Feeds

Flash versus HTML 5

The mobile perspective

High performance access to file storage

“The mobile era is about low power devices, touch interfaces and open web standards – all areas where Flash falls short,” says Apple CEO Steve Jobs in his notorious Thoughts on Flash. “New open standards created in the mobile era, such as HTML5, will win on mobile devices (and PCs too).”

Adding to the confusion, every non-Apple vendor has jumped on Flash as a key selling point, one thing that iOS looks unlikely ever to support, and the majority of the smartphones and tablets on show at CES earlier this year boast Flash support.

RIM has gone further with its Tablet OS on the forthcoming BlackBerry PlayBook, which uses the Flash-based Adobe AIR for part of its user interface and as a development platform for apps.

Despite this, Jobs is not all wrong. While the absence of Flash on a smartphone web browser can be annoying, so too are Flash-laden pages which load slowly, eat battery life with unnecessary multimedia, and may not look good or be usable on a small screen unless the developer has optimised the page for mobile.

HTML in the browser and native code for applications is ideal. HTML 5 is not done yet, but most mobile browsers are based on WebKit or Opera, both of which support a significant proportion of the emerging standard.

Jobs is partly wrong though, and the technology has moved on since his April 2010 piece. Jobs said he had never seen Flash performing well on a mobile device. In June 2010 Adobe released the first full Flash player for mobile, version 10.1, and while it is still relatively resource-hungry it is more than tolerable on devices running Android 2.2, for example.

Move on to the new generation of devices, and it gets better still. Some are already using NVIDIA’s Tegra 2 package, which is fully hardware-accelerated for Flash. “We have worked directly with the Flash Player source code, to have a fully GPU-accelerated code path for the Flash player,” said Barthold Lichtenbelt, NVIDIA Director of Tegra Graphics. This is not just for video, but deep in the hardware. Flash will run just fine.

High performance access to file storage

Next page: Trade-offs

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.