Since its inception, Google has always had the motto of producing software and applications that serve the Internet to its full potential and allow its users to gain the most out of it. Market competition has always been the driving force behind its pursuits and the result has constantly been towards the better. In compliance with the platform it serves, the ever- changing Internet, Google has kept up and done better each time the need arose. The latest dish out of its kitchen is the all-new web browser, CHROME, which hopes to put an end to many problems of the Internet. Besides providing the basic functionalities of a browser, it also adds certain features in each area to generate a standard paradigm of web use and development. For those curious about Chrome, this article will provide you with some information of the technology behind it and some of its features.
Chrome also provides a better search facility. Since each tab has its own URL bar, called the omnibox here, isolated actions can occur. The address bar provides the list of matching options, the most visited sites, and a suggestion of some sites based on the letters typed at an instant. Auto-completion options are relaxed by allowing only filling in previously typed words. So the whole web page URL is not filled, only the website’s names are added. Opening up of the Chrome browser provides us the most visited sites to choose form or enter a new URL, as desired. Privileges exist to make certain sessions secretive and they are not remembered by the browser after such windows are closed. The pop-ups are allowed to live only in the tab where they were opened but can be dragged out to any other window or tab. So no unwanted blocking too.
Another important feature is that it makes the best possible efforts to reduce the risks of malware and phishing by making all process read-only with respect to hard-drive contents. No changes can be made into the user’s data by malicious programs that are abundantly found on the net. Only two levels of permission is permissible:- high and none. Data can only be read from none to high level and written from high to none level. The lower level of security, none, can only perform action on the request of the higher end, thus removing unauthorized access to data. But plug-ins do get additional access permissions and can be dangerous. But the risk is still less daunting as compared to the multitudinal viruses sprawling across the Internet. Even if a plug-in does get corrupted, it can be closed own without affecting other processes as they are independent processes in Chrome. In addition to these static methods Chrome perpetually downloads the list of sites potentially dangerous for malware and phishing and stores the information. If a visited website falls into such a list, the user is notifies of the risks and prompted for proceed instructions. This guarantees complete control of web action on the part of the end-users.
To include compatibility problems Chrome provides a set of Gears that works behind the screen at the developers to end to provide the functionalities. Each new developer can study and adapt to the existing gear configuration of the browser to make the new product compatible and more efficient.
[Image Source: http://www.flickr.com/photos/randyzhang/2820302020/]