Feeds

iPhone apps - the 10 smartest and the 10 stupidest

One man's meat is another man's poison

Secure remote control for conventional and virtual desktops

No. 8

Smart: Shazam

They say: "With Shazam you can identify music tracks, buy them, and share the tags with friends."

The Reg says: Just point your iPhone toward any recorded music, press the Tag button, and in a befuddlingly brief bit of time, Shazan identifies the song, then presents you with info about it, its lyrics, the artist, related videos, and more. You can photo-identify your tags, buy the tune directly from iTunes - everything except splitting a spliff with the lead singer.

Shazam's accuracy is nothing short of astonishing. In our tests, it even correctly identified the 1966 version of "Hey Joe" by the relatively obscure L.A. garage-rock band, The Leaves. Nice.

Price: free

  Shazam screenshot

  iGirl - She Obeys (Lite) screenshot

Stupid: iGirl - She Obeys (Lite)

They say: "iGirl Combines Fun and Flirtation to Offer Users a Playful App for Entertainment."

The Reg says: This poorly rendered 3D object of dork desire can be swiveled, poked, and fantasized about by a deeply repressed male user.

From the makers of the equally pathetic Drunk Sniper - Urinal Fun ("TURN YOUR IPHONE OR IPOD TOUCH INTO MALE BODY ORGAN!!!"), this Lite version can be upgraded to the 99¢ full iGirl - She Obeys version, which offers more clothing, hair color, and "action" options.

Plus "blowing-on-your-iPhone" fun. Don't ask. Please.

Price: free


Internet Security Threat Report 2014

Next page: No. 7

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.