Language Selection

English French German Italian Portuguese Spanish

M$ Needs More than Tabbed Browsing for IE

Filed under
Microsoft

Microsoft's Internet Explorer Product Unit Manager Dean Hachamovitch recently confirmed in his weblog that Internet Explorer 7.0 would have tabbed browsing integration, a feature that's also available in Mozilla's Firefox browser. One of the many reasons Firefox has become popular is due to tabbed browsing. It was a different concept that let users open numerous windows in a single parent window. It's useful, it's popular, and it works. But I don't see how this is a major feature in need of promotion. While Hachamovitch didn't intentionally promote it himself, he did confirm it as if this is the next thing in browsers.

I am not saying that Microsoft is wrong in porting over features that have made other browsers a success, but what I really want to see in Internet Explorer is security and Microsoft's determination to continue to update Internet Explorer even if there's no "real" competition. Sure, having additional features in Internet Explorer will help tremendously, but what made Firefox a huge success is its correct code structure, a set industry standard that it follows and the foundation's rapid response when it comes to fixing security holes. Microsoft needs to do the exact same thing if it wants to gain back its lost market share.

Since Microsoft already has a dire reputation of ignoring certain security vulnerabilities and never releasing a patch in a timely manner, if at all, it needs to regain trust of its users. In today's times where security is a key to any successful product, especially that's used by millions of computer users throughout the world; Microsoft must pay attention to even the minute details when it comes to securing nine out of ten computers with Windows operating system.

In addition to that, Microsoft has a tendency to ignore products once the company has eliminated its competition. Its Internet Explorer is a fine example of that. Until Firefox came along, none of the other browsers had challenged Internet Explorer much; therefore, Microsoft never paid close attention to its security or tried to add useful features to it. They pretty much ignored it. After Firefox came along, that all changed. Not only did people start reporting more security issues with Internet Explorer, Microsoft also dedicated a team to focus on its browser. It was only after Firefox threatened Internet Explorer's market share did Microsoft made the announcement of an upcoming version that would fix a majority of such issues and would be updated to meet industry standards for browsers. This version will be the upcoming Internet Explorer 7.0.

After Microsoft has gained the trust with the browser's security, features and a promise to continually update Internet Explorer, it needs to make sure that Internet Explorer is well maintained structurally. Since Internet Explorer has been the most popular browser in the world, many webmasters practically designed their website solely for this particular browser. And since Internet Explorer was lenient on its coding style, it led web developers to be relaxed about the way they constructed websites, which resulted in numerous "broken" sites in Firefox and other browsers. Microsoft has the ability to define industry standards in a correct way, so why don't they do it?

There are numerous other things that Microsoft can do to make Internet Explorer a competitive browser functionally and feature wise. What really intrigues me is that Microsoft only seems interested in eliminating competition, and not catering to its users. Microsoft clearly has the resources to define the software industry, but they choose not to do that. I am all for the goal of eliminating competition, but they need do that with better products and continued support to their customers. Microsoft can learn a lot from Firefox and the things that have made it a success. The company will certainly need more than tabbed browsing in 7.0 to get knowledgeable users to switch back over to Internet Explorer.

Source.

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS