Feeds

Woz praises Android, blasts iPhone limitations

Apple co-founder speaks out

High performance access to file storage

Apple co-founder Steve Wozniak has underlined his love for Android handsets, stating his gripes with the iPhone and why in many ways he prefers Google's OS.

He even claimed voice commands worked better on Android, as does the GPS system, the Daily Beast reports.

“My primary phone is the iPhone, I love the beauty of it. But I wish it did all the things my Android does, I really do,” said Woz.

“If you’re willing to do the work to understand it a little bit, well I hate to say it, but there’s more available in some ways.”

Woz feels the battle between Apple and Android is reminiscent of the rivalry between Windows and Macintosh during the 1990s, when Microsoft dominated the market after licensing its software to third-party manufacturers. The theory goes that Android is doing the same to Apple, slowly taking over through sheer volume.

Unfortunately for the Cupertino giant, Woz reckons it is up against a stronger competitor this time.

“There’s not as big a difference [between iOS and Android] as there was between Mac and Windows,” he said before highlighting Apple's strict app approval process as a hindrance that may give the edge to Android.

Apple punchbag

While Apple has worked hard to promote Siri, its voice-recognition-based assistant for iPhone 4S, Woz stressed his disappointment with it.

“I have a lower success rate with Siri than I do with the voice built into the Android," he blurted before stating his view that Android is "way ahead on navigation" and slating the iPhone's battery life.

Woz does still recommend the iPhone as the best choice for most, though, redeeming his gripes in the eyes of fanboys.

“The people I recommend the iPhone 4S for are the ones who are already in the Mac world, because it’s so compatible, and people who are just scared of computers altogether and don’t want to use them. The iPhone is the least frightening thing. For that kind of person, who is scared of complexity, well, here’s a phone that is simple to use and does what you need it to do.”

Ooh, that was a close one, Woz. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.