Feeds
80%

Navicore Personal 2006/1 smart phone GPS

Upgrade time?

High performance access to file storage

Review It's only been around eight months since Navicore launched its GPS-driven smart phone-based route-planning and navigation application in the UK, but the company has already updated Navicore Personal with the latest maps and a handful of new features, some making it easier to use, others providing more travel information to the driver...

As before, Navicore runs on Symbian-based phones that use Nokia's Series 60 user interface. It operates exactly the way you'd expect it to if you've used a Series 60 handset before. Every option is available from an Options menu linked to the right-hand menu key - push the joystick to the right, or whatever navigation control the handset uses, to select sub-menus. Almost all the phone's keys are used for shortcuts. It's a system that's ideal for one-hand usage.

navicore personal 2006/1

At the top of the list is Find, from which you plot a path to a single destination, plan a multi-stop route or display a specific location on the map - and, if you've already programmed in a pathway, force it to calculate a shorter route or detour round a hazard. Choosing one brings up the customary location selection screens, now improved with support for full, seven-character UK postcodes - by no means a unique feature - and the ability to interrogate the phone's on-board contacts database.

This was absent from the first Navicore Personal release, I was told at the time, because of the difficulty in tapping into Symbian's personal information data structures. From my experience with the new Navicore Personal, I can only assume it's not a problem the company has successfully solved. Yes, you can look up a contact, but getting their address is another matter. First, names are all listed surname first, whether that's how your Contacts book lists them or not. Names are treated as a single field, so pressing 'F' to zero in on, say, 'Bar, Foo' doesn't find anything. The only way to find Mr. Foo Bar's address is to type 'B' and as many extra letters as it takes to filter out other contacts from the list. My Nokia 6600's Contacts app search both surname and first-name fields.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.