Feeds

Google removes Chrome beta tag on Mac, Linux

Chrome 5 arrives

Internet Security Threat Report 2014

Google has promoted Mac and Linux versions of its Chrome browser out of beta, marking the first time the search behemoth has brought them into its fold of ready-for-prime-time releases.

Released on Tuesday, Chrome 5 brings a variety of fixes and new features to users of Windows, OS X, and Linux. Chief among them is the ability to synchronize bookmarks, browser preferences, homepages, and other settings across multiple computers. The updated browser also makes it possible to use more than 4,500 extensions in an incognito mode.

Chrome 5 also incorporates new HTML5 features, including Geolocation APIs, App Cache, web sockets, and drag-and-drop support for files.

Tuesday's announcement comes almost exactly a year after Chrome for Mac and Linux were released in alpha. With the beta tag displayed on some Google products for years, the speed suggests a higher-than-average level of commitment to these offerings. Google engineers promise the new stable versions of Chrome will deliver the same speed, stability, and performance available to Windows users.

If true, the release could help convert a new wave of browser users. With more than 70 million active users, Chrome has already leapfrogged Safari. While its usage still lags far behind Mozilla Firefox and Microsoft Internet Explorer, Google's ability to boast a fully-featured browser that runs on all major platforms can only help its cause.

For now, Chrome 5 won't be integrated with Adobe Flash, but Google said this will change once version 10.1 of the media player is released. With all the criticism being lobbed at Adobe over the past few months, this is probably a good thing. It also leads us to wonder if Google is aware of upcoming performance improvements to Flash that aren't known to the world at large.

People who already have Chrome installed will be auto-updated to the latest version in the near future. Downloads for all three versions are available here, and release notes for Chrome 5 are here. Notes for Chrome on Mac and Linux are here and here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Apple's OS X Yosemite slurps UNSAVED docs into iCloud
Docs, email contacts... shhhlooop, up it goes
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.