Browse Definitions :
Definition

Kotlin

Contributor(s): Matthew Haughn

Kotlin is a static type, object-oriented programing (OOP) language that is interoperable with the Java virtual machine, Java libraries and Android.

Kotlin saves time for developers as the less verbose language provides briefer and less redundant code. Kotlin can be compiled into JavaScript or an LLVM encoder.

In many ways, Kotlin is considered a replacement for Java. While it is not compatible with syntax, it is interoperable with Java code and libraries. Kotlin also has its own libraries that were created with its community's early development through an API for Android apps.

In Java, a lot of redundancy results in verbose and thus longer code. Kotlin is more modern and has been simplified, making it easier for beginners to learn. Kotlin focuses on stripped down, functional code and avoids repetitive "boilerplate" code. The language features null safety, eliminating null pointer exception errors. Semicolons at the end of every line are not needed, although Kotlin does not have an issue if a developer uses them out of habit. Additional features reduce the complexity and length of code needed to achieve an end goal.

Kotlin was developed by JetBrains in St. Petersburg, Russia with additional help from open source programmers. At Google IO 2017 conference, Google announced that Kotlin would be the first officially supported program added to Android Studio. Aside from Android apps, Kotlin is also useful for server-side and web apps.

This was last updated in February 2018

Continue Reading About Kotlin

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close