Feeds

Google Chrome API experiments with browser history

Historical override

Security and trust: The backbone of doing business over the internet

Google has added a pair of "experimental" APIs to its Chrome browser, including one for querying and modifying the user's browser history and one for accessing info involving Google's new-age process model.

Both the "experimental history" API and the "experimental processes" API are now available with Chrome's dev channel build, used to explore tools not yet ready for beta testing. Apparently, these are the first of many experimental APIs.

"The idea is that we can add new APIs to the platform that may not be ready for prime time," reads a blog post from software engineer Eric Kay. "This allows you to play with these APIs and give us feedback before they’re final, which in turn helps us get them out to everybody more quickly."

When the experimental history API is finalized, Kay says, it will also let developers replace - or "override" - Google's history page with their own. Today, Google provides an override for the Chrome's New Tab page, the page that appears when you create a new tab or window.

The processes API provides access to such things as process IDs and CPU usage for individual tabs. Mountain View's process model can run each browser tab as a separate process.

"Web applications are becoming more complex and resource demanding, and power users may want a better view of which pages are responsible for resource use," reads the API's design page. "It may also be useful as a debugging or diagnosis tool, to see which tabs are currently sharing fate."

The design page suggests that the API might allow for a Chrome extension that automatically restores all affected tabs when a process crashes or one that provides a Windows Task Manager-like utilization graph for browser processes.

As it stands, the extensions can't be used unless you add a command line flag when starting the browser. Extensions that use the APIs can't be uploaded to Google's public extensions gallery. And Google warns that the APIs will change in ways that will break extensions built on current designs. Kay says that Google expects to add more experimental APIs to the dev channel as time goes by. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.