Adobe to Linux Users: Get Chrome or Forget FlashAdded 23rd Feb 2012
Adobe today said that it would stop offering direct downloads of Flash Player for Linux, telling users to move to Google's Chrome browser, which bundles Flash with its updates.
Today's demotion of Flash Player on Linux to Chrome-only was the second time in the last three months that Adobe has withdrawn some or all support from a version of the popular media software: In November, Adobe announced it was abandoning development of Flash for mobile browsers, including the new Chrome for Android .
In a roadmap for Flash Player ( download PDF ), Adobe unveiled its plans through 2012 and into 2013.
The last version of a separate Flash Player for Linux, 11.2, will be released this quarter, Adobe announced in the roadmap document. After that, Linux users who require browser-based Flash must switch to Chrome, Google's three-year-old browser.
Chrome's developers have been working on a new API (application programming interface) dubbed "PPAPI" (Pepper Plugin API), or "Pepper" for short, to replace the long-standing Netscape Plugin API (NPAPI) that Flash and other plug-ins use in non-Microsoft browsers.
Adobe has been collaborating with Google, the former said, on Pepper implementation for Flash, which will let it create a single plug-in for all systems that Chrome supports. In other words, the same Flash Player plug-in will run in Chrome on Windows, Mac OS X and Linux.
However, the timing is up in the air.
"Google will begin distributing this new Pepper-based Flash Player as part of Chrome on all platforms, including Linux, later this year," said Adobe.
Chrome already supports PPAPI -- it has since Chrome 14, which launched last September -- and uses it for the browser's own PDF viewer.
Flash Player 11.2 will be the last version for Linux that Adobe offers as a download from its own website, but it promised to support that edition with security patches for at least the next five years.
But Adobe stressed it will continue to create new versions of the Flash Player plug-in for other browsers on Windows and Mac, the company said.
On Apple's OS X, Adobe said it was working on adding sandboxing to Adobe AIR applications -- AIR is a cross-platform runtime environment that lets developers craft applications using, among other things, Flash and HTML -- so that they can be distributed via the Mac App Store.
Apple had earlier set a March 1 sandboxing deadline for all software funneled through the Mac App Store, but today extended that to June 1.
Adobe also reported that it's working on Flash for Windows 8, but said little else than that.
"[Windows 8] includes a number of different user interface configurations (desktop and Metro) and targeted processor chipsets (x86/64 and ARM), which create a number of different development targets for the Flash runtimes," Adobe said, referring to both Flash itself and AIR.
Microsoft has already said that it will not support the Flash Player plug-in on Windows 8's "Metro" interface, or on the mostly-Metro Windows on ARM (WOA). The version of Internet Explorer (IE) that runs in WOA's desktop mode will also shun plug-ins like Flash, according to Steven Sinofsky, the Microsoft executive who leads the Windows division.
Adobe's decision will impact Mozilla's Firefox on Linux, likely locking that browser into Flash Player 11.2: Mozilla has said it was "not interested in or working on Pepper at this time."
Mozilla did not reply to questions on whether it's now reconsidering its position on Pepper, and failing that, what it would recommend Firefox users running Linux do.
When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with.
Before rushing into allowing employees to do their jobs on their personal devices, organizations need to diligently address the unique risks of that practice, cautioned a report by an international cybersecurity information organization.
A new survey reports that 70 percent of companies believe BYOD will or already has improved their work processes and 59 percent believe they would find themselves at a competitive disadvantage without BYOD.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
Moving to an as-a-service computing model is inevitable and the discussion across enterprises is no longer just about risk but rather the speed by which services can be delivered to achieve competitive advantage.
A steady increase in corporate purchasing through the first three quarters of the year hints that enterprises are already rethinking how far BYOD programs will be allowed to expand, according to Strategy Analytics.
Many organisations have no formal plan for coping with DDoS attacks, lack up to date network maps, and probably depend on old technology to defend against the threat, a survey by Corero Network Security has suggested.
Cloud adopters face serious risk in the next two years because of the strong possibility that their provider will be acquired or forced out of business, the research agency says.
"We're seeing a significant amount of traction today in the hybrid world," said Kerry Bailey, an HP senior vice president for HP cloud services.
Dell Software has introduced a suite of software and services for enterprise mobility management, including a "secure workspace" for mobile devices that lets enterprise IT managers separate work from data apps.
Oracle has launched the fifth version of its Exadata database appliance, claiming the release provides in many areas double the performance of previous-generation machines.
Businesses are moving fast to address the demand for both employee- and customer-facing mobile apps. However, there is a danger in rushing. Here are five ways to avoid pushing out a mobile app too soon.
Being able to lock your mobile device is important because, in many cases, it's your first line of defense. It may not be the strongest form of security but it's a start until mobile device management measures like remote wiping are put into play.
IT managers facing the task of explaining the business value of IT to the C-suite don't necessarily have an easy time of it. But eBay believes it has fixed this problem with a metric that translates IT resources into key business metrics
The ever-increasing complexity of data about IT environments is making it increasingly difficult for organizations to make effective IT decisions.