Feeds

Samsung offers $2.7m of grease for wrestling Bada devs

Paltry £2k tucked in Android champ's thong

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Samsung likes to play the tart when it comes to a mobile OS, but the Bada Developer Challenge for its in-house environment shows where its affections really lie, with a top prize of $300,000.

That compares with the £2,000 that Samsung was prepared to give to the best Android application while promoting its Galaxy handset. The two grand is just for the idea and is UK only, but the comparison still shows how much more important Bada is and how much Samsung is prepared to spend ensuring it succeeds.

Accepting that Bada handsets are still somewhat rare (one announced, but not yet launched), the Developer Challenge expects entrants to work in the simulator for the next three months. Samsung will then send the 300 most promising entrants a Wave handset (the only Bada handset right now) so they can see how accurate the emulator is.

Three months later Samsung will announce a winner who gets $300,000, with 23 runners up getting between $100,000 and $40,000. There are also ten special winners who get $30,000 a piece for creating particularly small and efficient applications.

The search for the best Android application idea was delayed, and the public vote apparently slipped by so quickly we missed it (despite repeatedly asking Samsung when it was going to happen). But the winners have now been announced; two grand goes to an unlock-phone-through-facial-recognition application, which is now supposed to be developed by Samsung.

Samsung supports almost every mobile OS, but is obviously prepared to put a lot of money into promoting its own closed ecosystem. Still, if you're happy to take the money then registration is free. ®

Intelligent flash storage arrays

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.