Mobile browser fierce battle UC how to see

Source: Internet
Author: User
Keywords UC QQ browser UC mobile browser
Tags access alipay application applications based browser browsers cloud

Mobile browser battle will become more complicated and confusing, the biggest topic of which will be between UC browser and QQ browser duel. The showdown directly related to the UC Youshi's life and death, with preconditions barriers UC browser is slowly disappear, Tencent's fierce pursuit is even more pressing UC advantage. In order to further widen the gap and QQ browser, have to see what kind of card UC play, playing good or bad.

▎ 1, the kernel card

- ▎ have the strength, the card can play good

UC June, released last June, claims that after three years of in-house development, it launched a core of a branch based on Webkit. After the launch of the U3 core, the president of UC kicked off a "core card" and claimed that its own core is "eukaryotic" and proposed four major criteria for testing "eukaryotic". In fact, Webkit is an open source project developed over a decade ago by the KHTML engine. Google's Chrome, the Nokia S60 browser, and the system's own browser such as Apple's Safari are all developed based on the Webkit kernel. Moreover, many third-party mobile browsers are also based on the Webkit kernel. Since all are based on the development of Webkit, how can there be a fake? This debate really does not make any sense. Even more speechless is following the release of U3 UC UC, Tencent X5 core test, Huawei beta T9 kernel, but the latter two have not yet introduced an official product. Kernel named a cattle more than one, a number of large, all claim that independent research and development, our industry so? Can engage in gimmicks?

From a product perspective, users do not care whether you are a real or not core, users need to be cheaper, faster, more friendly, and more powerful. Based on the complete U3 core, UC browsers are very non-destructive cloud acceleration, online applications, browser plug-ins, public network security, page rendering, operating system adaptation, voice control, page layout, Good performance.

▎ 2, security card

In terms of security UC browser walked in front of other mobile browsers, it is also worth commendable UC, UC Yu Yongfu also boldly declared "looking forward to the cottage, welcome to QQ imitate UC." UC security coverage from the local security to the cloud three-dimensional security, which really ensures the user's data some security. However, these data are transferred through the UC server, transit data security how to protect this issue has been raised, UC promised to the user: UC in addition to using the collected data for improving the user experience, these data will not be " Leaked "to a third party. Listed below are some of the current UC browser security strategy.

- ▎ UC browser local security policy.

Premise: With the popularity of wireless networks, more and more people use WIFI, more and more public places to provide public wireless networks such as cafes, restaurants, airports and so on. Whether you are connected to a public WIFI network outdoors or your home or office uses an unencrypted WIFI network, users are at a potential security risk.

Liang Jie, president of UC Technologies, also pointed out that "there are mainly two types of network transmission protocols used by ordinary users for Internet access: HTTPS, HTTP.HTTPS is an encryption protocol, and HTTP is a plain text protocol. In the public WIFI environment, Agreement to visit the website, there is the potential risk of being stolen information "To this end, the latest UC browser 8.3 provides the corresponding security network transmission service: When users access public WiFi at risk, UC cloud security center will remind users The WiFi is at risk and may choose to continue accessing the site in UC Cloud Encryption. As long as users choose to use the UC cloud encryption under the public WIFI to access the web site, UC browsers will use those who use the HTTP plaintext protocol to access the site using its own encryption method for protection.

Users may be on the UC browser after the encryption process affect their speed more interested. We all know UC browser known to transit services, data transfer speed is not a problem, encrypted data transmission and decryption through the server, will not affect the normal use of UC browser. There is indeed no delay in normal use, send, load slowly, etc., the use of good experience.

- ▎ UC browser Alipay security plug-ins.

UC Alipay plug-in is still relatively advanced in the country, the user is quite convenient and safe. From the platform for the support Alipay plug-in is still more awesome, this time extends to the phone UC browser. Alipay not only through the plug-in to achieve security, but also according to the amount of the transaction to determine the level of security. For those who use tablet shopping experience for users will be one step higher, one-stop, one-stop transaction.

- ▎ cloud security center. This feature has long been on the line, practicality is high, because most mobile phones and other mobile terminal security issues are caused by the phone software. At the same time that the user downloads the software, the UC security center will remind whether the currently downloaded software is malware. As for phishing websites, there are phishing websites whenever it comes to transactions. The user base for online shopping or trading via mobile phones is not large at present, and the number of users trapped in phishing websites through mobile web browser must be very small. Moreover, domestic users like to use web site navigation to browse the Internet, the probability of encountering such problems is even lower. For the time being, this feature is not useful, gimmicks, a great composition, but there is better than nothing. According to statistics, in 2011, UC Cloud Security Center has cumulatively reported 50 million risk warnings on malicious software downloads, and more than 100 million risk warnings on phishing and fraudulent websites, aiming to save billions of dollars of malicious deductions for mobile phone users.

▎ 3, experience card

- ▎ In addition to the provincial flow, fast outside, many years ago, UC browser basically nothing commendable experience. One after another version of the update, UC experience to do better and better.

- ▎ typesetting version from UC 8 onwards, the interface design and layout have also made great progress, the page is not just the screen link and cluttered layout, the new homepage experience is good. The ability to page layout in the equipment U3, not only enhance the rendering capabilities, but also in the layout has been greatly improved, unfortunately, UC experience in this promotion will never catch up with the needs of high-end users, but also by some competitors step At the foot

- ▎ There has also been a big improvement in interaction, especially with the addition of new gestures and the change of UC's normal interaction, which he praised. There are other changes in the menu style, the navigation bar and so on, perhaps the UC interaction can be more daring, UC browser innovation is worthwhile, but relatively conservative.

▎ 4, community

- ▎ UC Forums, You View's own forums, mainly mobile forums and discussion UC's own product positions, after the fire after a while, I said here is the incubation of UC products base. In fact, many companies have such a forum, but the UC Forum to do better than other forums, one of the great reasons is that Euse UC browser as a result of diversion.

- ▎ UC Park is a large-scale social networking platform developed by U-View Technology (UC) based on the real users of mobile Internet. At present, UC Park has over 10 million users. UC Park's cooperation mechanism has attracted a lot of businesses, UC Park and partners for profit sharing, and give incentives to certain partners; UC Paradise goal is to reach 30 million total users within the next two years, to partners into a billion. UC Park does have a lot of material, the community to do big and comprehensive, such as making friends, flash games, based on the LBS site, talk and so on, like to steal food and play flash games with mobile phone students to enjoy it.

▎4, webapp card

- ▎ UC application center application is our mouth webapp, and now UC applications to join the growing number of applications, according to my classification in the statistics of a total of 154 applications shelves. M2 had contacted UC, hoping it revealed the relevant data, because these data are more secret UC officials temporarily disclose the relevant data.

- ▎webapp like the local application to use the same experience or there will be differences, but its simple and easy to use than the downloaded application is better, for software vendors can indeed save a lot of costs. I'm still very optimistic about the future of webapp, for example, I have written "App Evolution" also discussed webapp.

▎ 5, emotional card

Tencent's strong "suppression", UC Yoyo chairman Yu Yongfu can not help but shout "Tencent now want to destroy the UC, not to UC to stay alive" to release "to the majority of partners and UC browser user book "Accused Tencent of deliberately manipulating the browser QQ browser fully ranked first in the browser market fake reports, mass UC partners, expect UC home death, unfair competition with UC.

Tencent first-class user experience makes no matter what the rogue Tencent has a market share, because the user to buy his account. This is the same iron fact, this iron-like fact pressed UC breathless, who change for the same. Not afraid of thieves, afraid of thieves, but Yu Yongfu some resentment: "As of now Tencent has been forbidden Tencent more than two years, Tencent mobile browser released from 2009, the first thing the UC included Tencent blacklist. In the past there are conflicts, UC are actively seeking communication.I have been with Ma Huatian SMS, phone and meet the communication, and in charge of wireless business Liu Chengmin also communicate many times.But I got the result? One do not recognize, two do not Apologize, the third is intensified. "Here is not too much to list, this is an emotional card, 3Q World War Tencent used, but now for a user to use it.

Internet confessions between the verbal abuse, slander, slander has never stopped before these acts are often those who are the Internet companies, gangsters to start shaking on the Chinese Internet weeping ghosts of the "curse" and finally curse After being cool, they all satisfied that they claimed to have won the war of words. Like the Pok people in the "ugly Chinese," written by Mr. Bo Yang, live a life of entertaining, self-deception, and ugly faces.

▎ 6, concluded

It's better to play cards than to play wonderful, playing better than playing clever. Everyone said Tencent did not play cards according to the rules, in fact, Tencent really cards in accordance with the rules, but there is no rule in the domestic rules. Our Internet does not have a complete set of laws and regulations to standardize, so Tencent is so Niubi, I TM dare to copy you. UC has to be alive in more superb licensing skills.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.