Feeds

Ten Essential World Cup Apps

Android 5, iOS 5

High performance access to file storage

Product Round-up Kick off is mere days away - this coming Friday, no less, with South Africa vs Mexico and Uruguay playing France - so now's the time to get your smartphone loaded up with World Cup goodies.

Whether you'll be watching from home, at a friend's house, down the pub - or even in South Africa itself, here are our ten favourite apps, half of which run on Android and the rest on iOS - as we should now call the operating system running on the iPhone and iPad.

It's a game of two platforms, Barry.

RH NumbersALK CoPilot Live for South Africa

Like all nations, South Africa has its good parts and its bad. Take a wrong turn in your rental car and a good satnav will be useful in getting back to your hotel or to the match. ALK's CoPliot live offers turn-by-turn navigation for all of South Africa so you shouldn't get lost to start with but if you do at least your phone will get you back on course. In use the system is identical to the UK CoPilot application tested here, though the only "Live" feature on offer is the weather forecast. At £33, it's a worthwhile investment if you plan to do any sightseeing while you down there.

ALK CoPilot for Android

ALK CoPilot for AndroidReg Rating 90%
Platform Android
Price £32.99
More Info ALK

Download
ALK CoPilot for Android

RH NumbersMandelaisms

Impress the locals with your encyclopaedic knowledge of the great man's bon mots with this handy quotations app that rustles up the sayings of Nelson Mandela at the touch of a screen. Of rather more value than most quotations apps because the source is a man of unusual insight, honesty and character, only a twit would not be moved to contemplation by the wisdom on offer. Some of the quotes may be a bit Utopian, but if a man's reach does not exceed his grasp, what's a heaven for? Each quote also comes with a handy email/SMS/Tweet function so you can spread a little enlightenment.

Mandelaisms

MandelaismsReg Rating 90%
Platform Android
Price Free
More Info VirtualTechs

Download
Mandelaisms

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.