Internet Explorer Team Blog

May, 2013

  • IEBlog

    Web Performance APIs Rapidly Become W3C Recommendations

    The W3C Web Performance Working Group recently published three specifications as W3C Recommendations with full implementations from all major browser vendors, advancing developers’ ability to accurately measure the performance of Web applications and make the Web faster. Over the last three years, companies including Microsoft, Google, Mozilla, Intel, Facebook, and others have been working towards standardizing the Navigation Timing , High Resolution Time , and Page Visibility interfaces in the Working...
  • IEBlog

    W3C Transitions Pointer Events to Candidate Recommendation

    Today, the W3C published Pointer Events as a Candidate Recommendation, an important step towards a standard and interoperable way to handle input from touch, pen, mouse, and more. This fast 5-month progression from First Public Working Draft to Candidate Recommendation is a mark of the effective collaboration between Microsoft, Google, Mozilla, Opera, Nokia, jQuery, and others to help sites take advantage of new interactive hardware on the Web. Candidate Recommendation indicates the W3C considers...
  • IEBlog

    IE Dev Center: Finding the resources you need, quickly

    Last week we launched a remodeled Internet Explorer Developer Center ( ) to make it easier for developers to find the comprehensive documentation quickly. Based on your feedback, we’ve adjusted our site structure as part of a larger Windows Dev Center redesign in order to: Make it easier to find developer topics across versions of IE Find more comprehensive API documentation faster Learn best practices from developer guides, tutorials, and sample code We organized the...
  • IEBlog

    May 2013 Internet Explorer Updates

    Microsoft Security Bulletin MS13-037 - Critical This security update resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less...
Page 1 of 1 (4 items)