Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

What is a Plug-In?
Putting it very simply, a plug-in is a supplemental application that enables a browser to perform additional functions. These applications are extremely useful, as they automatically run in the browser’s code instead of opening another window. Furthermore, they enable you to view content on a website that you may not have been able to otherwise, because your browser may lack the capabilities on its own.

There are hundreds of plug-ins now available to augment these capabilities, including some familiar faces. Adobe Acrobat and Flash Player are both examples of plug-ins, as are Microsoft Silverlight, Java, and QuickTime Player.

Where Do Plug-Ins Come From?
Plug-ins date back to the very beginning of the World Wide Web, where the original HTML code wasn’t prepared to handle more advanced tasks - like video or online game content. In order to get this problematic content to work properly, a plug-in assists the browser in processing it.

This approach is widely used to this day, but some of the inherent weaknesses that plug-ins can have are spurring the advancement and development of improved methods. For example, for the longest time, plug-ins have been technically separate from the browsers that they interact with, but now there is a concerted effort to integrate the plug-in more closely with the other content on the page.

Isn’t This the Same as a Browser Extension?
In a word, no. The key difference is the amount of information that either can access. While a plug-in works the same way, regardless of the browser being used, they are specifically added to an individual page. This means that they can only be used on that given page. An extension, on the other hand, is incorporated into the browser itself, and therefore can technically be utilized on any page the browser navigates to.

What else would you like to know more about? Leave a comment and tell us, and make sure you check back to see if we’ve covered it!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 July 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Business Computing Hackers Google Productivity Efficiency Hosted Solutions Managed Service Provider Backup Business Innovation Malware windows Workplace Tips Mobile Devices User Tips Hardware Computer IT Support IT Services Saving Money Upgrade Miscellaneous Windows 10 Email Virtualization Gadgets Network Security Business Continuity Apps Disaster Recovery Network Smartphones Communication Server Data Microsoft Office Mobile Computing Information Technology Mobile Device Management Small Business Quick Tips VoIP Smartphone Health Social Media Productivity Cybersecurity Operating System Mobile Office Browser Android Going Green Tech Term Chrome Passwords Holiday App Cybercrime Alert Best Practice Application Office Save Money Law Enforcement Managed IT Services BYOD Marketing Ransomware Collaboration spam Apple Vendor Management The Internet of Things WiFi Data Backup communications Employer-Employee Relationship Tablet Search Remote Computing Wearable Technology Office 365 Router Wireless Technology BDR History Hacking Facebook Phishing User Error Remote Monitoring Unified Threat Management Antivirus iPhone Money Avoiding Downtime Risk Management Data Recovery Data Security Cost Management Outsourced IT Maintenance Tech Support Office Tips Big Data Password Mobility Customer Relationship Management Data Management Computers Government Bring Your Own Device Social Telephone Systems Internet of Things Hard Drives IT Solutions Saving Time Update Outlook Gmail USB Encryption Users PowerPoint Shortcut Analytics OneNote Wireless Proactive IT Firewall Bandwidth Lithium-ion battery Unsupported Software Current Events IT Support Cloud Computing Wi-Fi VPN Vulnerability Phone System Humor Website Net Neutrality Social Networking Automation Google Drive Two-factor Authentication Printer Virus Artificial Intelligence administration Excel Managed IT Disaster Travel Identity Theft Streaming Media Networking Trending Social Engineering Audit Work/Life Balance Intranet Laptop Content Filtering Windows 10 IT COnsultant Budget Politics Recovery Computer Repair Blockchain Television Education Retail Google Assistant WannaCry Storage Hard Drive Fax Server Uninterrupted Power Supply Sales Computing Devices Samsung Battery Hosted Solution Personal Information Business Intelligence Patch Management Meetings Automobile Telephony Cleaning Customer Service Biometrics Fraud Google Docs Windows 8 Managed IT Services Private Cloud Save Time Virtual Reality Computer Care HIPAA Online Currency Wireless Charging Internet Exlporer Mobile Security DDoS Emails Data Breach Instant Messaging Legal Augmented Reality Cortana Transportation Entertainment Point of Sale Commerce Sports End of Support Benefits Flexibility Printer Server eWaste Computer Accessories Twitter Programming Value Data Storage Amazon HaaS Paperless Office Data Protection Managing Stress Conferencing Books Touchpad junk Cameras Cast Device Security IT Management Touchscreen Windows Ink SharePoint Black Market User Ebay Computer Forensics Monitors Gifts Electronic Medical Records filter Images Presentation WIndows Server 2008 Webinar Virtual Desktop Webinar Google Maps Teamwork Best Available Proactive Management Nanotechnology Credit Cards Safety Science Operating Sysytem Spyware Training IT solutions Data Loss Websites 3D Printing Wireless Internet Root Cause Analysis FAQ Help Desk Surge Protector Company Culture Sync Debate Buisness Windows 10s Running Cable Data Theft Gamification Charger Reputation Near Field Communication Edge Solid State Drive Microsoft Excel Worker Commute Administrator App store Memory Settings Keyboard hacker Human Resources Video Games IT consulting Ciminal Adobe Hard Disk Drive File Sharing Access Financial Community Lifestyle Hiring/Firing Applications Reliable Computing ISP Project Management Identity Distributed Denial of Service Intrantet Compliance Hybrid Cloud Evernote Smart Technology Bloatware Tutorial Mobile Device Licensing Blogging IT budget Data Privacy Legislation Robot Inbound Marketing Advertising Virtual Assistant Workers Files Tablets Branding Scalability Chromebook iOS Comparison Nokia SaaS Experience Mouse Data storage PDF Alexa for Business Co-managed IT Updates Gift Giving Chromecast Scam HBO Upgrades NFL Youtube How To WIndows 7 Display Identities Printing Computer Fan Specifications Music Network Congestion Text Messaging Regulations Screen Mirroring Microsoft Word Employer Employee Relationship Microblogging Print Server Consultant Word Bluetooth OneDrive Language