My bud Matt Raible blogged about reading a Scala book and I mentioned Stuart Holloway's "Programming Clojure". Matt replied "I like Scala and Groovy and see no compelling reason to learn Clojure. Am I missing something?"

Good question. Eric Lavigne said a few things about Clojure that caught my attention:

"My knowledge of Groovy and Scala are very limited, but here are my impressions relative to Clojure.

Scala seems like a good programming language. Its static typing reduces its flexibility compared to Clojure, but may still be a good deal because it helps with catching errors more quickly. Scala also has been around longer than Clojure, and has used that time to develop more sophisticated libraries than are available for Clojure right now. So why is Clojure still worth learning? Scala gets much of its flexibility from having a lot of features built into the language. Clojure has a small number of language features that are carefully chosen to work well together. The result is a language that is both very flexible and very easy to learn.

One of the design goals of Groovy was to be compatible with Java code, but providing some extra features, just as C++ was designed to be compatible with C. This is a good thing if you have a lot of Java code that you want to migrate, or if you are uncomfortable with learning something new. However, Java is inflexible and overly complicated, and trying to maintain compatibility with Java prevented Groovy from being much better than Java. I quickly lost interest in Groovy so it's possible that I missed something - I would love to hear what advantages Groovy has compared to Scala or Clojure."

There's a Clojure group on the web and this spawned a discussion there entitled "Matt Raible: "Why is Clojure better than Scala or Groovy?"

Let's discuss this!

I am going to take another look at Eric's Clojure code that won the CodeTown Coding Contest #1 on Wari. It's a great way to see how things wrk from a practical perspective. The Compojure web framework is also something I want to see... Stay tuned!

Views: 93

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Anthropic Introduces MCP Tunnels for Private Agent Access to Internal Systems

Anthropic has expanded its Claude Managed Agents platform with two enterprise-focused capabilities: self-hosted sandboxes and MCP tunnels. The release aims to address a recurring challenge in enterprise AI deployments, where organizations want to use autonomous agents but cannot allow execution environments or internal systems to leave their security perimeter.

By Robert Krzaczyński

Agoda Builds Multimodal Content System to Bridge Images and Reviews in Travel Discovery

Agoda Multimodal Content Systemhttps://example.com/agoda-multimodal-content-systemAgoda unifies hotel images and guest reviews using a shared topic taxonomy, enabling multimodal retrieval across 700M+ images and multilingual reviews with offline enrichment and low-latency serving.

By Leela Kumili

Presentation: Powering the Future: Building Your GenAI Infrastructure Stack

Merrin Kurian shares the architectural blueprints and organizational processes behind Intuit’s AI transformation. She explains the "fixed, flexible, free" framework used to scale GenOS across 8,000 developers, enabling 3,500+ production experiments. She discusses critical agent failure modes, the "LLM-as-a-judge" evaluation strategy, and how to build "tool-ready" APIs for the future.

By Merrin Kurian

TanStack Details Sophisticated npm Supply Chain Attack That Compromised 42 Packages

TanStack has released a detailed postmortem describing a sophisticated supply-chain attack that compromised 42 npm packages and published 84 malicious package versions in just six minutes, exposing developers and CI/CD systems to credential theft and malware propagation.

By Craig Risi

Article: Kernel-Level Ground Truth: Why eBPF is Replacing User-Space Agents for Security Observability

eBPF is emerging as a preferred method for security observability over traditional user-space agents. By attaching probes directly to the Linux kernel's syscall interface, it provides consistent visibility even during container-level compromises. eBPF reduces security-related CPU consumption and limits data volume by performing filtering at the kernel level, enhancing operational efficiency.

By Niranjan Sharma

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service