Browser Comparison Comparing The Advantages And Disadvantages Essay

PAGES
2
WORDS
573
Cite

Browser Comparison Comparing the Advantages and Disadvantages

of Internet Explorer, Mozilla Firefox and Google Chrome

The intent of this analysis is to evaluate the advantages and disadvantages of Internet Explorer (IE), Google Chrome and Mozilla Firefox. Of these three browsers, the majority of research and development investment has been in Internet Explorer, which has over eight generations of spending on new product development associated with it (Maurer, 2007). All of the research and the continual improvements that Microsoft continues to make to this browser would lead one to believe it is the most advanced. In fact, Internet Explorer is often one of the more closed in terms of architecture and the slowest in terms of performance across the three browsers analyzed (Oshri, de Vries, de Vries, 2010). Prior to this analysis it was the author's belief that Mozilla Firefox was the most efficient and secure browser...

...

Based on this analysis however the perception of the author has shifted to Google Chrome. IE continually crashed during this analysis on an advanced IBM laptop used for testing and eventually led to several system reboots during browser plug-in sessions.
Analysis of Browsers

Beginning with Google Chrome, the initial tests of the browser showed it to be significantly more reliable than IE, much greater speed than IE and comparable to Firefox on performance. Chrome also has the easiest-to-use graphical interface and ergonomics, as validated by third-party studies as well (Fagan, 2010). Initially considered to be one of the least secure browsers due to Google admitting they had the technology to track and analyze all traffic from within it, like Facebook, the company has acted to significantly reduce the potential for user data…

Sources Used in Documents:

References

Fagan, J.. (2010). Usability Studies of Faceted Browsing: A Literature Review. Information Technology and Libraries, 29(2), 58-66.

Harry Maurer. (2007, June). Browser Battle Royal? Business Week,(4040), 29.

Reis, C., Barth, A., & Pizano, C.. (2009). Browser Security: Lessons from Google Chrome. Association for Computing Machinery. Communications of the ACM, 52(8), 45.

Oshri, I., de Vries, H., & de Vries, H.. (2010). The rise of Firefox in the web browser industry: The role of open source in setting standards. Business History, 52(5), 834.


Cite this Document:

"Browser Comparison Comparing The Advantages And Disadvantages" (2011, June 12) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/browser-comparison-comparing-the-advantages-51209

"Browser Comparison Comparing The Advantages And Disadvantages" 12 June 2011. Web.18 April. 2024. <
https://www.paperdue.com/essay/browser-comparison-comparing-the-advantages-51209>

"Browser Comparison Comparing The Advantages And Disadvantages", 12 June 2011, Accessed.18 April. 2024,
https://www.paperdue.com/essay/browser-comparison-comparing-the-advantages-51209

Related Documents

Medical Records Software Comparison Electronic Medical Records Software Comparative Analysis There are over 75 different vendors of Electronic Medical Records (EMR) software applications currently providing solutions to healthcare facilities in the U.S. alone as of 2011 (Ulutas, Ulutas, Nabiyev, 2011). The key design criteria for EMR systems is security (Neupert, Mundie, 2009), usability (James, Garrett, Krevit, 2009) and the ability to be integrated with legacy systems (Agarwal, Milch, Van Kuiken, 2009). This

Moreover, the simulation also made available several branching and interdependent decision pathways. The simulations presented in the beginning pertinent background information and then subsequent screens presented at least three decision choices. Based on the selection, a new screen presented the client's response. The process ended when the students reached the end of a decision pathway. The simulation also took into account that many counseling situations do not have right

Bahrain Ministries IT Service Studying the Potential of Moving Bahrain Ministries IT Services Into Private Cloud Computing Information technology (IT) is not only an important part of life for many people, but it is also a booming business (Amies, et al., 2012). One of the most significant steps IT has made in recent years is the advent of cloud computing. This is similar to the old style of storing information, where everything

The traditional Unix Common Desktop Environment should satisfy long-time Unix users, though most people are likely to find it to be crude and dated. The GNU Network Object Model Environment is a modern desktop environment that strives for simplicity, similar to Mac OS. Gnome has all the features modern users expect in a desktop, though experts may be disappointed by the fact that many decisions are left out of

Synchronous and Asynchronous Distance education is becoming an increasingly important part of today's dynamic and globalized business and academic environments. This paper gives a brief introduction to distance education and asynchronous and synchronous technologies, and reviews and compares two synchronous technologies (HorizonLive and Centra 7) with two asynchronous technologies (Blackboard and WebCT). Synchronous and asynchronous technologies are both part of the recent explosion of computer mediated learning. As Kirwin notes, computers have

This problem was solved in the following way: the program uuencode which is used by email-clients transforms its binary code (code of bits and bytes) into text code using ASCII table principle and it's send in the form of text character set in the following form (begin file name reports text translated binary body end). The recipient's email-client executes uudecode program and transforms it to binary primary code. Telnet Telnet is