MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

What is a Plug-In?
Putting it very simply, a plug-in is a supplemental application that enables a browser to perform additional functions. These applications are extremely useful, as they automatically run in the browser’s code instead of opening another window. Furthermore, they enable you to view content on a website that you may not have been able to otherwise, because your browser may lack the capabilities on its own.

There are hundreds of plug-ins now available to augment these capabilities, including some familiar faces. Adobe Acrobat and Flash Player are both examples of plug-ins, as are Microsoft Silverlight, Java, and QuickTime Player.

Where Do Plug-Ins Come From?
Plug-ins date back to the very beginning of the World Wide Web, where the original HTML code wasn’t prepared to handle more advanced tasks - like video or online game content. In order to get this problematic content to work properly, a plug-in assists the browser in processing it.

This approach is widely used to this day, but some of the inherent weaknesses that plug-ins can have are spurring the advancement and development of improved methods. For example, for the longest time, plug-ins have been technically separate from the browsers that they interact with, but now there is a concerted effort to integrate the plug-in more closely with the other content on the page.

Isn’t This the Same as a Browser Extension?
In a word, no. The key difference is the amount of information that either can access. While a plug-in works the same way, regardless of the browser being used, they are specifically added to an individual page. This means that they can only be used on that given page. An extension, on the other hand, is incorporated into the browser itself, and therefore can technically be utilized on any page the browser navigates to.

What else would you like to know more about? Leave a comment and tell us, and make sure you check back to see if we’ve covered it!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Network Security Business Computing Hackers Malware Software Internet Productivity Hosted Solutions Managed IT Services Backup Business Management Mobile Devices google Computer Disaster Recovery Outsourced IT Business Microsoft Hardware communications VoIP Business Continuity IT Support Windows 10 Innovation IT Services Cybersecurity Email User Tips Data Backup Efficiency Cybercrime Tech Term Windows Data Recovery Server Ransomware Saving Money Mobile Device Management Internet of Things Mobility Small Business Apps Managed IT Productivity Smartphone Data Operating System Law Enforcement browser Virtualization BDR Money Save Money Telephone Systems Office 365 Android Phishing Cloud Computing Passwords Smartphones Data Security Hosted Solution Quick Tips Chrome BYOD Automation Communication Managed Service Provider VPN Information Technology Recovery Password Holiday Network Microsoft Office IT Support Google Drive Hacking Avoiding Downtime Wireless App Alert Health Risk Management Miscellaneous Vulnerability Unsupported Software Computers Facebook Government Best Practice Social Media Work/Life Balance Data Breach Cost Management Wi-Fi Update Budget Application Gadgets Workplace Tips Data Management Collaboration upgrade Social Two-factor Authentication Cleaning search USB Save Time Telephony Spam Users Office tips Identity Theft Applications Private Cloud User Error History Remote Computing Artificial Intelligence Managed IT Services Flexibility Proactive IT Shortcut Gmail The Internet of Things Router Firewall Antivirus Employer-Employee Relationship Current Events Audit Tech Support Compliance Personal Information Data Protection Social Engineering Streaming Media Politics Wireless Technology Blockchain Commerce WiFi Saving Time Going Green iPhone Cortana Mobile Security Office Bandwidth Windows 10 Computer Care Phone System Mobile Computing Patch Management Devices Transportation eWaste Google Assistant Legal Robot Encryption Wireless Charging Excel Fraud End of Support Data Storage Big Data OneNote Networking Education Vendor Management Humor Disaster SaaS Project Management Data Loss IT solutions Samsung Marketing DDoS Content Filtering MSP Battery Google Docs HaaS Sports Television Hacker Solid State Drive Automobile Internet Exlporer Apple Value Redundancy Management Travel Document Management Storage App store Hard Disk Drive Experience domain Credit Cards Financial Technology WIndows Server 2008 Device Security Tablets Identities Root Cause Analysis Bring Your Own Device PDF remote FAQ Printing Video Games NFL IoT Augmented Reality Yahoo Hybrid Cloud Virtual Reality Text Messaging Lifestyle Identity Business Intelligence Touchscreen Scam Running Cable Music Server 2008 Charger Outlook Spyware Word Language Ali Rowghani Business Technology Legislation Data Privacy Managed IT Service Trending Employer Employee Relationship iOS Analytics Computer Forensics Windows Ink Keyboard Wasting Money Instant Messaging Computer Accessories Worker Commute Laptop Comparison Hard Drive Uninterrupted Power Supply Computer Fan Mobile Device server installation dvd "cannot install required files" Evernote PowerPoint Regulation Edge Managing Stress Google Maps Virus stock Amazon Touchpad Specifications Chromebook Screen Mirroring Dark Web Books Reputation Wireless Internet Scalability Sync Ciminal Software as a Service Proactive Meetings Hiring/Firing tweet Advertising Virtual Assistant Sales Smart Tech Cast Emails calculator Workers Gamification How To Adobe Data storage Websites Settings Benefits Twitter Alexa for Business control Retail Connectivity WannaCry Unified Threat Management Administration Updates Memory Chromecast Licensing Data Theft WSJ Training Entertainment Exchange Conferencing Content Filter HBO Webinar Mobile intranet Upgrades Distributed Denial of Service Electronic Medical Records altivista Colocation Microsoft Word Students Hard Drives Point of Sale Microsoft Excel Computing Remote Monitoring IT solutions Company Culture HIPAA SBS Gifts Monitoring Files Administrator Professional Services IT budget Lithium-ion battery Consultant Safety compaq Unified Communications Black Market File Sharing Analysis Smart Technology Windows 10s Wearable Technology Avoid Downtime IT Management Maintenance Access Nanotechnology hp Relocation Financial Shadow IT Worker CrashOverride Thank You Congratulations Cache Monitors Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...