Feeds

Microsoft reinfects Chrome with closed video codec

Handbags reloaded

Choosing a cloud hosting partner with confidence

Microsoft has reinfected Google's Chrome browser with the patent-encumbered H.264 video codec, banned by the search giant last month.

On Wednesday, the world's largest software company released a plug-in for Chrome that allows Windows 7 PCs to play video using the proprietary format that's part-owned by Microsoft and Apple – you can grab it here. The plug-in is designed to let users running Chrome on a Windows 7 machine – but not on a Windows XP box – play HTML5 video using the H.264 codec.

Microsoft said on Wednesday that it has built the Windows Media Player HTML5 Extension for Chrome because it respects the fact that "Windows customers want the best experience of the web including the ability to enjoy the widest range of content available on the Internet in H.264 format."

H.264 is the mostly widely used video-playback codec on the web, but Google said in January that it was removing support for H.264 from future versions of Chrome.

Google said its resources would now be directed towards "completely open codec technologies," as the giant's goal is to enable "open innovation" on the internet. H.264 was built by Apple, Microsoft, and others, and is licensed by MPEG LA.

Future versions of Chrome will support only the royalty-free WebM codec that was owned and open sourced by Google last year, and the Ogg Theora codec.

Chrome would join Opera and Firefox in not including H.264. Chrome will continue to include Adobe's Flash player, however, which uses the H.264 codec; Google's decision only affects HTML5 video.

Announcing its H.264 shot for Chrome, Microsoft said: "We believe that Windows customers should be able to play mainstream HTML5." H.264 will ship as the video playback of choice for the next version of Microsoft's Internet Explorer browser later this year.

Wednesday's announcement is the latest incident of handbags at 50 paces between Google and Microsoft. Google in January said it was planning WebM plug-ins for the H.264-luvvin' IE and Safari from Apple. This Tuesday, the two went all Joan Collins over how Microsoft's Bing is ripping off Google's search results. ®

Business security measures using SSL

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.