Feeds

Smartphone users prefer LOVELY apps to fiddly mobe websites

They'd better load in 2 seconds or less, though

High performance access to file storage

A whopping 85 per cent of smartphone users reckon local apps are better than websites, but they're an impatient bunch and expect a gentle touch to be rewarded within seconds or they'll go elsewhere.

The numbers come from Compuware APM, which hired Equation Research to quiz three-and-a-half thousand global smartphone users and establish what they really want from a mobile experience. The answer, in short, is pretty apps which boot up within two seconds and take advantage of platform features which will be missed by the best of HTML5 content.

Compuware hosts content of all types, so has no agenda to promote beyond serving more bytes, but given the utility of sites optimised for mobile, one has to wonder why handset applications remain the preferred option.

Trust seems important, given the focus on banking and shopping, and local apps seem to engender more trust than their browser-based contemporaries. Dodgy connections also play their part, although applications perceived as more responsive through clever use of HTML5 should mitigate that, so perhaps mobile sites aren't using the technology properly.

Chart showing why people prefer apps

Arguably, the Android platform Facebook's application is inferior to its excellent web-based service, while Amazon's app offers no obvious advantage beyond consuming local memory and space for its icon, but perhaps those are bad examples given the cloudy nature of the services they provide.

Games run better locally, and probably will for a long time, but for other apps it is possible that perception could be more important than reality: apps are perceived as superior, and that becomes self-affirming as companies pour more cash into their applications than their websites.

For those providing the content, using an application is clearly better: customers on the web are only a single click from the competition, but once locked into an application, users are more likely to hang around - and if they prefer it that way then that's ideal.

The survey full details are available from Compuware, in exchange for a name and email address, but come with lots of pictures like the one shown above. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.