Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

What is a Plug-In?
Putting it very simply, a plug-in is a supplemental application that enables a browser to perform additional functions. These applications are extremely useful, as they automatically run in the browser’s code instead of opening another window. Furthermore, they enable you to view content on a website that you may not have been able to otherwise, because your browser may lack the capabilities on its own.

There are hundreds of plug-ins now available to augment these capabilities, including some familiar faces. Adobe Acrobat and Flash Player are both examples of plug-ins, as are Microsoft Silverlight, Java, and QuickTime Player.

Where Do Plug-Ins Come From?
Plug-ins date back to the very beginning of the World Wide Web, where the original HTML code wasn’t prepared to handle more advanced tasks - like video or online game content. In order to get this problematic content to work properly, a plug-in assists the browser in processing it.

This approach is widely used to this day, but some of the inherent weaknesses that plug-ins can have are spurring the advancement and development of improved methods. For example, for the longest time, plug-ins have been technically separate from the browsers that they interact with, but now there is a concerted effort to integrate the plug-in more closely with the other content on the page.

Isn’t This the Same as a Browser Extension?
In a word, no. The key difference is the amount of information that either can access. While a plug-in works the same way, regardless of the browser being used, they are specifically added to an individual page. This means that they can only be used on that given page. An extension, on the other hand, is incorporated into the browser itself, and therefore can technically be utilized on any page the browser navigates to.

What else would you like to know more about? Leave a comment and tell us, and make sure you check back to see if we’ve covered it!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 September 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Hackers Business Computing Google Efficiency Productivity Hosted Solutions Managed Service Provider Backup Business Innovation Malware User Tips windows Workplace Tips Mobile Devices Computer Hardware Network Security IT Support IT Services Upgrade Saving Money Miscellaneous Windows 10 Email Virtualization Gadgets Smartphones Communication Apps Data Business Continuity Network Microsoft Office Mobile Device Management Server Disaster Recovery Mobile Computing VoIP Smartphone Information Technology Small Business Browser Quick Tips Productivity Tech Term Health Social Media Passwords Android Mobile Office Going Green Operating System Cybersecurity Chrome Holiday App Application Office Alert Best Practice Collaboration Save Money Cybercrime Data Backup Law Enforcement Ransomware Managed IT Services BYOD spam Marketing The Internet of Things communications Apple Vendor Management WiFi Employer-Employee Relationship Remote Computing Tablet Search Office 365 Wearable Technology BDR Facebook History Internet of Things Users User Error Remote Monitoring Antivirus Unified Threat Management Data Security Bring Your Own Device Money Avoiding Downtime iPhone Data Recovery Outsourced IT Risk Management Cost Management Hacking Maintenance Router Phishing Wireless Technology Social Mobility Telephone Systems Government Customer Relationship Management Bandwidth Hard Drives Office Tips Password IT Solutions Tech Support Big Data Data Management Computers Saving Time PowerPoint Analytics OneNote Proactive IT Firewall Wireless Budget Lithium-ion battery Phone System Unsupported Software Current Events IT Support Cloud Computing Automation Wi-Fi Windows 10 VPN Humor Two-factor Authentication Website Vulnerability Update Net Neutrality Google Drive Printer Shortcut Outlook Social Networking Gmail USB Encryption Virus Networking Social Engineering administration Streaming Media Identity Theft Trending Audit Disaster Intranet Recovery Work/Life Balance Blockchain Laptop Augmented Reality Content Filtering Mobile Device Information Politics IT COnsultant Education Television Retail Excel Computer Repair Travel Artificial Intelligence Managed IT Samsung Private Cloud Virtual Reality Battery Hard Drive Uninterrupted Power Supply Sales HIPAA Wireless Charging Internet Exlporer Personal Information Automobile Cleaning DDoS Mobile Security Data Breach Emails Instant Messaging Applications Managed IT Services Save Time Online Currency Cortana Entertainment Computer Care Sports Benefits Windows 8 eWaste Computer Accessories SaaS Value Point of Sale Legal Printer Server Transportation Commerce HaaS End of Support Data Protection Flexibility Programming Managing Stress Twitter Google Assistant Storage Data Storage Amazon Devices Paperless Office Managed Service Hosted Solution Business Intelligence Fax Server Patch Management Meetings WannaCry Telephony Customer Service Computing Fraud Biometrics Google Docs Charger Gamification Business Technology Edge Near Field Communication Webinar Nanotechnology Safety Operating Sysytem App store Microsoft Excel Training Memory 3D Printing Testing Human Resources Images Ciminal IT consulting Adobe Surge Protector IT solutions Webinar Root Cause Analysis File Sharing Company Culture Financial Camera Project Management Reliable Computing Windows 10s Distributed Denial of Service Reputation Identity Compliance Evernote Hybrid Cloud Bloatware Debate Worker Commute Projects Help Desk Administrator IT budget Licensing Solid State Drive Settings Keyboard hacker Data Privacy Legislation Inbound Marketing Workers Community Files Video Games Virtual Assistant Branding ISP Access Tablets Hard Disk Drive Hiring/Firing Intrantet Chromebook Mouse Comparison Updates HBO Chromecast Alexa for Business Identities WIndows 7 Blogging NFL Tutorial Smart Technology Printing Network Congestion Specifications Microsoft Word Regulations Lifestyle Bluetooth Robot Language Word Advertising Conferencing junk Device Security Cameras Co-managed IT IT Management Scalability Software as a Service Experience SharePoint Data storage User Display Windows Ink iOS Scam PDF Computer Forensics Gifts filter Virtual Desktop Presentation WIndows Server 2008 Upgrades How To Music Teamwork OneDrive Proactive Best Available Google Maps Print Server Computer Fan Screen Mirroring Nokia Employer Employee Relationship Text Messaging Management Science Credit Cards Vendor Spyware Gift Giving Consultant Youtube Books Touchpad Websites Ebay Data Loss FAQ Cast Wireless Internet Employee-Employer Relationship Buisness Sync Touchscreen Microblogging Black Market Monitors Electronic Medical Records Running Cable Data Theft