Feeds

Microsoft team hacks Silverlight for Chrome

Results may vary

Choosing a cloud hosting partner with confidence

The prospect of Silverlight applications running in Google's Chrome browser is in the air.

A Sliverlight program manager has blogged about a hack to Microsoft's code that would get their company's media player running inside Google's fledgling browser. The hack to Silverlight lets Microsoft's player detect Chrome, clearing the way to playing audio and video.

What happens next is not guaranteed.

One commenter responded saying Silverlight apps will only render in Chrome for the first few frames and wouldn't react to user inputs.

Another claimed Silverlight would work "just fine" in Chrome if you start in single-process mode, noting the issues are "very likely" the fault of Chrome rather than Silverlight. The problem could be caused by the fact Chrome loads plug-ins out of process.

Silverlight program manager Tim Heuer reminded people this is early code and Chrome is not officially supported by Silverlight. Those honors go to Firefox and Internet Explorer.

"We continue to evaluate the browser support matrix for Silverlight and before you ask - no decisions have been made just yet to change the current supported matrix," Heuer blogged.

The hack itself consists of three lines added to Silverlight.supportedUserAgent.js, which is used to check for browser compatibility and that means Chrome can be recognized by Silverlight. The hack to Microsoft's code is possible - even encouraged - because Silverlight.supportedUserAgent.js has been released under Microsoft's OSI-approved Permissive License (Ms-PL)

"Since the detection scripts are Ms-PL licensed, you're welcome to change them to fit your needs," Heuer wrote.

While the work is early - and Chrome is not officially supported - this does show what's possible. The Novell-backed Moonlight project started life because Microsoft dragged its feet over Silverlight on Linux, saying it would target platforms as resources allowed. Moonlight hit its first full release last week and was warmly welcomed by Microsoft.

The Silverlight hack for Chrome - in addition to Moonlight - demonstrate the only limitation to these projects are the willingness of corporations to commit time and resources to making their software run in rivals' runtimes as first-class citizens. ®

Intelligent flash storage arrays

More from The Register

next story
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Sway: Microsoft's new Office app doesn't have an Undo function
Content aggregation, meet the workplace ... oh
Sign off my IT project or I’ll PHONE your MUM
Honestly, it’s a piece of piss
Return of the Jedi – Apache reclaims web server crown
.london, .hamburg and .公司 - that's .com in Chinese - storm the web server charts
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
Torvalds CONFESSES: 'I'm pretty good at alienating devs'
Admits to 'a metric ****load' of mistakes during work with Linux collaborators
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.