Feeds

Apple iPhone 4 vs... the rest

Fight, Fight

High performance access to file storage

2010: it's a wrap

2010: it's a wrap

The iPhone has been the smartphone to beat since, well, since it was first launched in 2007 - doesn’t that seem a very long time ago now? In the intervening years, it’s gained what some would consider smartphone essentials - 3G network access, cut'n'paste, third-party apps - and it’s changed its look a little with the latest iPhone 4 but is essentially much the same product.

In the meantime, its rivals have been playing catch-up, and some of them are getting pretty darn close.

Apple iPhone 4

Apple's iPhone 4: like it or not, the benchmark

The iPhone’s menu grid of icons has the double advantage of being both attractive and practical. It’s been largely copied by Rim's BlackBerry OS and Google's Android - with a bit of added positioning pizzazz - but it doesn’t do widgets. Widgets offer extra functionality from your home screen, whether it be flashing up social networking updates or the latest weather.

Any Android phone can offer all sorts of additional functionality from news updates to handset controls without the need to fire up the appropriate app. Samsung’s TouchWiz interface on the Galaxy S - layered over Android - has some good ones, so does HTC's sit-on-top-of-Android Sense. Symbian offers some basic ones and Blackberry is... er... working on it.

Blackberry Torch 9800

Rim's BlackBerry 9800

The iPhone, of course, has no physical keyboard, and while the standard on-screen Android keyboard is every bit as responsive and as easy to use - even easier on big screen handsets like the 4.3 inches of the HTC Desire HD - some people prefer to feel the keys under their thumbs. For that, the Blackberry Torch 9800 and its finely chiselled keys work a treat, and slide-out Qwerty keyboard models such as HTC’s Desire Z, the Motorola Milestone 2 and the Palm Pre 2 are well worth a look.

High performance access to file storage

Next page: Taking an app

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.