Skip to main content

Chrome tab groups are live in Canary on Android

Chrome tab groups are live in Canary on Android

We've known for a while that the Chrome team was working on tab groups. The feature first showed up in Canary on the desktop, but it's now made its way to Android, also in the Canary channel. It's hidden behind a flag though, and works... sort of.
The "Tag groups" flag (found at the URL chrome://flags/#enable-tab-groups) lets you enable groups. The only way to trigger them now is to open a new tab and tap and hold on any icon in the recommended sites. You'll see the "Open in new tab in group" option. A new bottom menu (which is the weird interface we covered a while back) will appear, and this is where the tabs belonging to this group reside. You can switch between them, open a new tab, and expand the menu to view tab thumbnails and close them.
 
Left: Opening in a new tab group. Right: Switching between tabs in a group.
The feature is still unfinished though. When you access the regular tab switcher, the group is only represented by the last tab you viewed in it. There's no stack of cards, for example, to show that this is a group, which can get very confusing.

With the latest Chrome Canary v75.0.3748 (APK Mirror), tab groups have received a couple of improvements. First, there's a new button to create a group in the grid tab layout. So instead of having to go through a link on the home page to do it, you can now easily start a group from the switcher. Second is that a tab group is represented by a grid of mini thumbnails, and the number of tabs inside is clear.
 
Left: Create group from the tab switcher. Right: Tab groups show mini thumbnails now.
Finally, one last improvement was discovered by our tipster, Nick Cipriani. You can now swipe any of the tabs or groups away (left to right) in the switcher. This feature was missing when the grid layout was introduced. Tapping the small close button was certainly more annoying than a simple swipe.

Comments

Title

Link

https://amzn.to/3isoLUX https://www.amazon.in/gp/product/B082PFY9S7?smid=AT95IG9ONZD7S&psc=1&linkCode=sl1&tag=mywebsit0749e-21&linkId=5108a27204271760a5ba4d6108af7893&language=en_IN&ref_=as_li_ss_tl https://amzn.to/3ist5DR https://amzn.to/3s5ZcMQ

PUBG Mobile Season 4: Release date, season Royale Pass, new features and more

PUBG Mobile Season 4 release date, new features and more: The Battle Royale game, Player Unknown's Battlegrounds for Mobile, will get revamped for its fourth season later this week. PUBG Mobile Season 4 launch, Royale pass, and latest features:  Player Unknown’s Battlegrounds (PUBG) will refresh its mobile version for a fourth season. An update for the same had also been acknowledged by the company through Twitter. The third season of the Battle Royale game, popularly known as PUBG, ended on November 18. Here’s when PUBG Mobile Season 4 starts, and the new features it will bring. PUBG Mobile Season 4: Release date Smartphone gamers will have to wait until November 20 for the new season of PUBG. The global servers for the game are expected to be connected by November 21, which is when all devices are expected to receive access for the same. New and existing players should note that the latest version of PUBG will not take the Season 3 rankings and scores into accoun...

Some Hot New Technologies That Will Change Everything

Some Hot New Technologies That Will Change Everything Illustration: Randy Lyhus The Next Big thing? The  memristor , a microscopic component that can "remember" electrical states even when turned off. It's expected to be far cheaper and faster than flash storage. A theoretical concept since 1971, it has now been built in labs and is already starting to revolutionize everything we know about computing, possibly making flash memory, RAM, and even hard drives obsolete within a decade. The memristor is just one of the incredible technological advances sending shock waves through the world of computing. Other innovations in the works are more down-to-earth, but they also carry watershed significance. From the technologies that finally make  paperless offices  a reality to those that deliver  wireless power , these advances should make your humble PC a far different beast come the turn of the decade. In the followin...

Vision is alive and will defeat Thanos in Avengers Endgame. Here’s how

If the latest fan theory turns out to be true, then Vision's consciousness will give the Marvel superheroes an upper hand and he might be the actual reason behind the Mad Titan's defeat in Avengers: Endgame. Actor Paul Bettany plays Vision in Marvel Cinematic Universe. Vision, played by actor Paul Bettany, might be alive and have a pivotal role in Avengers: Endgame. Infact, he will be instrumental in defeating Thanos in the final battle. But how can that happen, considering Vision was left all cold and grey when Thanos ripped him off the Mind Stone in last year’s blockbuster, Avengers: Infinity War? Going by a new fan theory doing the rounds, there is a catch! Vision is an  android  which was created by Tony Stark and Bruce Banner during Avengers: Age of Ultron. He was brought to life by the Mind Stone stuck on his forehead. In one of the most emotional scenes of Avengers: Infinity War, we saw Scarlet Witch aka Wanda destroying the Mind Stone that ensured Vision bro...

Network security policy

Network security policy This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy  Summary Every company’s network is made up of devices that transmit and store information. This can include internal and external systems, either company-owned or leased/rented/subscribed to. To protect company data and reputation, it is essential to ensure that the network is secured from unauthorized access, data loss, malware infestations, and security breaches. This must be done via systematic end-to-end controls. Policy details The IT department will be responsible for implementing, adhering to, and maintaining these controls. For the purposes of this document, “all devices” refers to workstations, laptops, servers, switches, routers, firewalls, mobile devices, and wireless access points. Where possible, these guidelines will...

Terrorist Lived 10 km From Site Where He Killed 40 Soldiers In Kashmir

More than 40 people were killed when the Jaish-e-Mohammad terrorist rammed a vehicle loaded with explosives into a CRPF convoy in Jammu and Kashmir's Pulwama. Pulwama attack: Adil Ahmad Dar joined Jaish-e-Mohammad last year. Story Highlights Adil Ahmad Dar, 22, joined terror group Jaish-e-Mohammad last year He was also known as "Adil Ahmad Gaadi Takranewala" Police say he is the third local suicide terrorist recruited by Jaish New Delhi:  Adil Ahmad Dar, the Jaish-e-Mohammad terrorist behind the worst-ever terror attack on security forces in Jammu and Kashmir, lived just 10 km from the spot where he rammed his car full of explosives into a security convoy, killing over 40 Central Reserve Police Force (CRPF) personnel on Thursday. Also known as "Adil Ahmad Gaadi Takranewala" and "Waqas Commando of Gundibagh", he joined the Pakistan-based terror outfit last year. On Thursday, he  drove towards the convoy of 78 CRPF buses tr...

Cyber Security Basics

Basics of Cyber Security In the age of technical modernization, array of new opportunity and potential sources of efficiency for organisations of all sizes emerge but these new technologies have also brought unparalleled threats to economy and populace all over the world. Security measures must be taken to ensure safety and reliability of organizations. Hacking of data and information has become almost a practice in organizations. Therefore it is necessary to understand the features of cyber security. Cyber security is described as the protection of systems, networks and data in cyberspace. It is a critical concern for all businesses. Cyber technology is documented as modern ways for investors and common people to effortlessly, economically and efficiently access ample of source and opportunities to accomplish their task. In parallel, it also attracts fraudsters to apply fake schemes. Internet media is a major resource for developing serious crime. As Internet is growing rapidly, o...

Trump's 250 Yard, 8-Vehicle Motorcade To Greet Bush Jr Across The Street

The Trumps spent 23 minutes visiting Bush, his wife Laura, by all accounts a cordial meeting in which the former president exchanged kisses on the cheek with the current first lady at the curb. President Donald Trump leaves in the presidential limo after meeting the Bush family. WASHINGTON : President  Donald Trump traversed a wide political chasm Tuesday evening when he personally welcomed George W. Bush, his occasional foil, to Blair House, the presidential guest quarters across Pennsylvania Avenue from the White House. But the actual distance was just 250 yards - a route Trump and his wife Melania traveled in the presidential parade limousine, with a motorcade of at least seven other vehicles. The Trumps spent 23 minutes visiting with Bush and his wife Laura, by all accounts a cordial meeting in which the former president exchanged kisses on the cheek with the current first lady at the curb. It was the latest in a series of magnanimous gestures that President Trum...