Feeds

Firefox 3.5 - it's not a 'web upgrade'

But it's a nice browser

High performance access to file storage

Review "This isn't just an upgrade of the browser. It's also an upgrade for the web", says Mike Beltzner, Firefox product director, in his What's New in 3.5 video.

Hyperbole for sure, but it highlights the most interesting aspect of the browser wars, which is how each player is trying to influence the direction of web development.

From the user's perspective, Firefox 3.5 is better - but not dramatically so. The first notable new feature is private browsing, a catch-up with Microsoft's Internet Explorer and Google Chrome that lets you browse web sites without leaving traces in browser history or temporary files. Next comes Tear Off Tabs, which - as in Apple's Safari - allows tabs to be dragged into a separate browser window. A neat touch is Recently Closed Tabs and Recently Closed Windows, which gets you back where you were after accidentally closing a page.

Location-aware browsing is more exciting. A website can prompt for your location, and subject to your consent, Firefox will call a Google API to work out where you are. It implements a proposed W3C standard and has potential, though hardly any sites make use of it at the moment. The other snag is that Firefox currently relies on WiFi points and IP addresses and does not use GPS even if present. Which may explain why it was out by 125 miles when I tried it.

Geolocation in Firefox 3.5

Location-aware browsing: great, if accuracy's not your thing

The next perspective is performance. Firefox 3.5 has a new JavaScript engine called TraceMonkey that is dramatically faster. In our tests, it executed the Sunspider benchmark nearly three times faster than Firefox 3.0, though not quite as fast as Google's Chrome. When it comes to DOM manipulation though, there was little improvement.

Firefox scores well against its rivals in memory usage. IE8 and Chrome use a new process for each tab, which eats memory. Informal tests suggest that Firefox uses less RAM even with just one page open, and its advantage grows as further tabs are opened. In a quick informal test, Firefox used about the same RAM as Safari. Only Opera was slimmer.

Good for users then, but no big deal. What about web development? This is where it gets interesting. On the Acid3 test, at which IE8 fails badly, Firefox 3.5 is nearly but not quite perfect. The new browser also implements a good chunk of HTML 5, including an enhanced Canvas element with a text API, audio and video elements, a simple local storage API, downloadable fonts (a CSS feature), and JavaScript threading using web workers. The underlying story is an effort to push developers away from Adobe Flash and Microsoft Silverlight and towards standard HTML, when implementing rich content, multimedia, and rich internet applications.

In this respect, Firefox 3.5 is more a statement of intent than a realistic alternative to Flash. The audio element only supports Ogg Vorbis or uncompressed wave audio, while video is limited to Ogg Theora.

Standards tussle

Adobe's Flash, by contrast, offers a consistent cross-browser runtime, integrated with its Creative Suite design tools that are used everywhere. It may be hard to convince Microsoft to implement standards that compete with Silverlight in IE. Still, it is a significant statement of intent, and a few years from now Adobe's hold on web multimedia may be less secure.

Another key question is whether Google, Mozilla, and Apple can avoid fragmentation of evolving standards. Google's Gears extension overlaps with much of what is in HTML 5.0, but has its own specification. Features like local SQL support are different in Safari and Chrome and not present at all in Firefox except for extensions.

When he worked at Google, Mozilla's Dion Almaer argued that: "HTML 5 and Gears will converge in the not too distant path." They need to. Otherwise, both will be undermined.

Existing users will find Firefox 3.5 solid though unexciting and will stick with it - if only for the sake of its rich library of add-ons, which are now its main advantage over Safari and Chrome. Developers will like the TraceMonkey JavaScript engine along with more bits of HTML 5.0.

In summary: a good release, which increases the pressure on Microsoft's IE. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.