now in its seventh edition, has expanded its security structure but sticks to its basic principle of the security sandbox set of rules to ward off hostile code, while also offering ways to implement public-key infrastructure, authentication and access control mechanisms, among other security features.

Gosling said the Java sandbox was a core concept inspired by observing how Windows code years ago was shipped back and forth and the security problems he saw. "I spent a long time thinking about why these security problems were so bad," he recollects. He says the sandbox architecture today "works fine" and the high-level security policies and authentication and crypto remain "really solid." Many millions of software developers today make use of Java.

Gosling, who modestly attributes Java's success to the contributions of respected colleagues at Sun where he spent 26 years, left Sun just six weeks after it was acquired by Oracle in 2010 following what were some difficult business years at Sun.

At that time, the mighty Google -- which happened to be embroiled in a software patent lawsuit with Oracle, over the Java APIs no less -- came after Gosling, apparently hoping that hiring this legendary software developer would work some sort of coding magic there.

"Google is a funny company," recounts Gosling. "When you interview at Google, they don't tell you what the job is. You get hired for a pool and the reason they do it that way is they don't want outsiders learning their secrets in the interview process."

Gosling joined Google as "member of the technical staff," with the idea he would poke around for a while and see what happens.

"It was a 'without portfolio' kind of job," says Gosling, but sparks failed to fly and Gosling left Google after six months. He joined the Sunnyvale, Calif.-based startup Liquid Robotics founded by Bill Vass, a friend who'd been president and chief operating officer at Sun's federal subsidiary.

Gosling's major complaint about his current position? He doesn't have the fun of going to Hawaii as much as the mechanical engineers on staff where the marine robots are tested because the software programming he manages can usually be done remotely in Sunnyvale.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: emessmer@nww.com.

Read more about wide area network in Network World's Wide Area Network section.

Tags: James Gosling, Google, security, Sun Microsystems, java

Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Identity & Security Management

Identity and Security Management

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.