Feeds

Microsoft's Internet Explorer 8 planned for 2009

Third beta, then release

HP ProLiant Gen8: Integrated lifecycle automation

The "standards-compatible" next edition of Internet Explorer has been bumped into 2009 by Microsoft.

A third Internet Explorer 8 beta will now be released in the first quarter of next year and be followed by a final release, IE general manager Dean Hachamovitch has blogged.

Hachamovitch did not give a date for that final release but spelt it out more clearly than the usual IT vendor message of "we're taking feedback and won't ship until we're ready."

Bill Veghte, senior vice president for the Windows business group, in July reportedly said IE 8 would be ready by the end of the year. Veghte made the promise in front of Wall Street investors at the company's annual Financial Analysts Meeting (FAM) at its Redmond campus.

"Our plan is to deliver the final product after listening for feedback about critical issues," Hachamovitch said this week.

"We will be very selective about what changes we make between the next update and final release. We will act on the most critical issues. We will be super clear about product changes we make between the update and the final release."

Hachamovitch also stressed the release candidate will be final product - and odd statement, given that's usually the case anyway.

Why so super-cautious? There's more than usual at stake with this Microsoft release. IE 8 will introduce a tag so web sites tuned to older versions of IE can be viewed in this release without breaking. Breakage is a real possibility as IE 8 will update its legacy layout engine to offer “full” CSS 2.1 and “strong” HTML 5.0 support.

The technical community "should expect the final product to behave as this update does," Hachamovitch said.

"We want them to test their sites and services with IE 8, make any changes they feel are necessary for the best possible customer experience using IE8, and report any critical issues (e.g., issues impacting robustness, security, backwards compatibility, or completeness with respect to planned standards work).

"Our plan is to deliver the final product after listening for feedback about critical issues," Hachamovitch said. ®

Top three mobile application threats

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.