Feeds

iPad, Kindle as readable as print... almost

Only a page width between them

High performance access to file storage

We've all done it: printed out material because it's easier to read on paper than on a computer screen. But are tablets and e-book readers changing this behaviour pattern? Early research suggests they might well be.

A study of 24 highly literate individuals' reading experience with books, the iPad, Amazon's Kindle and a PC carried out by US usability guru Jakob Nielsen found that while most people still read more quickly when they have a paper book in front of them, electronic media aren't far behind.

Nielsen's results found that reading a set text - a short story by Ernest Hemingway - on an iPad or Kindle took 6-11 per cent longer than it did on paper. Speed was cross-checked against comprehension to weed out those who scanned a story quickly but didn't really take it in.

Nielsen wouldn't state which of the two gadgets saw the faster reading experience. The last thing he wants is abuse from each device's respective fanbase, but more particularly, he found that "the difference between the two devices was not statistically significant because of the data's fairly high variability".

The upshot: "The difference would be so small that it wouldn't be a reason to buy one over the other."

But if the iPad and the Kindle aren't quite on the same ease-of-use level as a paper book, they're way ahead of the PC. While Nielsen doesn't provide relative PC reading speeds, he did ask participants to rate how much they enjoyed the experience on a scale of 1-7.

With seven as the best possible score, the PC scored, on average, 3.6, compared to 5.6 for the paper book, 5.7 for the Kindle and 5.8 for the iPad.

The last three are so close as to warrant picking winners, but it's clear that even if a work takes slightly longer to read and comprehend on, say, an iPad's screen over print, it's still way ahead of a monitor.

"Users felt that reading the printed book was more relaxing than using electronic devices," notes Nielsen. "And they felt uncomfortable with the PC because it reminded them of work."

Nielsen's write-up can be found here. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.